Results 91 to 100 of about 3,580,379 (342)
Validity and Reliability of Clinical and Patient‐Reported Outcomes in Multisystem Proteinopathy 1
ABSTRACT Objective Valosin‐containing protein (VCP)‐associated multisystem proteinopathy 1 (MSP1) is caused by variants in the VCP gene. MSP1 results in various phenotypes including progressive myopathy, Paget's disease of bone, frontotemporal dementia, amyotrophic lateral sclerosis, and parkinsonism, among others.
Lindsay N. Alfano+15 more
wiley +1 more source
Enhancing privacy with optical element design for fall detection
Falling poses significant risks, especially for the geriatric population. In this study, the authors introduce an innovative approach to privacy‐preserving fall detection using computer vision. The authors’ technique leverages a deep neural network (DNN)
Liyun Gong, Sheldon Mccall, Miao Yu
doaj +1 more source
A Foundation for Requirements Analysis of Privacy Preserving Software [PDF]
Privacy requirements are difficult to elicit for any given software engineering project that processes personal information. The problem is that these systems require personal data in order to achieve their functional requirements and privacy mechanisms that constrain the processing of personal information in such a way that the requirement still ...
Beckers, Kristian, Heisel, Maritta
openaire +3 more sources
ABSTRACT Objective Amygdala enlargement has been the subject of controversial studies regarding its significance in terms of pathogenicity both in epilepsy and in psychiatric comorbidities such as anxiety, depression, and post‐traumatic stress disorder.
Hélène Mourre+15 more
wiley +1 more source
Data Security and Privacy in Cloud Computing
Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe.
Yunchuan Sun+3 more
doaj +1 more source
Hardware security for software privacy support
The security level in existing workstation and server systems is not sufficient for most applications in a network environment. The processors only provide basic multitasking support, and any other security enforcement has to be carried out in the software layers.
Tanguy Gilmont+2 more
openaire +2 more sources
Privacy-preserving Cross-domain Routing Optimization -- A Cryptographic Approach [PDF]
Today's large-scale enterprise networks, data center networks, and wide area networks can be decomposed into multiple administrative or geographical domains. Domains may be owned by different administrative units or organizations. Hence protecting domain
Chen, Qingjun, Qian, Chen, Zhong, Sheng
core
CSF Biomarker‐Based Cognitive Trajectories in Parkinson's Disease‐Subjective Cognitive Decline
ABSTRACT Objective Cognitive complaints without objective cognitive impairment in Parkinson's Disease, termed Parkinson's Disease‐Subjective Cognitive Decline (PD‐SCD), have been associated with cognitive decline. However, its progression is heterogeneous, highlighting the need for improved identification of patients at greater risk for deterioration ...
Jon Rodriguez‐Antiguedad+7 more
wiley +1 more source
Privacy as Product Safety [PDF]
Online social media confound many of our familiar expectaitons about privacy. Contrary to popular myth, users of social software like Facebook do care about privacy, deserve it, and have trouble securing it for themselves.
Grimmelmann, James
core +1 more source
BlockChain: A distributed solution to automotive security and privacy
Interconnected smart vehicles offer a range of sophisticated services that benefit the vehicle owners, transport authorities, car manufacturers and other service providers.
Dorri, Ali+3 more
core +1 more source