Results 51 to 60 of about 33,844 (282)

Predicting Epileptogenic Tubers in Patients With Tuberous Sclerosis Complex Using a Fusion Model Integrating Lesion Network Mapping and Machine Learning

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Accurate localization of epileptogenic tubers (ETs) in patients with tuberous sclerosis complex (TSC) is essential but challenging, as these tubers lack distinct pathological or genetic markers to differentiate them from other cortical tubers.
Tinghong Liu   +11 more
wiley   +1 more source

ERA: Towards Privacy Preservation and Verifiability for Online Ad Exchanges

open access: yes, 2017
Ad exchanges are kind of the most popular online advertising marketplaces for trading ad spaces over the Internet. Ad exchanges run auctions to sell diverse ad spaces on the publishers' web-pages to advertisers, who want to display ads on ad spaces ...
Chen, Guihai   +4 more
core   +1 more source

Prognostic Implications of Sleep Architecture for Patients Admitted to the Intensive Care Unit With Status Epilepticus

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Status epilepticus (SE) is associated with significant mortality. Sleep architecture may reflect normal brain function. Impaired sleep architecture is associated with poorer outcomes in numerous conditions. Here we investigate the association of sleep architecture in continuous EEG (cEEG) with survival in SE.
Ran R. Liu   +5 more
wiley   +1 more source

Clustering Algorithm Reveals Dopamine‐Motor Mismatch in Cognitively Preserved Parkinson's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To explore the relationship between dopaminergic denervation and motor impairment in two de novo Parkinson's disease (PD) cohorts. Methods n = 249 PD patients from Parkinson's Progression Markers Initiative (PPMI) and n = 84 from an external clinical cohort.
Rachele Malito   +14 more
wiley   +1 more source

Survey on data preserving for the search of internet of things

open access: yesTongxin xuebao, 2016
With the rapid development of the internet of things(IoT) technology and big data technology,the search engine for internet of things become a hot research topic.However,because of the openness of the search of IoT,the privacy in traditional internet ...
Jia-hui WANG   +2 more
doaj   +2 more sources

Decentralized Privacy-Preserving Data Aggregation Scheme for Smart Grid Based on Blockchain

open access: yesSensors, 2020
As a next-generation power system, the smart grid can implement fine-grained smart metering data collection to optimize energy utilization. Smart meters face serious security challenges, such as a trusted third party or a trusted authority being attacked,
Hongbin Fan, Yining Liu, Zhixin Zeng
doaj   +1 more source

Efficacy of Intermittent Theta‐Burst Stimulation for Prolonged Disorders of Consciousness: A Prospective, Randomized, Controlled Trial

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Emerging evidence suggests that low‐frequency neural oscillations are dynamically regulated by consciousness levels, with the recovery of low cortical activity potentially serving as a neurophysiological substrate for conscious emergence. Targeted enhancement of these low‐frequency rhythms in patients with disorders of consciousness
Chuan Xu   +10 more
wiley   +1 more source

Imageless Contraband Detection Using a Millimeter-Wave Dynamic Antenna Array via Spatial Fourier Domain Sampling

open access: yesIEEE Access
We demonstrate an imageless method of concealed contraband detection using a real-time 75 GHz rotationally dynamic antenna array. The array measures information in the two-dimensional Fourier domain and captures a set of samples that is sufficient for ...
Daniel Chen   +2 more
doaj   +1 more source

Improving Privacy Preservation using IBS and IBOOS in VANET [PDF]

open access: yes, 2015
In Vehicular Ad hoc NETworks (VANETs), vehicles have to be protected from the misuse of their private data and the attacks on their privacy. Here the authentication issues with privacy preservation and non-repudiation in VANETs have been considered.
Lavanya, J. (J), Perumal, S. S. (S)
core  

Advanced Cloud Privacy Threat Modeling

open access: yes, 2016
Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat modeling as a part of requirements engineering in secure software development provides a structured approach for identifying attacks and proposing ...
Gholami, Ali, Laure, Erwin
core   +1 more source

Home - About - Disclaimer - Privacy