Results 71 to 80 of about 1,497,806 (238)
Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data
One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. We believe the forthcoming solutions and theories of big data privacy root from the in place research output of the privacy ...
Shui Yu
doaj +1 more source
Personal Privacy and Common Goods: A Framework for Balancing Under the National Health Information Privacy Rule [PDF]
In this Article, we discuss how these principles for balancing apply in a number of important contexts where individually identifiable health data are shared. In Part I, we analyze the modern view favoring autonomy and privacy.
Gostin, Lawrence O. +1 more
core +2 more sources
Discovery and Targeted Proteomic Studies Reveal Striatal Markers Validated for Huntington's Disease
ABSTRACT Objective Clinical trials for Huntington's disease (HD) enrolling persons before clinical motor diagnosis (CMD) lack validated biomarkers. This study aimed to conduct an unbiased discovery analysis and a targeted examination of proteomic biomarkers scrutinized by clinical validation. Methods Cerebrospinal fluid was obtained from PREDICT‐HD and
Daniel Chelsky +8 more
wiley +1 more source
A Taxonomy of Syntactic Privacy Notions for Continuous Data Publishing
Continuous data publishing aims to anonymise the next publication of changing microdata while preserving privacy. The microdata can change between publications via additions, deletions, insertions, and updates.
Adrian Tobar Nicolau +2 more
doaj +1 more source
Privacy preservation techniques in big data analytics: a survey
Incredible amounts of data is being generated by various organizations like hospitals, banks, e-commerce, retail and supply chain, etc. by virtue of digital technology.
P. Ram Mohan Rao +2 more
doaj +1 more source
ABSTRACT Objective Accurate localization of epileptogenic tubers (ETs) in patients with tuberous sclerosis complex (TSC) is essential but challenging, as these tubers lack distinct pathological or genetic markers to differentiate them from other cortical tubers.
Tinghong Liu +11 more
wiley +1 more source
FL-ASB: A Fuzzy Logic Based Adaptive-period Single-hop Broadcast Protocol
In vehicular ad hoc networks, vehicle-to-vehicle–based broadcast can fast disseminate safety messages between vehicles within the whole network and hence expand drivers perception vision, which will reduce the accident probability and ensure the ...
Bin Pan, Hao Wu, Jin Wang
doaj +1 more source
ABSTRACT Objective Status epilepticus (SE) is associated with significant mortality. Sleep architecture may reflect normal brain function. Impaired sleep architecture is associated with poorer outcomes in numerous conditions. Here we investigate the association of sleep architecture in continuous EEG (cEEG) with survival in SE.
Ran R. Liu +5 more
wiley +1 more source
Developing a Secure Internet-based Network of Trusted Data
Our world has not caught up with technology, and as a result has become more dangerous and nefarious with clandestine actors. Learn what reputable organizations, businesses and academic pioneers are doing to preserve digital identity, data provenance ...
Thomas Hardjono, PhD +1 more
doaj +1 more source
Generating Artificial Data for Private Deep Learning
In this paper, we propose generating artificial data that retain statistical properties of real data as the means of providing privacy with respect to the original dataset.
Faltings, Boi, Triastcyn, Aleksei
core

