Results 121 to 130 of about 1,939,766 (365)

Geometric and dosimetric evaluation of a commercial AI auto‐contouring tool on multiple anatomical sites in CT scans

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Current radiotherapy practices rely on manual contouring of CT scans, which is time‐consuming, prone to variability, and requires highly trained experts. There is a need for more efficient and consistent contouring methods. This study evaluated the performance of the Varian Ethos AI auto‐contouring tool to assess its potential integration into
Robert N. Finnegan   +6 more
wiley   +1 more source

Secret charing vs. encryption-based techniques for privacy preserving data mining [PDF]

open access: yes, 2007
Privacy preserving querying and data publishing has been studied in the context of statistical databases and statistical disclosure control. Recently, large-scale data collection and integration efforts increased privacy concerns which motivated data ...
Pedersen, Thomas Brochmann   +4 more
core  

Methods for working with problem residents in medical physics residency education

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Medical physics residency training programs may occasionally encounter residents requiring additional intervention beyond normal training efforts. In the literature, these residents are referred to as “problem” residents. While the physician literature on the subject is valuable, this paper specifically focuses on dealing with a problem ...
Christopher J. Watchman, Dandan Zheng
wiley   +1 more source

Quantifying Differential Privacy under Temporal Correlations

open access: yes, 2017
Differential Privacy (DP) has received increased attention as a rigorous privacy framework. Existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do ...
Cao, Yang   +3 more
core   +1 more source

The platform for privacy preferences

open access: yesCACM, 1999
nternet users are concerned about the privacy of information they supply to Web sites, not only in terms of personal data, but information that Web sites may derive by tracking their online activities [7]. Many online privacy concerns arise because it is
Joseph M. Reagle, L. Cranor
semanticscholar   +1 more source

An investigation into the feasibility and efficacy of stereotactic radiosurgery for 1–3 cm single brain lesions on the ring‐mounted Halcyon LINAC

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose An evaluation of the accuracy, safety, and efficiency of the Halcyon ring delivery system (RDS) for stereotactic radiosurgery (SRS) treatment to relatively small (1–3 cm) brain lesions. Methods After completing the extensive in‐house quality assurance checks including Winston–Lutz test and independent dose verification via MD Anderson ...
Kate Hazelwood   +5 more
wiley   +1 more source

Recommendations for Social Media Use in Hospitals and Health Care Facilities

open access: yesPhilippine Journal of Otolaryngology Head and Neck Surgery, 2016
Social Media is the new avenue for creating connections and sharing of information.  Through social media, one can reach a global community.   In recent years, we have seen how social media has changed the way we do things.
Ivy D. Patdu
doaj   +1 more source

A secure and private RFID authentication protocol based on quadratic residue [PDF]

open access: yes, 2012
Radio Frequency IDentification based systems are getting pervasively deployed in many real-life applications in various settings for identification and authentication of remote objects.
Kardaş, Süleyman   +3 more
core  

Epigenome‐wide association study, meta‐analysis, and multiscore profiling of whole blood in Parkinson's disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
Abstract Objectives An increasing body of evidence indicates altered DNA methylation in Parkinson's disease, yet the reproducibility and utility of such methylation changes are largely unexplored. We aimed to further elucidate the role of dysregulated DNA methylation in Parkinson's disease and to evaluate the biomarker potential of methylation‐based ...
Ingeborg Haugesag Lie   +4 more
wiley   +1 more source

Detecting Android Locker-Ransomware on Chinese Social Networks

open access: yesIEEE Access, 2019
In recent years, an increasing amount of locker-ransomware has been posing a great threat to the Android platform as well as users' properties. Locker-ransomware blackmails victims for ransom by compulsorily locking the devices.
Dan Su   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy