Results 41 to 50 of about 89,030 (269)
Privacy Protection Method Based on Voronoi Cell in Crowd Sensing [PDF]
In existing privacy protection methods based on the anonymity mechanism and scrambled chaos,malicious users can still infer the activity trajectory of a user from obtained spatial-temporal sensing data.In order to establish an effective chaotic region to
LONG Hao, ZHANG Shukui, ZHANG Li
doaj +1 more source
Security of 5G-V2X: Technologies, Standardization and Research Directions
Cellular-Vehicle to Everything (C-V2X) aims at resolving issues pertaining to the traditional usability of Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) networking.
Guizani, Nadra +2 more
core +1 more source
ABSTRACT Objective This study aimed to investigate the immunological response to influenza vaccination, the incidence and severity of influenza infection, and the side effects of the vaccination in patients with ischemic stroke. Methods This prospective observational study was conducted between 2023 and 2024 at Ramathibodi Hospital.
Achiraya Pakngao +5 more
wiley +1 more source
Through the Thicket and Across the Divide:Successfully Navigating the Regulatory Landscape in Life Sciences Research [PDF]
This chapter addresses the considerable problems that arise within and between regulatory regimes when there is a failure to implement intelligent design that is responsive to the realities of life sciences research.
Harmon, Shawn, Laurie, Graeme
core +1 more source
MOGAD Is the Most Common Cause of Isolated Optic Neuritis in Children
ABSTRACT Objectives The study aimed to characterize the clinical features, etiologies, and outcomes of isolated, first‐time pediatric ON in the post‐MOG‐IgG era. Methods This was a single‐center retrospective cohort study at Texas Children's Hospital of patients diagnosed with first‐time ON between 2018–2024, with follow‐up data collected through 2025.
Chaitanya Aduru +13 more
wiley +1 more source
A Trajectory Privacy Protection Scheme Based on the Replacement of Stay Points
Location-based services generate a large amount of location and trajectory data, which contain rich spatiotemporal and semantic information. Publishing these data without proper protection can seriously threaten users’ trajectory privacy.
Wanqing Wu, Delong Li
doaj +1 more source
PinMe: Tracking a Smartphone User around the World
With the pervasive use of smartphones that sense, collect, and process valuable information about the environment, ensuring location privacy has become one of the most important concerns in the modern age.
Dai, Xiaoliang +3 more
core +1 more source
Objectives This study aimed to investigate hand function trajectories over 5 years in primary hand osteoarthritis. Additionally, determinants of baseline and longitudinal hand function were assessed. Methods 538 patients with both baseline and 5‐year study visits were analyzed.
Annemiek V.E.M. Olde Meule +4 more
wiley +1 more source
A Consistent Differential Privacy Dynamic Trajectory Flow Prediction Method
Ensuring privacy while maintaining accuracy in trajectory prediction is a crucial challenge in privacy‐sensitive applications such as smart transportation and mobility analytics.
Hongzhi Pan
doaj +1 more source
Clinical, histological, and serological predictors of renal function loss in lupus nephritis.
Objective Kidney survival is the ultimate goal in lupus nephritis (LN) management, but long‐term predictors remain inadequately studied, requiring long‐term follow‐up. This study aimed to identify baseline and early longitudinal predictors of kidney survival in the Accelerating Medicines Partnership LN longitudinal cohort.
Shangzhu Zhang +21 more
wiley +1 more source

