Results 81 to 90 of about 72,925 (303)
Potential for use of Al/machine learning for pharmacovigilance: Is there a role for regulators?
British Journal of Clinical Pharmacology, EarlyView.
Christina Gao +3 more
wiley +1 more source
Picture Perfect: Standardizing and Safekeeping Clinical Photography in Plastic Surgery
Plastic surgery relies heavily on clinical photography to document preoperative and postoperative changes, visualize surgical approaches, and evaluate outcomes.
Sarah M Thornton +6 more
doaj +1 more source
Weathering the Nest: Privacy Implications of Home Monitoring for the Aging American Population [PDF]
The research in this paper will seek to ascertain the extent of personal data entry and collection required to enjoy at least the minimal promised benefits of distributed intelligence and monitoring in the home.
Bronfman, Jillisa
core +1 more source
Tele‐hospitalist services to support the opening of a new rural hospital
Abstract As rural hospitals experiencing low patient volume and workforce shortages continue to close nationally, we present an innovative telemedicine care delivery model utilized to support the opening of a new 25‐bed rural hospital in South Carolina in 2023.
Yotam Papo +7 more
wiley +1 more source
A Study of HIPAA and the Possibility of its Implementation in Iran
• Introduction: Health care is considered as one of the basic needs of human societies. Health insurance is the most appropriate option for all individuals to enjoy equal health care.
Farkhondeh Asadi +3 more
doaj
Elizabeth, Madsen +2 more
openaire +2 more sources
Cardiac MR Fingerprinting at 0.55T Using a Deep Image Prior for Joint T1, T2, and M0 Mapping
ABSTRACT Background 0.55T systems offer unique advantages and may support expanded access to cardiac MRI. Purpose To assess the feasibility of 0.55T cardiac MR Fingerprinting (MRF), leveraging a deep image prior reconstruction to mitigate noise. Study Type Phantom and prospective in vivo assessment.
Zhongnan Liu +9 more
wiley +1 more source
Advanced Cloud Privacy Threat Modeling
Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat modeling as a part of requirements engineering in secure software development provides a structured approach for identifying attacks and proposing ...
Gholami, Ali, Laure, Erwin
core +1 more source

