Results 41 to 50 of about 47,575 (276)

Standardization of guidelines for patient photograph deidentification [PDF]

open access: yes, 2016
IMPORTANCE: This work was performed to advance patient care by protecting patient anonymity. OBJECTIVES: This study aimed to analyze the current practices used in patient facial photograph deidentification and set forth standardized guidelines for ...
Roberts, Erik   +2 more
core   +2 more sources

The Role of Invasive Procedures in the Treatment of Complicated Gastrointestinal Graft‐Versus‐Host Disease in Pediatric Patients

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Gastrointestinal graft‐versus‐host disease (GI GVHD) following hematopoietic stem cell transplant is typically managed with medical therapy, but surgery and angioembolization may be warranted in selected cases with life‐threatening complications.
Gaia Brunetti   +12 more
wiley   +1 more source

ANONYMIZATION OF PERSONAL MEDICAL DATA BASED ON ARTIFICIAL INTELLIGENCE [PDF]

open access: yesProblems of Information Society
The widespread digitalization of healthcare has led to the accumulation of substantial volumes of personal medical data, creating new opportunities for enhancing the quality of medical care, supporting informed clinical decision-making, and ...
Ramiz Shikhaliyev
doaj   +1 more source

Data Anonymization through Collaborative Multi-view Microaggregation

open access: yesJournal of Intelligent Systems, 2020
The interest in data anonymization is exponentially growing, motivated by the will of the governments to open their data. The main challenge of data anonymization is to find a balance between data utility and the amount of disclosure risk.
Zouinina Sarah   +3 more
doaj   +1 more source

Analytics on Anonymity for Privacy Retention in Smart Health Data

open access: yesFuture Internet, 2021
Advancements in smart technology, wearable and mobile devices, and Internet of Things, have made smart health an integral part of modern living to better individual healthcare and well-being.
Sevgi Arca, Rattikorn Hewett
doaj   +1 more source

Time Distortion Anonymization for the Publication of Mobility Data with High Utility [PDF]

open access: yes, 2015
An increasing amount of mobility data is being collected every day by different means, such as mobile applications or crowd-sensing campaigns. This data is sometimes published after the application of simple anonymization techniques (e.g., putting an ...
Brunie, Lionel   +3 more
core   +3 more sources

Dietary Protein Intake and Peritoneal Protein Losses in Peritoneal Dialysis Patients

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Introduction Peritoneal dialysis (PD) patients lose protein in their waste dialysate, potentially increasing their risk for malnutrition. We wished to determine whether there was any association between losses and dietary protein intake (DPI). Methods DPI was assessed from 24‐h dietary recall using Nutrics software.
Haalah Shaaker, Andrew Davenport
wiley   +1 more source

Implementation of a big data anonymization system based on Spark

open access: yesDianxin kexue, 2018
Group based anonymization is a classical data anonymization framework,which achieves the effect of privacy protection by constructing groups of anonymized data records ensuring that records in the same group cannot be distinguished with each other.The ...
Chaoyi BIAN, Shaomin ZHU, Tao ZHOU
doaj   +2 more sources

Preserving Both Privacy and Utility in Network Trace Anonymization

open access: yes, 2018
As network security monitoring grows more sophisticated, there is an increasing need for outsourcing such tasks to third-party analysts. However, organizations are usually reluctant to share their network traces due to privacy concerns over sensitive ...
Adam   +22 more
core   +1 more source

The PI3Kδ inhibitor roginolisib (IOA‐244) preserves T‐cell function and activity

open access: yesMolecular Oncology, EarlyView.
Identification of novel PI3K inhibitors with limited immune‐related adverse effects is highly sought after. We found that roginolisib and idelalisib inhibit chronic lymphocytic leukemia (CLL) cells and Treg suppressive functions to similar extents, but roginolisib affects cytotoxic T‐cell function and promotion of pro‐inflammatory T helper subsets to a
Elise Solli   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy