首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The combined usage of smart cards and biometrics has gained in popularity over the last two years. While smart cards themselves may be highly secure, many smart card suppliers are acknowledging the advantage that biometrics can bring to their products by linking the card to the owner. Meanwhile, an advantage to the biometric industry is a privacy-friendly medium to carry its templates. A number of high profile applications have helped push the convergence of the technologies, but a remaining question is how far this convergence will actually go, with sensor-on-card products just around the corner?  相似文献   

2.
Smart card chips are increasingly being used to store and match biometric templates. In the near future, however, the security bar will be raised even further as fingerprint sensors are placed on the smart cards themselves. At this point the combined market for smart cards and biometrics could really blossom.  相似文献   

3.
Li  Dong  Luo  Zai  Cao  Bo 《Cluster computing》2022,25(4):2585-2599

Blockchain technology is an undeniable ledger technology that stores transactions in high-security chains of blocks. Blockchain can solve security and privacy issues in a variety of domains. With the rapid development of smart environments and complicated contracts between users and intelligent devices, federated learning (FL) is a new paradigm to improve accuracy and precision factors of data mining by supporting information privacy and security. Much sensitive information such as patient health records, safety industrial information, and banking personal information in various domains of the Internet of Things (IoT) including smart city, smart healthcare, and smart industry should be collected and gathered to train and test with high potential privacy and secured manner. Using blockchain technology to the adaption of intelligent learning can influence maintaining and sustaining information security and privacy. Finally, blockchain-based FL mechanisms are very hot topics and cut of scientific edge in data science and artificial intelligence. This research proposes a systematic study on the discussion of privacy and security in the field of blockchain-based FL methodologies on the scientific databases to provide an objective road map of the status of this issue. According to the analytical results of this research, blockchain-based FL has been grown significantly during these 5 years and blockchain technology has been used more to solve problems related to patient healthcare records, image retrieval, cancer datasets, industrial equipment, and economical information in the field of IoT applications and smart environments.

  相似文献   

4.
OBJECTIVE: To assess Canadian physicians'' confidence in, attitudes about and preferences regarding clinical practice guidelines. DESIGN: Cross-sectional, self-administered mailed survey. PARTICIPANTS: Stratified random sample of 3000 Canadian physicians; 1878 (62.6%) responded. SETTING: Canada. OUTCOME MEASURES: Physicians'' use of various information sources; familiarity with and confidence in guidelines; attitudes about guidelines and their effect on medical care; rating of importance of guidelines and other sources of information in clinical decision-making; rating of importance of various considerations in deciding whether to adopt a set of guidelines; and rating of usefulness of different formats for presenting guidelines. MAIN RESULTS: In all, 52% of the respondents reported using guidelines at least monthly, substantially less frequently than traditional information sources. Most of the respondents expressed confidence in guidelines issued by various physician organizations, but 51% to 77% were not confident in guidelines issued by federal or provincial health ministries or by health insurance plans. The respondents were generally positive about guidelines (e.g., over 50% strongly agreed that they are a convenient source of advice and good educational tools); however, 22% to 26% had concerns about loss of autonomy, the rigidity of guidelines and decreased satisfaction with medical practice. Endorsement by respected colleagues or major organizations was identified as very important by 78% and 62% of the respondents respectively in deciding whether to adopt a set of guidelines in their practice. User friendliness of the guidelines format was thought to be very important by 62%; short pamphlets, manuals summarizing a number of guidelines, journal articles and pocket cards summarizing guidelines were the preferred formats (identified as most useful by 50% to 62% of the respondents). CONCLUSIONS: Canadian physicians, although generally positive about guidelines and confident in those developed by clinicians, have not yet integrated the use of guidelines into their practices to a large extent. Our results suggest that respected organizations and opinion leaders should be involved in the development of guidelines and that the acceptability of any proposed format and medium for guidelines presentation should be pretested.  相似文献   

5.
Following characteristics of micro-computer cards: inaccessibility to selected secret information; strong resistance to aggressive external agents; impossibility of altering stored data without destroying it; instant reading and reproduction by authorized services; make them a perfect material for building up individual records of civil and biological data. Their application to blood transfusion allows increased safety not only for blood donation registrations, but above all when transfusion takes place; they may also be used as credit cards for health expenditures. They consequently serve as real LIFE cards.  相似文献   

6.

Objective

The purpose of this study was to develop a core set of indicators that could be used for measuring and monitoring the performance of primary health care organizations'' capacity and strategies for enhancing equity-oriented care.

Methods

Indicators were constructed based on a review of the literature and a thematic analysis of interview data with patients and staff (n = 114) using procedures for qualitatively derived data. We used a modified Delphi process where the indicators were circulated to staff at the Health Centers who served as participants (n = 63) over two rounds. Indicators were considered part of a priority set of health equity indicators if they received an overall importance rating of>8.0, on a scale of 1–9, where a higher score meant more importance.

Results

Seventeen indicators make up the priority set. Items were eliminated because they were rated as low importance (<8.0) in both rounds and were either redundant or more than one participant commented that taking action on the indicator was highly unlikely. In order to achieve health care equity, performance at the organizational level is as important as assessing the performance of staff. Two of the highest rated “treatment” or processes of care indicators reflects the need for culturally safe and trauma and violence-informed care. There are four indicators that can be used to measure outcomes which can be directly attributable to equity responsive primary health care.

Discussion

These indicators and subsequent development of items can be used to measure equity in the domains of treatment and outcomes. These areas represent targets for higher performance in relation to equity for organizations (e.g., funding allocations to ongoing training in equity-oriented care provision) and providers (e.g., reflexive practice, skill in working with the health effects of trauma).  相似文献   

7.
Wearable health tech provides doctors with the ability to remotely supervise their patients'' wellness. It also makes it much easier to authorize someone else to take appropriate actions to ensure the person''s wellness than ever before. Information Technology may soon change the way medicine is practiced, improving the performance, while reducing the price of healthcare. We analyzed the secrecy demands of wearable devices, including Smartphone, smart watch and their computing techniques, that can soon change the way healthcare is provided. However, before this is adopted in practice, all devices must be equipped with sufficient privacy capabilities related to healthcare service. In this paper, we formulated a new improved conceptual framework for wearable healthcare systems. This framework consists of ten principles and nine checklists, capable of providing complete privacy protection package to wearable device owners. We constructed this framework based on the analysis of existing mobile technology, the results of which are combined with the existing security standards. The approach also incorporates the market share percentage level of every app and its respective OS. This framework is evaluated based on the stringent CIA and HIPAA principles for information security. This evaluation is followed by testing the capability to revoke rights of subjects to access objects and ability to determine the set of available permissions for a particular subject for all models Finally, as the last step, we examine the complexity of the required initial setup.  相似文献   

8.
Dr A C Srivastava has written to us to describe a case that raises the suggestion that people infected with the human immuno-deficiency virus (HIV) should carry identity cards. We asked two physicians, a general practitioner working with patients with the acquired immune deficiency syndrome (AIDS), and a general practitioner with a special interest in medical ethics to respond to the broad issues raised by Dr Srivastava''s letter.  相似文献   

9.
M Korcok 《CMAJ》1996,154(4):554-556
A special-investigations unit is helping the Ontario Health Insurance Plan (OHIP) curb the fraud and abuse that has been draining millions of health care dollars from the province. The government is taking a tougher line on foreigners who use friends'' or relatives'' OHIP cards, people who use misplaced, stolen or counterfeit cards, and on snowbirds who deliberately bend residency requirements as they try to hang on to medicare benefits. In 1994-95, Ontario spent $74 million on health care for Ontarians travelling or living abroad.  相似文献   

10.
Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.’s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes.  相似文献   

11.
This paper uses data from the 1995/96 Mali DHS survey to examine the importance of a wide range of socioeconomic, behavioural and biodemographic factors in the determination of child mortality in Mali, with a special focus on maternal education and behaviour. The central hypothesis of the study is that advances in maternal education would contribute little to child survival in settings such as Mali's urban and rural communities where progress in educational attainment is not matched with improvements in other aspects of socioeconomic development such as economic growth, job creation, financial security and public health and medical resources. Units of analysis are children born in the past 5 years to DHS respondents (women aged 15-45) who were married at the time of the survey. The Cox proportional hazards regression technique has been used to estimate the net effects of variables included as covariates. The findings indicate that the health-seeking behaviour of the mother matters more than maternal education in explaining the observed differences in infant and child mortality in Mali's urban and rural areas.  相似文献   

12.
All purchasers in the North East Thames Regional Health Authority were contacted by telephone and questioned systematically about their purchasing plans for child and adolescent mental health. Purchasers'' knowledge of the services they were purchasing was very limited. They had made little or no attempt to set quality standards or to monitor them. It is concluded that information about these services is so limited that purchasers would be unable to make informed decisions concerning changes in service patterns.  相似文献   

13.
In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham- Yahalom logic.  相似文献   

14.
The task of the vasopressin system is homeostasis, a type of process which is fundamental to the brain's regulation of the body, exists in many different systems, and is vital to health and survival. Many illnesses are related to the dysfunction of homeostatic systems, including high blood pressure, obesity and diabetes. Beyond the vasopressin system's own importance, in regulating osmotic pressure, it presents an accessible model where we can learn how the features of homeostatic systems generally relate to their function, and potentially develop treatments. The vasopressin system is an important model system in neuroscience because it presents an accessible system in which to investigate the function and importance of, for example, dendritic release and burst firing, both of which are found in many systems of the brain. We have only recently begun to understand the contribution of dendritic release to neuronal function and information processing. Burst firing has most commonly been associated with rhythm generation; in this system it clearly plays a different role, still to be understood fully.  相似文献   

15.
As demands for mobile broadband services and ubiquitous network coverage in our societies are increasing, the mobile communication network infrastructure has to be expanded. Concurrently, the technical infrastructure of mobile communication technologies (base stations) raises the public's concerns about health risks due to electromagnetic fields (EMF). By applying conjoint analyses, the study empirically investigates the relationship between mobile data demands, different base station locations, the prevalence of perceived health complaints, and the impact of compensation payments. Findings show that health concerns are the most critical factor for mobile network communication scenario preferences, followed by data rate availability. In the decision scenarios, base station location and compensation payments played a minor role. Two user groups, cellphone and smart phone users who differ in their sensitivity regarding health concerns and data demands, were identified by segmentation analysis. By means of a sensitivity analysis, different mobile communication network scenarios were analyzed. Outcomes show the importance of integrating users’ preferences into the design of mobile communication networks. This especially refers to an increased sensitivity regarding health concerns in cellphone users and minimum requirements for data rates at least sufficient for the usage of mobile Internet services for smart phone users.  相似文献   

16.

Objective

As large-scale genome sequencing technology advances, concerns surrounding the reporting of individual findings to study volunteers have grown and fueled controversy. This is especially true in mental health research, where the clinical importance of sequencing results is particularly unclear. The ethical, legal, and social issues are being widely debated, but less is known about the attitudes of actual study volunteers toward sequencing studies or what they wish to learn about their DNA sequence and its health implications. This study provides information on psychiatric research volunteers’ attitudes, beliefs, and concerns with respect to participation in DNA sequencing studies and reporting of individual results.

Method

We conducted a pilot study using a questionnaire that we developed to assess what information volunteers in an ongoing family study of bipolar disorder would like to receive if they underwent genome sequencing, what they would do with that information, and what concerns they may have.

Results

Almost all of the respondents were willing to participate in genome sequencing. Most respondents wished to be informed about all their health-related genetic risks, including risks for diseases without known prevention or treatment. However, few respondents felt well informed about the nature of genome sequencing or its implications for their health, insurability, or offspring.

Conclusions

Despite generally positive attitudes toward genome sequencing among study volunteers, most are not fully aware of the special issues raised by genome sequencing. The attitudes of study volunteers should be considered in the debate about the reporting of individual findings from genome sequencing.  相似文献   

17.
Estimating space-use and habitat preference from wildlife telemetry data   总被引:2,自引:0,他引:2  
Management and conservation of populations of animals requires information on where they are, why they are there, and where else they could be. These objectives are typically approached by collecting data on the animals' use of space, relating these positional data to prevailing environmental conditions and employing the resulting statistical models to predict usage at other geographical regions. Technical advances in wildlife telemetry have accomplished manifold increases in the amount and quality of available data, creating the need for a statistical framework that can use them to make population‐level inferences for habitat preference and space‐use. This has been slow‐in‐coming because wildlife telemetry data are spatio‐temporally autocorrelated, often unbalanced, presence‐only observations of behaviourally complex animals, responding to a multitude of cross‐correlated environmental variables. We review the evolution of regression models for the analysis of space‐use and habitat preference and outline the essential features of a framework that emerges naturally from these foundations. This allows us to derive a relationship between usage of points in geographical space and preference of habitats in environmental space. Within this framework, we discuss eight challenges, inherent in the spatial analysis of telemetry data and, for each, we propose solutions that can work in tandem. Specifically, we propose a logistic, mixed‐effects approach that uses generalized additive transformations of the environmental covariates and is fitted to a response data‐set comprising the telemetry and simulated observations, under a case‐control design. We apply this framework to a non‐trivial case‐study using satellite‐tagged grey seals Halichoerus grypus from the east coast of Scotland. We perform model selection by cross‐validation and confront our final model's predictions with telemetry data from the same, as well as different, geographical regions. We conclude that, despite the complex behaviour of the study species, flexible empirical models can capture the environmental relationships that shape population distributions.  相似文献   

18.
The depletion of biodiversity is a major environmental challenge of the present time, with the agricultural sector being a significant contributor to the loss. Therefore, farmers' decisions and practices are pivotal in safeguarding biodiversity at the farm level. Accordingly, this study aimed to unravel the key factors influencing farmers' intention to conserve biodiversity (ICB), and in doing so, it adopted the protection motivation theory (PMT) as the theoretical framework. The study's statistical population comprised 412 farmers residing in Bavi County in the southwestern region of Iran. The research employed a questionnaire as the data collection instrument, and the research hypotheses were tested using structural equation modeling (SEM). The findings indicated that the respondents held a perception of high costs associated with implementing biodiversity conservation behaviors. They believed that such measures would not be easy to implement, and they would incur both monetary and non-monetary costs. Furthermore, the findings of the study revealed that the variables of SE and ICB among the studied farmers were lower than the theoretical median of 3, indicating that farmers may not have a strong desire and self-efficacy to engage in biodiversity conservation practices. Through the application of SEM, the study determined that the PMT accounts for 65.2% of farmers’ ICB. Additionally, perceived severity and self-efficacy were found to have the strongest effects on farmers’ ICB (as the first and second determinants), highlighting the importance of these variables in predicting farmers’ conservation behaviors. Overall, it can be concluded that these results have significant implications for policymakers in the agricultural sector, providing valuable insights into how to promote biodiversity conservation practices among farmers.  相似文献   

19.
Documenting financial resources in biodiversity conservation is a key aspect worldwide in order to set priorities and use effectively the limited resources available. In Mexico, a megadiverse country, studies on financial resources invested in biodiversity conservation are scarce and do not address funding for conservation comprehensively. Using recent data from several sources and applying criteria based on the national priorities for conservation, we compiled, systematized and analyzed data at a national scale on financing sources, financial resources and conservation organizations and their projects. The information obtained is presented in various ways and part of it (case study) is already an information system that can be continuously up-dated. Some of the results show the following: a steady diversification of mechanisms and methods for raising funds for conservation; an increase in governmental budgets; the acknowledgment by the private sector of the importance of biodiversity conservation; a greater technical capacity in people and organizations working in conservation; a greater accessibility of financial resources to support and maintain conservation projects; yet a short term vision in conservation projects; among other. Although the results obtained through this study are a first approach, they can now be used as a baseline to continue gathering and analyzing information on conservation financing in Mexico.  相似文献   

20.
Because a personal index system for published reports is so useful in clinical research, it is well worth while setting this up on cards. If the collection is likely to exceed about 200 entries, there are now distinct advantages in also having it on a computer file. Using the simple system described here, one can then carry out very rapid searches within one''s collection and can prepare error free reference lists for publications.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号