Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Comparative study of trust and reputation systems for wireless sensor networks
Wireless sensor networks (WSNs) are emerging as useful technology for information
extraction from the surrounding environment by using numerous small‐sized sensor nodes …
extraction from the surrounding environment by using numerous small‐sized sensor nodes …
Examining the intended and unintended consequences of organisational privacy safeguards
Research shows that despite organisational efforts to achieve privacy compliance, privacy
breaches continue to rise. The extant studies on organisational privacy compliance …
breaches continue to rise. The extant studies on organisational privacy compliance …
Ontologies for privacy requirements engineering: A systematic literature review
Privacy has been frequently identified as a main concern for system developers while
dealing with/managing personal information. Despite this, most existing work on privacy …
dealing with/managing personal information. Despite this, most existing work on privacy …
A virtual laboratory for medical image analysis
This paper presents the design, implementation, and usage of a virtual laboratory for
medical image analysis. It is fully based on the Dutch grid, which is part of the Enabling …
medical image analysis. It is fully based on the Dutch grid, which is part of the Enabling …
A national survey of physicians regarding protection of patient privacy in China
Objectives The significance of safeguarding patient privacy at a population level within
public medical institutions remains insufficiently acknowledged despite the potential to …
public medical institutions remains insufficiently acknowledged despite the potential to …
A novel key management solution for reinforcing compliance with HIPAA privacy/security regulations
CD Lee, KIJ Ho, WB Lee - IEEE Transactions on Information …, 2011 - ieeexplore.ieee.org
Digitizing medical records facilitates the healthcare process. However, it can also cause
serious security and privacy problems, which are the major concern in the Health Insurance …
serious security and privacy problems, which are the major concern in the Health Insurance …
A system for building clinical research applications using semantic web-based approach
VP Gurupur, MM Tanik - Journal of medical systems, 2012 - Springer
In this paper we present a system using Semantic Web by which applications can be
effectively constructed for clinical research purposes. We are aware of the immense …
effectively constructed for clinical research purposes. We are aware of the immense …
Clustering of distinct PACS archives using a cooperative peer-to-peer network
To face the demanding requirements of the clinical environment, PACS archives need to be
resilient and reliable, supporting high availability and fault tolerance. Often, to ensure no …
resilient and reliable, supporting high availability and fault tolerance. Often, to ensure no …
A systematic approach for using DICOM structured reports in clinical processes: focus on breast cancer
R Medina García, E Torres Serrano… - Journal of Digital …, 2015 - Springer
This paper describes a methodology for redesigning the clinical processes to manage
diagnosis, follow-up, and response to treatment episodes of breast cancer. This …
diagnosis, follow-up, and response to treatment episodes of breast cancer. This …
[PDF][PDF] Enhancing Security in Resource Sharing Using Key Holding Mechanism
This paper describes a logical method to enhance security on the grid computing to restrict
the misuse of the grid resources. This method is an economic and efficient one to avoid the …
the misuse of the grid resources. This method is an economic and efficient one to avoid the …