Results 91 to 100 of about 3,780,326 (325)
ABSTRACT Background Accessing brain magnetic resonance imaging (MRI) can be challenging, especially for underserved patients, which may lead to disparities in neurological diagnosis. Method This mixed‐methods study enrolled adults with one of four neurological disorders: mild cognitive impairment or dementia of the Alzheimer type, multiple sclerosis ...
Maya L. Mastick +19 more
wiley +1 more source
Research progress on location privacy-preserving techniques
While providing plenty of convenience for users in daily life, the increasingly popular location-based ser-vice(LBS) posed a serious threat to users' privacy.
Sheng WAN +4 more
doaj +2 more sources
Participation Cost Estimation: Private Versus Non-Private Study
In our study, we seek to learn the real-time crowd levels at popular points of interests based on users continually sharing their location data. We evaluate the benefits of users sharing their location data privately and non-privately, and show that ...
Gerla, Mario +2 more
core +1 more source
Uniform Obfuscation for Location Privacy [PDF]
As location-based services emerge, many people feel exposed to high privacy threats. Privacy protection is a major challenge for such applications. A broadly used approach is perturbation, which adds an artificial noise to positions and returns an obfuscated measurement to the requester.
DINI, GIANLUCA, PERAZZO, PERICLE
openaire +2 more sources
ABSTRACT Background Emerging evidence suggests that low‐frequency neural oscillations are dynamically regulated by consciousness levels, with the recovery of low cortical activity potentially serving as a neurophysiological substrate for conscious emergence. Targeted enhancement of these low‐frequency rhythms in patients with disorders of consciousness
Chuan Xu +10 more
wiley +1 more source
We show that it is possible to achieve information theoretic location privacy for secondary users (SUs) in database-driven cognitive radio networks (CRNs) with an end-to-end delay less than a second, which is significantly better than that of the ...
Grissa, Mohamed +2 more
core +1 more source
A K-Anonymity Based Schema for Location Privacy Preservation
In recent years, with the development of mobile devices, the location based services (LBSs) have become more and more prevailing and most applications installed on these devices call for location information.
Fan Fei +5 more
semanticscholar +1 more source
Location‐Specific Hematoma Volume Predicts Early Neurological Deterioration in Supratentorial ICH
ABSTRACT Objective Early neurological deterioration (END) adversely affects outcomes in patients with intracerebral hemorrhage (ICH). This study aimed to determine the location‐specific hematoma volumes for END in supratentorial ICH patients. Methods We retrospectively analyzed supratentorial ICH patients presenting from two prospective cohorts.
Zuoqiao Li +10 more
wiley +1 more source
An Efficient Dummy-Based Location Privacy-Preserving Scheme for Internet of Things Services
With the rapid development of GPS-equipped smart mobile devices and mobile computing, location-based services (LBS) are increasing in popularity in the Internet of Things (IoT).
Yongwen Du +4 more
doaj +1 more source
MoveWithMe: Location Privacy Preservation for Smartphone Users
With the prevalence of smartphones, mobile websites have been more and more popular. However, many mobile websites collect the location information which greatly increases users’ risks of being tracked unexpectedly.
Jian Kang +3 more
semanticscholar +1 more source

