Results 51 to 60 of about 747,487 (289)

Prognostic Implications of Sleep Architecture for Patients Admitted to the Intensive Care Unit With Status Epilepticus

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Status epilepticus (SE) is associated with significant mortality. Sleep architecture may reflect normal brain function. Impaired sleep architecture is associated with poorer outcomes in numerous conditions. Here we investigate the association of sleep architecture in continuous EEG (cEEG) with survival in SE.
Ran R. Liu   +5 more
wiley   +1 more source

Research on differential privacy protection parameter configuration method based on confidence level

open access: yes网络与信息安全学报, 2019
In order to solve the problem that the user's real data information is disclosed during the data release and analysis process,and reduce the probability of an attacker gaining real results through differential attacks and probabilistic inference attacks ...
Senyou LI, Xinsheng JI, Wei YOU
doaj   +3 more sources

Ensuring Privacy with Constrained Additive Noise by Minimizing Fisher Information [PDF]

open access: yes, 2018
The problem of preserving the privacy of individual entries of a database when responding to linear or nonlinear queries with constrained additive noise is considered.
Farokhi, Farhad, Sandberg, Henrik
core   +2 more sources

Feasibility and Tolerability of Performing Portable MRI for Neurological Disorders in an Outpatient Neurology Clinic: A Prospective Cohort

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Accessing brain magnetic resonance imaging (MRI) can be challenging, especially for underserved patients, which may lead to disparities in neurological diagnosis. Method This mixed‐methods study enrolled adults with one of four neurological disorders: mild cognitive impairment or dementia of the Alzheimer type, multiple sclerosis ...
Maya L. Mastick   +19 more
wiley   +1 more source

Low Incidence of Relapses After Vaccination in Anti‐Aquaporin‐4 Antibody‐Positive NMOSD

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Patients with neuromyelitis optica spectrum disorder (NMOSD) may experience increased signs and symptoms of their underlying disease when vaccinated against meningococcal disease before receiving complement component 5 inhibitor therapies. This retrospective analysis indicated an overall low relapse incidence (mean [range], 3.3% [0.7%–10.6 ...
Sean J. Pittock   +4 more
wiley   +1 more source

Reasonable Expectations of Geo-Privacy?

open access: yesSCRIPTed: A Journal of Law, Technology & Society, 2008
This article endeavours to highlight the technological developments for Location Based Services by governments in relation to the data protection rules and to the concept of privacy.
Sjaak Nouwt
doaj   +1 more source

PRIVED: a Privacy Model for Heterogeneous Mobile Networks [PDF]

open access: yes, 2011
We propose a network-oriented privacy model (PRIVED) composed by a well defined information model, using events, information sets and relationships to define the conceptual privacy relationships that can occur in the network.
Aguiar, Rui   +2 more
core   +1 more source

Influenza Vaccination Responses in Disabled Stroke Patients: A Single‐Center Prospective Observational Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective This study aimed to investigate the immunological response to influenza vaccination, the incidence and severity of influenza infection, and the side effects of the vaccination in patients with ischemic stroke. Methods This prospective observational study was conducted between 2023 and 2024 at Ramathibodi Hospital.
Achiraya Pakngao   +5 more
wiley   +1 more source

Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters

open access: yes, 2018
Data privacy is crucial when dealing with biometric data. Accounting for the latest European data privacy regulation and payment service directive, biometric template protection is essential for any commercial application.
Busch, Christoph   +4 more
core   +1 more source

Protecting location privacy [PDF]

open access: yesProceedings of the 2012 ACM conference on Computer and communications security, 2012
The mainstream approach to protecting the location-privacy of mobile users in location-based services (LBSs) is to alter the users' actual locations in order to reduce the location information exposed to the service provider. The location obfuscation algorithm behind an effective location-privacy preserving mechanism (LPPM) must consider three ...
Reza Shokri   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy