Results 81 to 90 of about 643,939 (333)
A Foundation for Requirements Analysis of Privacy Preserving Software [PDF]
Privacy requirements are difficult to elicit for any given software engineering project that processes personal information. The problem is that these systems require personal data in order to achieve their functional requirements and privacy mechanisms that constrain the processing of personal information in such a way that the requirement still ...
Beckers, Kristian, Heisel, Maritta
openaire +3 more sources
ABSTRACT Objective Malignant gliomas pose significant therapeutic challenges. This study aimed to identify and characterize a novel chimeric RNA in glioma and assess its clinical and functional significance for precision treatment. Methods The C19orf47‐AKT2 chimeric RNAs were identified through RNA sequencing and validated by polymerase chain reaction.
Zihan Wang+11 more
wiley +1 more source
Association of the ICH Score With Withdrawal of Life‐Sustaining Treatment Over a 10‐Year Period
ABSTRACT Objective The intracerebral hemorrhage (ICH) score was developed to enhance provider communication and facilitate early severity assessment. We examined the association of the ICH score with mortality and withdrawal of life‐sustaining treatment (WLST) in a large, multicenter stroke registry, and evaluated temporal trends in these associations.
Nina Massad+15 more
wiley +1 more source
The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election
In the world's largest-ever deployment of online voting, the iVote Internet voting system was trusted for the return of 280,000 ballots in the 2015 state election in New South Wales, Australia.
F Zagórski+3 more
core +1 more source
Data Security and Privacy in Cloud Computing
Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe.
Yunchuan Sun+3 more
doaj +1 more source
Enhancing privacy with optical element design for fall detection
Falling poses significant risks, especially for the geriatric population. In this study, the authors introduce an innovative approach to privacy‐preserving fall detection using computer vision. The authors’ technique leverages a deep neural network (DNN)
Liyun Gong, Sheldon Mccall, Miao Yu
doaj +1 more source
Digital Activity Markers in Chronic Inflammatory Demyelinating Polyneuropathy
ABSTRACT Objective To evaluate the utility of smartwatch and smartphone‐based activity metrics for assessing disease severity and quality of life in patients with chronic inflammatory demyelinating polyneuropathy (CIDP). Methods In the electronic monitoring of disease activity in patients with CIDP (EMDA‐CIDP) trial, we performed a prospective ...
Lars Masanneck+15 more
wiley +1 more source
Securely Outsourcing Large Scale Eigen Value Problem to Public Cloud
Cloud computing enables clients with limited computational power to economically outsource their large scale computations to a public cloud with huge computational power.
Aktar, Shamminuj+2 more
core +1 more source
Leveraging NLP Techniques for Privacy Requirements Engineering in User Stories
Privacy requirements engineering acts as a role to systematically elicit privacy requirements from system requirements and legal requirements such as the GDPR.
Guntur Budi Herwanto+2 more
doaj +1 more source
ABSTRACT Objective We aimed to investigate the comparative effectiveness of standard versus personalized extended interval dosing of anti‐CD20 therapy on clinical and sub‐clinical outcomes in multiple sclerosis. Methods Clinical information was collected prospectively on Research Electronic Data Capture.
Nabil K. El Ayoubi+6 more
wiley +1 more source