Results 31 to 40 of about 2,872,014 (281)

Lightweight integrity verification scheme for cloud based group data

open access: yesTongxin xuebao, 2016
In order to protect the security of the data stored in the cloud by group users,a data integrity verification scheme was designed which can protect the privacy of the group users.The scheme can efficiently detect the shared data in the cloud and support ...
Yun-fei LIU, Yong-jun WANG, UShao-jing F
doaj   +2 more sources

Application of functional modelling for monitoring of WTG in a cyber-physical environment

open access: yesIET Cyber-Physical Systems, 2019
Decentralisation of generation and increasing utilisation of information communication systems bring challenges to present power system modelling approaches.
Theis Bo Rasmussen   +5 more
doaj   +1 more source

Blockchain Technology in Current Agricultural Systems: From Techniques to Applications

open access: yesIEEE Access, 2020
Increasingly, blockchain technology is attracting significant attentions in various agricultural applications. These applications could satisfy the diverse needs in the ecosystem of agricultural products, e.g., increasing transparency of food safety and ...
Weijun Lin   +8 more
doaj   +1 more source

Why and When Are Evidence‐Based Interventions Adopted in Paediatric Supportive Care? A Qualitative Exploration of the Determinants of Photobiomodulation Implementation

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Oral mucositis is a common and debilitating side effect of childhood cancer and stem cell transplant treatments. It affects the quality of life of children and young people (CYP) and places a strain on services. Photobiomodulation is recommended for oral mucositis prevention in international guidance but is poorly implemented in UK ...
Claudia Heggie   +4 more
wiley   +1 more source

Blockchain-Enabled Supply Chain Management: A Review of Security, Traceability, and Data Integrity Amid the Evolving Systemic Demand

open access: yesApplied Sciences
As supply chains become increasingly digitized and decentralized, ensuring security, traceability, and data integrity has emerged as a critical concern.
Özgür Karaduman, Gülsena Gülhas
doaj   +1 more source

Review of visual analytics methods for food safety risks

open access: yesnpj Science of Food, 2023
With the availability of big data for food safety, more and more advanced data analysis methods are being applied to risk analysis and prewarning (RAPW).
Yi Chen, Caixia Wu, Qinghui Zhang, Di Wu
doaj   +1 more source

PROPYLA: Privacy Preserving Long-Term Secure Storage

open access: yes, 2018
An increasing amount of sensitive information today is stored electronically and a substantial part of this information (e.g., health records, tax data, legal documents) must be retained over long time periods (e.g., several decades or even centuries ...
Bayer Dave   +9 more
core   +1 more source

Ipratropium/Salbutamol Comparator Versus Originator for Chronic Obstructive Pulmonary Disease Exacerbations : USA Observational Cohort Study Using the Clinformatics™ Health Claims Database [PDF]

open access: yes, 2017
Acknowledgements The authors wish to thank Priyanka Raju Konduru of Observational and Pragmatic Research Institute Pte Ltd (OPRI) for assistance with data extraction.
Gefen, Eran   +6 more
core   +3 more sources

Dexamethasone for Chemotherapy‐Induced Nausea and Vomiting Prevention in Pediatric Patients: International Consensus

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background An international Delphi panel of experts developed consensus statements to delineate the circumstances where the risks of dexamethasone as an antiemetic do and do not outweigh its benefits. Procedure Experts in supportive care of pediatric patients were invited to participate.
Negar Shavandi   +20 more
wiley   +1 more source

An Efficient and Robust Method for Data Privacy and Security on a Public Cloud Using a Novel Hybrid Technique

open access: yesEngineering Proceedings, 2023
The end user has a cost-effective and cloud-based method of storing and retrieving their personal information through remote access using some kind of network connectivity. The user may view the data at any time and from any location they want.
Niroshini Infantia Henry   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy