Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC5404349PMC
http://dx.doi.org/10.4103/jpi.jpi_1_17DOI Listing

Publication Analysis

Top Keywords

compromising security
4
security "generating
4
"generating unique
4
unique identifiers
4
identifiers patient
4
patient identification
4
identification data
4
data security
4
security models"
4
compromising
1

Similar Publications

The advent of in-memory computing has introduced a new paradigm of computation, which offers significant improvements in terms of latency and power consumption for emerging embedded AI accelerators. Nevertheless, the effect of the hardware variations and non-idealities of the emerging memory technologies may significantly compromise the accuracy of inferred neural networks and result in malfunctions in safety-critical applications. This article addresses the issue from three different perspectives.

View Article and Find Full Text PDF

Systematic evaluation of adhesives for implant fixation in multimodal functional brain MRI.

MAGMA

January 2025

Translational Research Imaging Center (TRIC), Clinic of Radiology, University of Münster, Albert-Schweitzer-Campus 1, building A16, 48149, Münster, Germany.

Objective: Invasive multimodal fMRI in rodents is often compromised by susceptibility artifacts from adhesives used to secure cranial implants. We hypothesized that adhesive type, shape, and field strength significantly affect susceptibility artifacts, and systematically evaluated various adhesives.

Materials And Methods: Thirty-one adhesives were applied in constrained/unconstrained geometries and imaged with T2*-weighted EPI at 7.

View Article and Find Full Text PDF

Background: Families residing in disadvantaged communities encounter inequalities that restrict their engagement in physical activity. Family-based interventions and health coordinators have been proposed as promising approaches to encourage physical activity among parents and children. However, there is a paucity of knowledge regarding family experiences of such programmes and the ways health coordinators facilitate continued participation in programmes delivered in disadvantaged communities.

View Article and Find Full Text PDF

The explosion of Internet-of-Thing enables several interconnected devices but also gives rise chance for unauthorized parties to compromise sensitive information through wireless communication systems. Covert communication therefore has emerged as a potential candidate for ensuring data privacy in conjunction with physical layer transmission to render two lines of defense. In this paper, we aim to enhance the individual transmission of nearby users in non-orthogonal multiple access (NOMA) systems under scenarios of an eavesdropper who monitors covert transmission before decoding covert information.

View Article and Find Full Text PDF

Expanding access to maggot containment dressings through redesign and innovation.

Int Wound J

January 2025

Applied BioSciences, Faculty of Science and Engineering, Macquarie University, North Ryde, New South Wales, Australia.

There are two major styles of maggot debridement dressings: (1) confinement dressings that form a cage around the wound, and (2) containment dressings that completely surround the maggots within a sealed porous bag. For producers and clinicians wanting to prepare containment dressings using readily available polyester bags, it is currently difficult to seal these bags without expensive high-temperature plastic welders. This study aimed to identify simple and affordable methods for sealing maggots within polyester net bags.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!