Results 61 to 70 of about 731,874 (341)

Portable Tor Router: Easily Enabling Web Privacy for Consumers

open access: yes, 2017
On-line privacy is of major public concern. Unfortunately, for the average consumer, there is no simple mechanism to browse the Internet privately on multiple devices. Most available Internet privacy mechanisms are either expensive, not readily available,
Barberis, Adrian   +3 more
core   +1 more source

Digital twins to accelerate target identification and drug development for immune‐mediated disorders

open access: yesFEBS Open Bio, EarlyView.
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley   +1 more source

Tracking Motor Progression and Device‐Aided Therapy Eligibility in Parkinson's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To characterise the progression of motor symptoms and identify eligibility for device‐aided therapies in Parkinson's disease, using both the 5‐2‐1 criteria and a refined clinical definition, while examining differences across genetic subgroups.
David Ledingham   +7 more
wiley   +1 more source

Privacy Concerns in Biometrics

open access: yes, 2021
Biometrics is any physical or biological feature that can be measured and used for the purpose of identification and authentication. Its features can be either physiological e.g. fingerprint, hand geometry, the face, the iris, the retina or behavioral e.g. voice pattern and gait (way of walking).
Amujo, Oluyemi   +3 more
openaire   +1 more source

An Examination of Privacy Policies of Global University Web Sites [PDF]

open access: yes, 2011
Due to demand in online services, universities throughout the world are increasing the content of their Web sites and adding features, such as online applications and e-learning.
Kuzma, Joanne
core   +1 more source

Secure Multi-Party Computation Based Privacy Preserving Extreme Learning Machine Algorithm Over Vertically Distributed Data

open access: yes, 2015
Especially in the Big Data era, the usage of different classification methods is increasing day by day. The success of these classification methods depends on the effectiveness of learning methods.
Çatak, Ferhat Özgür
core   +1 more source

Network Localization of Fatigue in Multiple Sclerosis

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Fatigue is among the most common symptoms and one of the main factors determining the quality of life in multiple sclerosis (MS). However, the neurobiological mechanisms underlying fatigue are not fully understood. Here we studied lesion locations and their connections in individuals with MS, aiming to identify brain networks ...
Olli Likitalo   +12 more
wiley   +1 more source

Do Security and Privacy Attitudes and Concerns Affect Travellers’ Willingness to Use Mobility-as-a-Service (MaaS) Systems?

open access: yesInformation
Mobility-as-a-Service (MaaS) represents a transformative shift in transportation, enabling users to plan, book, and pay for diverse mobility services via a unified digital platform.
Maria Sophia Heering   +2 more
doaj   +1 more source

How Chinese Web Users Value Their Personal Information: An Empirical Study on WeChat Users

open access: yesPsychology Research and Behavior Management, 2021
Yaojia Tang, Luna Wang School of Economics, Zhejiang University of Finance and Economics, Hangzhou, 310018, People’s Republic of ChinaCorrespondence: Luna WangSchool of Economics, Zhejiang University of Finance and Economics, Hangzhou, 310018, People’s ...
Tang Y, Wang L
doaj  

Home - About - Disclaimer - Privacy