期刊文献+
共找到313,767篇文章
< 1 2 250 >
每页显示 20 50 100
Getting physical with medical education:Exercise based virtual anatomy review classes for medical students
1
作者 Nadeesha R Samarasinghe Taniya S Nagpal +1 位作者 Michele L Barbeau Charys M Martin 《World Journal of Methodology》 2025年第1期20-25,共6页
The benefits of regular physical activity are well known.Yet,few studies have examined the effectiveness of integrating physical activity(PA)into curricula within a post-secondary setting.To investigate the incorporat... The benefits of regular physical activity are well known.Yet,few studies have examined the effectiveness of integrating physical activity(PA)into curricula within a post-secondary setting.To investigate the incorporation of PA into medical curriculum,we developed a series of optional exercise-based review sessions designed to reinforce musculoskeletal(MSK)anatomy course material.These synchronous sessions were co-taught by a group fitness instructor and an anatomy instructor.The fitness instructor would lead students through both strength and yoga style exercises,while the anatomy instructor asked questions about relevant anatomical structures related to course material previously covered.After the sessions,participants were asked to evaluate the classes on their self-reported exam preparedness in improving MSK anatomy knowledge,PA levels,and mental wellbeing.Thirty participants completed surveys;a majority agreed that the classes increased understanding of MSK concepts(90.0%)and activity levels(97.7%).Many(70.0%)felt that the classes helped reduce stress.The majority of respondents(90.0%)agreed that the classes contributed to increased feelings of social connectedness.Overall,medical students saw benefit in PA based interventions to supplement MSK course concepts.Along with increasing activity levels and promoting health behaviours,integrating PA into medical curriculum may improve comprehension of learning material,alleviate stress and foster social connectivity among medical students. 展开更多
关键词 medical education MUSCULOSKELETAL ANATOMY EXERCISE Online learning
下载PDF
A Study on Construction of Quality Security System in the Cultivation of Top-notch Innovative Medical Talents
2
作者 高宪礼 《International English Education Research》 2016年第1期88-90,共3页
In order to cultivate the top-notch innovative talents with the intemational perspectives, on the basis of the principles of objective, utility, humanities and practice, medical institutions should update the concept ... In order to cultivate the top-notch innovative talents with the intemational perspectives, on the basis of the principles of objective, utility, humanities and practice, medical institutions should update the concept of talent cultivation led by employment, innovate teaching mode by deepening teaching reform, optimize the teaching staff by strengthening cooperation between college and enterprise, widen the practical teaching by participating interaction with pharmaceutical industries, and improve the teaching supervision system by implementing quality requirements to construct quality security system in the cultivation of top-notch innovative medical talents. 展开更多
关键词 INNOVATION medical pharmaceutical English top-notch talents quality security
下载PDF
Design of an Information Security Service for Medical Artificial Intelligence 被引量:1
3
作者 Yanghoon Kim Jawon Kim Hangbae Chang 《Computers, Materials & Continua》 SCIE EI 2022年第1期679-694,共16页
The medical convergence industry has gradually adopted ICT devices,which has led to legacy security problems related to ICT devices.However,it has been difficult to solve these problems due to data resource issues.Suc... The medical convergence industry has gradually adopted ICT devices,which has led to legacy security problems related to ICT devices.However,it has been difficult to solve these problems due to data resource issues.Such problems can cause a lack of reliability in medical artificial intelligence services that utilize medical information.Therefore,to provide reliable services focused on security internalization,it is necessary to establish a medical convergence environment-oriented security management system.This study proposes the use of system identification and countermeasures to secure systemreliabilitywhen using medical convergence environment information in medical artificial intelligence.We checked the life cycle of medical information and the flow and location of information,analyzed the security threats that may arise during the life cycle,and proposed technical countermeasures to overcome such threats.We verified the proposed countermeasures through a survey of experts.Security requirements were defined based on the information life cycle in the medical convergence environment.We also designed technical countermeasures for use in the security management systems of hospitals of diverse sizes. 展开更多
关键词 medical artificial intelligence medical information security convergence environment
下载PDF
Knowledge acquisition, semantic text mining, and security risks in health and biomedical informatics 被引量:2
4
作者 J Harold Pardue William T Gerthoffer 《World Journal of Biological Chemistry》 CAS 2012年第2期27-33,共7页
Computational techniques have been adopted in medi-cal and biological systems for a long time. There is no doubt that the development and application of computational methods will render great help in better understan... Computational techniques have been adopted in medi-cal and biological systems for a long time. There is no doubt that the development and application of computational methods will render great help in better understanding biomedical and biological functions. Large amounts of datasets have been produced by biomedical and biological experiments and simulations. In order for researchers to gain knowledge from origi- nal data, nontrivial transformation is necessary, which is regarded as a critical link in the chain of knowledge acquisition, sharing, and reuse. Challenges that have been encountered include: how to efficiently and effectively represent human knowledge in formal computing models, how to take advantage of semantic text mining techniques rather than traditional syntactic text mining, and how to handle security issues during the knowledge sharing and reuse. This paper summarizes the state-of-the-art in these research directions. We aim to provide readers with an introduction of major computing themes to be applied to the medical and biological research. 展开更多
关键词 BIOmedical informatics BIOINFORMATICS Knowledge SHARING Ontology matching Heterogeneous SEMANTICS SEMANTIC integration SEMANTIC data MINING SEMANTIC text MINING security risk
下载PDF
Research on Farmers' Medical Security Based on Supply Theory
5
作者 WANG Linlin 《International English Education Research》 2017年第1期24-26,共3页
Urbanization process to change the pattern of population distribution in rural areas to strengthen the flow of farmers in the city and rural areas; national industrial structural adjustment, the gradual decline in per... Urbanization process to change the pattern of population distribution in rural areas to strengthen the flow of farmers in the city and rural areas; national industrial structural adjustment, the gradual decline in per capital income of farmers; yearly increase in medical costs, making the farmers a serious shortage of personal medical capacity, Disease caused by poverty, due to illness back to poverty "phenomenon is obvious. Based on the historical background of the development of rural medical security, based on the perspective of "supply" of modem medical service, this paper analyzes the economic factors and policies of the farmers' "difficult to see medical treatment", and the data analysis is carried out according to the latest social data. Factors, and put forward the corresponding improvement measures. 展开更多
关键词 urbanization process rural medical security supply perspective
下载PDF
A Triple-Channel Encrypted Hybrid Fusion Technique to Improve Security of Medical Images 被引量:1
6
作者 Ahmed S.Salama Mohamed Amr Mokhtar +2 位作者 Mazhar B.Tayel Esraa Eldesouky Ahmed Ali 《Computers, Materials & Continua》 SCIE EI 2021年第7期431-446,共16页
Assuring medical images protection and robustness is a compulsory necessity nowadays.In this paper,a novel technique is proposed that fuses the wavelet-induced multi-resolution decomposition of the Discrete Wavelet Tr... Assuring medical images protection and robustness is a compulsory necessity nowadays.In this paper,a novel technique is proposed that fuses the wavelet-induced multi-resolution decomposition of the Discrete Wavelet Transform(DWT)with the energy compaction of the Discrete Wavelet Transform(DCT).The multi-level Encryption-based Hybrid Fusion Technique(EbhFT)aims to achieve great advances in terms of imperceptibility and security of medical images.A DWT disintegrated sub-band of a cover image is reformed simultaneously using the DCT transform.Afterwards,a 64-bit hex key is employed to encrypt the host image as well as participate in the second key creation process to encode the watermark.Lastly,a PN-sequence key is formed along with a supplementary key in the third layer of the EbHFT.Thus,the watermarked image is generated by enclosing both keys into DWT and DCT coefficients.The fusions ability of the proposed EbHFT technique makes the best use of the distinct privileges of using both DWT and DCT methods.In order to validate the proposed technique,a standard dataset of medical images is used.Simulation results show higher performance of the visual quality(i.e.,57.65)for the watermarked forms of all types of medical images.In addition,EbHFT robustness outperforms an existing scheme tested for the same dataset in terms of Normalized Correlation(NC).Finally,extra protection for digital images from against illegal replicating and unapproved tampering using the proposed technique. 展开更多
关键词 medical image processing digital image watermarking discrete wavelet transforms discrete cosine transform encryption image fusion hybrid fusion technique
下载PDF
Exploration and Practice of Postgraduate Training Mode Based on Medical Imaging Information Security
7
作者 Yi Ding Jiaqi Zhang +2 位作者 Zhen Qin Yang Zhao Mingsheng Cao 《计算机教育》 2023年第12期71-77,共7页
In the process of continuous maturity and development of medical imaging diagnosis,it is common to transmit images through public networks.How to ensure the security of transmission,cultivate talents who combine medic... In the process of continuous maturity and development of medical imaging diagnosis,it is common to transmit images through public networks.How to ensure the security of transmission,cultivate talents who combine medical imaging and information security,and explore and cultivate new discipline growth points are difficult problems and challenges for schools and educators.In order to cope with industrial changes,a new round of scientific and technological revolution,and the challenges of the further development of artificial intelligence in medicine,this article will analyze the existing problems in the training of postgraduates in medical imaging information security by combining the actual conditions and characteristics of universities,and put forward countermeasures and suggestions to promote the progress of technology in universities. 展开更多
关键词 medical imaging Information security Postgraduate training Countermeasures and suggestions
下载PDF
Reconstruction of Knowledge and Medical Images in the Convergence of Chinese and Western Medicine:Taking “Sweet Meat” as an Example 被引量:1
8
作者 GU Xiaoyang 《Chinese Medicine and Culture》 2024年第3期204-212,共9页
The pancreas is neither part of the five Zang organs(五脏) nor the six Fu organs(六腑).Thus,it has received little attention in Chinese medical literature.In the late 19th century,medical missionaries in China started... The pancreas is neither part of the five Zang organs(五脏) nor the six Fu organs(六腑).Thus,it has received little attention in Chinese medical literature.In the late 19th century,medical missionaries in China started translating and introducing anatomical and physiological knowledge about the pancreas.As for the word pancreas,an early and influential translation was “sweet meat”(甜肉),proposed by Benjamin Hobson(合信).The translation “sweet meat” is not faithful to the original meaning of “pancreas”,but is a term coined by Hobson based on his personal habits,and the word “sweet” appeared by chance.However,in the decades since the term “sweet meat” became popular,Chinese medicine practitioners,such as Tang Zonghai(唐宗海),reinterpreted it by drawing new medical illustrations for “sweet meat” and giving new connotations to the word “sweet”.This discussion and interpretation of “sweet meat” in modern China,particularly among Chinese medicine professionals,is not only a dissemination and interpretation of the knowledge of “pancreas”,but also a construction of knowledge around the term “sweet meat”. 展开更多
关键词 medical terminology Sweet meat medical missionaries PANCREAS History of images
下载PDF
Process,Material,and Regulatory Considerations for 3D Printed Medical Devices and Tissue Constructs 被引量:1
9
作者 Wei Long Ng Jia An Chee Kai Chua 《Engineering》 SCIE EI CAS CSCD 2024年第5期146-166,共21页
Three-dimensional(3D)printing is a highly automated platform that facilitates material deposition in a layer-by-layer approach to fabricate pre-defined 3D complex structures on demand.It is a highly promising techniqu... Three-dimensional(3D)printing is a highly automated platform that facilitates material deposition in a layer-by-layer approach to fabricate pre-defined 3D complex structures on demand.It is a highly promising technique for the fabrication of personalized medical devices or even patient-specific tissue constructs.Each type of 3D printing technique has its unique advantages and limitations,and the selection of a suitable 3D printing technique is highly dependent on its intended application.In this review paper,we present and highlight some of the critical processes(printing parameters,build orientation,build location,and support structures),material(batch-to-batch consistency,recycling,protein adsorption,biocompatibility,and degradation properties),and regulatory considerations(sterility and mechanical properties)for 3D printing of personalized medical devices.The goal of this review paper is to provide the readers with a good understanding of the various key considerations(process,material,and regulatory)in 3D printing,which are critical for the fabrication of improved patient-specific 3D printed medical devices and tissue constructs. 展开更多
关键词 3D printing BIOPRINTING BIOFABRICATION medical devices Tissue constructs
下载PDF
Advancements in medical treatment for pancreatic neuroendocrine tumors:A beacon of hope 被引量:1
10
作者 Somdatta Giri Jayaprakash Sahoo 《World Journal of Gastroenterology》 SCIE CAS 2024年第12期1670-1675,共6页
This editorial highlights the remarkable advancements in medical treatment strategies for pancreatic neuroendocrine tumors(pan-NETs),emphasizing tailored approaches for specific subtypes.Cytoreductive surgery and soma... This editorial highlights the remarkable advancements in medical treatment strategies for pancreatic neuroendocrine tumors(pan-NETs),emphasizing tailored approaches for specific subtypes.Cytoreductive surgery and somatostatin analogs(SSAs)play pivotal roles in managing tumors,while palliative options such as molecular targeted therapy,peptide receptor radionuclide therapy,and chemotherapy are reserved for SSA-refractory patients.Gastrinomas,insul-inomas,glucagonomas,carcinoid tumors and VIPomas necessitate distinct thera-peutic strategies.Understanding the genetic basis of pan-NETs and exploring immunotherapies could lead to promising avenues for future research.This review underscores the evolving landscape of pan-NET treatment,offering renewed hope and improved outcomes for patients facing this complex disease. 展开更多
关键词 Pancreatic neuroendocrine tumor medical management Somatostatin analog IMMUNOTHERAPY EVEROLIMUS
下载PDF
Repositioning fertilizer manufacturing subsidies for improving food security and reducing greenhouse gas emissions in China 被引量:1
11
作者 Zongyi Wu Xiaolong Feng +1 位作者 Yumei Zhang Shenggen Fan 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第2期430-443,共14页
China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the ... China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the environment remains inadequately evaluated.Moreover,although green and low-carbon technologies offer environmental advantages,their widespread adoption is hindered by prohibitively high costs.This study analyzes the impact of removing fertilizer manufacturing subsidies and explores the potential feasibility of redirecting fertilizer manufacturing subsidies to invest in the diffusion of these technologies.Utilizing the China Agricultural University Agri-food Systems model,we analyzed the potential for achieving mutually beneficial outcomes regarding food security and environmental sustainability.The findings indicate that removing fertilizer manufacturing subsidies has reduced greenhouse gas(GHG)emissions from agricultural activities by 3.88 million metric tons,with minimal impact on food production.Redirecting fertilizer manufacturing subsidies to invest in green and low-carbon technologies,including slow and controlled-release fertilizer,organic-inorganic compound fertilizers,and machine deep placement of fertilizer,emerges as a strategy to concurrently curtail GHG emissions,ensure food security,and secure robust economic returns.Finally,we propose a comprehensive set of government interventions,including subsidies,field guidance,and improved extension systems,to promote the widespread adoption of these technologies. 展开更多
关键词 food security fertilizer manufacturing subsidies agri-food systems greenhouse gas emissions
下载PDF
Curved Spine:The Shape of Spine in Taoist Body Diagrams and Its Influence on Medical Body Diagrams 被引量:1
12
作者 ZHANG Xinyue ZHANG Shujian 《Chinese Medicine and Culture》 2024年第3期251-261,共11页
From the early Taoist diagrams of the human body to the end of the Qing dynasty and the beginning of the Republic of China,Taoists exaggerated and deformed the human spine in a shape-shifting manner.It is likely that ... From the early Taoist diagrams of the human body to the end of the Qing dynasty and the beginning of the Republic of China,Taoists exaggerated and deformed the human spine in a shape-shifting manner.It is likely that medical practitioners were influenced by this style of representation,and there are also numerous diagrams of the human body with the curved spine in the lateral-view diagrams of viscera and Ming Tang Tu(明堂图Acupuncture and Moxibustion Chart),which constantly show the human torso in an elliptical“egg shape”.No later than the Ming dynasty,medical practitioners began to depict the actual physiological spinal curve of the human body.By the Qing dynasty,the depiction of the spinal curve in medical diagrams of the human figure showed a tendency to part ways with the Taoist freehand style of the previous generation.Although the representation of the curve of the spine was very crude,later medical images of the human body at least gradually straightened the spine and no longer depicted it in a shape-shifting manner.However,the curved spine in Taoist diagrams of the human body continued to exist,and the presentation of the curved spine never changed.This way of depicting its appearance,which is very different from reality,is shaped by Taoism's special way of perceiving and viewing the body,and may also contain another form of truth. 展开更多
关键词 SPINE Diagrams of human body Taoists Traditional Chinese medical practitioners
下载PDF
Prions:a threat to health security and the need for effective medical countermeasures
13
作者 Ying-Chiang J.Lee 《Global Health Journal》 2023年第1期43-48,共6页
Prions are infectious conformations of certain naturally occurring proteins.These misfolded proteins can struc­turally alter healthy protein,creating misfolded copies that repeat the process and form protein aggr... Prions are infectious conformations of certain naturally occurring proteins.These misfolded proteins can struc­turally alter healthy protein,creating misfolded copies that repeat the process and form protein aggregates that lead to neuronal cell death.Although years can pass from initial prion infection to clinical presentation of symp­toms,onset of symptoms is typically followed by rapid neurological decline resulting in death.Prion diseases have been characterized in animals ranging from sheep and cattle to cervids and humans,with notable cross-species infections such as the variant Creutzfeldt-Jakob disease.Thus,prions present a health risk with the potential to disrupt major food sources as well affect human health through animal to human and human to human trans­mission events.While human to human prion transmission is rare and the immediate risks for a prion-facilitated pandemic are low,prions are a class of pathogens for which we are underprepared.In addition,prions,and prion disease-like approaches,have also been discussed in the context of biological weapons and toxins,adding another layer of complexity surrounding biosecurity and biodefense.These threats underscore the need for increased scrutiny and research on prions.Here,pharmaceutical and nonpharmaceutical prion-specific interventions are discussed.Recent advances in prion therapeutic development are also briefly highlighted,and a set of policy rec­ommendations are given that aims to provide high level suggestions for the prevention and mitigation of prion diseases. 展开更多
关键词 PRIONS medical countermeasures Interventions Vaccines BIOsecurity Policy
下载PDF
Application of Zero-Watermarking for Medical Image in Intelligent Sensor Network Security
14
作者 Shixin Tu Yuanyuan Jia +1 位作者 Jinglong Du Baoru Han 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第7期293-321,共29页
The field of healthcare is considered to be the most promising application of intelligent sensor networks.However,the security and privacy protection ofmedical images collected by intelligent sensor networks is a hot ... The field of healthcare is considered to be the most promising application of intelligent sensor networks.However,the security and privacy protection ofmedical images collected by intelligent sensor networks is a hot problem that has attracted more and more attention.Fortunately,digital watermarking provides an effective method to solve this problem.In order to improve the robustness of the medical image watermarking scheme,in this paper,we propose a novel zero-watermarking algorithm with the integer wavelet transform(IWT),Schur decomposition and image block energy.Specifically,we first use IWT to extract low-frequency information and divide them into non-overlapping blocks,then we decompose the sub-blocks by Schur decomposition.After that,the feature matrix is constructed according to the relationship between the image block energy and the whole image energy.At the same time,we encrypt watermarking with the logistic chaotic position scrambling.Finally,the zero-watermarking is obtained by XOR operation with the encrypted watermarking.Three indexes of peak signal-to-noise ratio,normalization coefficient(NC)and the bit error rate(BER)are used to evaluate the robustness of the algorithm.According to the experimental results,most of the NC values are around 0.9 under various attacks,while the BER values are very close to 0.These experimental results show that the proposed algorithm is more robust than the existing zero-watermarking methods,which indicates it is more suitable for medical image privacy and security protection. 展开更多
关键词 Intelligent sensor network medical image ZERO-WATERMARKING integer wavelet transform schur decomposition
下载PDF
A Multi-Stage Security Solution for Medical Color Images in Healthcare Applications
15
作者 Walid El-Shafai Fatma Khallaf +2 位作者 El-Sayed M.El-Rabaie Fathi E.Abd El-Samie Iman Almomani 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3599-3618,共20页
This paper presents a robust multi-stage security solution based on fusion,encryption,and watermarking processes to transmit color healthcare images,efficiently.The presented solution depends on the features of discre... This paper presents a robust multi-stage security solution based on fusion,encryption,and watermarking processes to transmit color healthcare images,efficiently.The presented solution depends on the features of discrete cosine transform(DCT),lifting wavelet transform(LWT),and singular value decomposition(SVD).The primary objective of this proposed solution is to ensure robustness for the color medical watermarked images against transmission attacks.During watermark embedding,the host color medical image is transformed into four sub-bands by employing three stages of LWT.The resulting low-frequency sub-band is then transformed by employing three stages of DCT followed by SVD operation.Furthermore,a fusion process is used for combining different watermarks into a single watermark image.This single fused image is then ciphered using Deoxyribose Nucleic Acid(DNA)encryption to strengthen the security.Then,the DNA-ciphered fused watermark is embedded in the host medical image by applying the suggested watermarking technique to obtain the watermarked image.The main contribution of this work is embedding multiple watermarks to prevent identity theft.In the presence of different multimedia attacks,several simulation tests on different colormedical images have been performed.The results prove that the proposed security solution achieves a decent imperceptibility quality with high Peak Signal-to-Noise Ratio(PSNR)values and high correlation between the extracted and original watermark images.Moreover,the watermark image extraction process succeeds in achieving high efficiency in the presence of attacks compared with related works. 展开更多
关键词 medical images DNA encryption digital image watermarking FUSION healthcare applications
下载PDF
A novel medical image data protection scheme for smart healthcare system
16
作者 Mujeeb Ur Rehman Arslan Shafique +6 位作者 Muhammad Shahbaz Khan Maha Driss Wadii Boulila Yazeed Yasin Ghadi Suresh Babu Changalasetty Majed Alhaisoni Jawad Ahmad 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第4期821-836,共16页
The Internet of Multimedia Things(IoMT)refers to a network of interconnected multimedia devices that communicate with each other over the Internet.Recently,smart healthcare has emerged as a significant application of ... The Internet of Multimedia Things(IoMT)refers to a network of interconnected multimedia devices that communicate with each other over the Internet.Recently,smart healthcare has emerged as a significant application of the IoMT,particularly in the context of knowledge‐based learning systems.Smart healthcare systems leverage knowledge‐based learning to become more context‐aware,adaptable,and auditable while maintain-ing the ability to learn from historical data.In smart healthcare systems,devices capture images,such as X‐rays,Magnetic Resonance Imaging.The security and integrity of these images are crucial for the databases used in knowledge‐based learning systems to foster structured decision‐making and enhance the learning abilities of AI.Moreover,in knowledge‐driven systems,the storage and transmission of HD medical images exert a burden on the limited bandwidth of the communication channel,leading to data trans-mission delays.To address the security and latency concerns,this paper presents a lightweight medical image encryption scheme utilising bit‐plane decomposition and chaos theory.The results of the experiment yield entropy,energy,and correlation values of 7.999,0.0156,and 0.0001,respectively.This validates the effectiveness of the encryption system proposed in this paper,which offers high‐quality encryption,a large key space,key sensitivity,and resistance to statistical attacks. 展开更多
关键词 data analysis medical image processing security
下载PDF
Anomaly Detection Using Data Rate of Change on Medical Data
17
作者 Kwang-Cheol Rim Young-Min Yoon +1 位作者 Sung-Uk Kim Jeong-In Kim 《Computers, Materials & Continua》 SCIE EI 2024年第9期3903-3916,共14页
The identification and mitigation of anomaly data,characterized by deviations from normal patterns or singularities,stand as critical endeavors in modern technological landscapes,spanning domains such as Non-Fungible ... The identification and mitigation of anomaly data,characterized by deviations from normal patterns or singularities,stand as critical endeavors in modern technological landscapes,spanning domains such as Non-Fungible Tokens(NFTs),cyber-security,and the burgeoning metaverse.This paper presents a novel proposal aimed at refining anomaly detection methodologies,with a particular focus on continuous data streams.The essence of the proposed approach lies in analyzing the rate of change within such data streams,leveraging this dynamic aspect to discern anomalies with heightened precision and efficacy.Through empirical evaluation,our method demonstrates a marked improvement over existing techniques,showcasing more nuanced and sophisticated result values.Moreover,we envision a trajectory of continuous research and development,wherein iterative refinement and supplementation will tailor our approach to various anomaly detection scenarios,ensuring adaptability and robustness in real-world applications. 展开更多
关键词 Anomaly data anomaly detection medical anomaly data cyber security rate of change
下载PDF
Changes and Adjustments:The Rule of Law Response to Medical Institution Data Compliance
18
作者 Long Keyu 《科技与法律(中英文)》 CSSCI 2024年第5期110-122,共13页
Medical institution data compliance is an exogenous product of the digital society,serving as a crucial means to maintain and balance the relationship between data protection and data sharing,as well as individual int... Medical institution data compliance is an exogenous product of the digital society,serving as a crucial means to maintain and balance the relationship between data protection and data sharing,as well as individual interests and public interests.The implementation of the Healthy China Initiative greatly benefits from its practical significance.In practice,data from medical institutions takes varied forms,including personally identifiable data collected before diagnosis and treatment,clinical medical data generated during diagnosis and treatment,medical data collected in public health management,and potential medical data generated in daily life.In the new journey of comprehensively promoting the Chinese path to modernization,it is necessary to clarify the shift from an individual-oriented to a societal-oriented value system,highlighting the reinforcing role of the trust concept.Guided by the principle of minimizing data utilization,the focus is on the new developments and changes in medical institution data in the postpandemic era.This involves a series of measures such as fulfilling the obligation of notification and consent,specifying the scope of data collection and usage,strengthening the standardized use of relevant technical measures,and establishing a sound legal responsibility system for data compliance.Through these measures,a flexible and efficient medical institution data compliance system can be constructed. 展开更多
关键词 medical institution data privacy protection data security compliance governance
下载PDF
Security Implications of Edge Computing in Cloud Networks 被引量:1
19
作者 Sina Ahmadi 《Journal of Computer and Communications》 2024年第2期26-46,共21页
Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this r... Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this regard. The findings have shown that many challenges are linked to edge computing, such as privacy concerns, security breaches, high costs, low efficiency, etc. Therefore, there is a need to implement proper security measures to overcome these issues. Using emerging trends, like machine learning, encryption, artificial intelligence, real-time monitoring, etc., can help mitigate security issues. They can also develop a secure and safe future in cloud computing. It was concluded that the security implications of edge computing can easily be covered with the help of new technologies and techniques. 展开更多
关键词 Edge Computing Cloud Networks Artificial Intelligence Machine Learning Cloud security
下载PDF
An Investigation on Open-RAN Specifications:Use Cases,Security Threats,Requirements,Discussions
20
作者 Heejae Park Tri-HaiNguyen Laihyuk Park 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期13-41,共29页
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Rece... The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Recently,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional RANs.By disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network automation.However,this openness introduces new security challenges compared to traditional RANs.Many existing studies overlook these security requirements of the O-RAN networks.To gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G applications.We then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities effectively.By providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security. 展开更多
关键词 O-RAN ARCHITECTURE use cases security issues security requirements security discussions
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部