Results 81 to 90 of about 647,604 (320)

Methods for working with problem residents in medical physics residency education

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Medical physics residency training programs may occasionally encounter residents requiring additional intervention beyond normal training efforts. In the literature, these residents are referred to as “problem” residents. While the physician literature on the subject is valuable, this paper specifically focuses on dealing with a problem ...
Christopher J. Watchman, Dandan Zheng
wiley   +1 more source

Privacy Design Strategies [PDF]

open access: yesarXiv, 2012
In this paper we define the notion of a privacy design strategy. These strategies help IT architects to support privacy by design early in the software development life cycle, during concept development and analysis. Using current data protection legislation as point of departure we derive the following eight privacy design strategies: minimise, hide ...
arxiv  

Information-Theoretic Privacy in Federated Submodel learning [PDF]

open access: yesarXiv, 2020
We consider information-theoretic privacy in federated submodel learning, where a global server has multiple submodels. Compared to the privacy considered in the conventional federated submodel learning where secure aggregation is adopted for ensuring privacy, information-theoretic privacy provides the stronger protection on submodel selection by the ...
arxiv  

An investigation into the feasibility and efficacy of stereotactic radiosurgery for 1–3 cm single brain lesions on the ring‐mounted Halcyon LINAC

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose An evaluation of the accuracy, safety, and efficiency of the Halcyon ring delivery system (RDS) for stereotactic radiosurgery (SRS) treatment to relatively small (1–3 cm) brain lesions. Methods After completing the extensive in‐house quality assurance checks including Winston–Lutz test and independent dose verification via MD Anderson ...
Kate Hazelwood   +5 more
wiley   +1 more source

Information-theoretic metrics for Local Differential Privacy protocols [PDF]

open access: yesarXiv, 2019
Local Differential Privacy (LDP) protocols allow an aggregator to obtain population statistics about sensitive data of a userbase, while protecting the privacy of the individual users. To understand the tradeoff between aggregator utility and user privacy, we introduce new information-theoretic metrics for utility and privacy.
arxiv  

Unsupervised non‐small cell lung cancer tumor segmentation using cycled generative adversarial network with similarity‐based discriminator

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Background Tumor segmentation is crucial for lung disease diagnosis and treatment. Most existing deep learning‐based automatic segmentation methods rely on manually annotated data for network training. Purpose This study aims to develop an unsupervised tumor segmentation network smic‐GAN by using a similarity‐driven generative adversarial ...
Chengyijue Fang   +2 more
wiley   +1 more source

Five years with the GDPR: an empirical study emphasising information privacy and the consumer

open access: yesInternational Journal of Information Systems and Project Management
Consumers’ privacy rights have been enshrined in law, long before information systems and the Internet was brought to life. In 2018, stricter regulations relating to information privacy came into force, named the General Data Protection Regulation (GDPR)
Wanda Presthus, Hanne Sørum
doaj   +1 more source

Privacy-Aware Reversible Watermarking in Cloud Computing Environments

open access: yesIEEE Access, 2018
As an interdisciplinary research between watermarking and cryptography, privacy-aware reversible watermarking permits a party to entrust the task of embedding watermarks to a cloud service provider without compromising information privacy.
Ching-Chun Chang   +2 more
doaj   +1 more source

Noiseless Privacy [PDF]

open access: yesarXiv, 2019
In this paper, we define noiseless privacy, as a non-stochastic rival to differential privacy, requiring that the outputs of a mechanism (i.e., function composition of a privacy-preserving mapping and a query) can attain only a few values while varying the data of an individual (the logarithm of the number of the distinct values is bounded by the ...
arxiv  

Home - About - Disclaimer - Privacy