intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Genomic privacy

Xem 1-12 trên 12 kết quả Genomic privacy
  • In ebook "The driver in the driverless car: How our technology choices will create the future" breakthroughs such as personalized genomics, self-driving vehicles, drones, and artificial intelligence could make our lives healthier, safer, and easier. But the same technologies raise the specter of a frightening, alienating future: eugenics, a jobless economy, complete loss of privacy, and ever-worsening economic inequality.

    pdf156p dangsovu 20-10-2023 6 3   Download

  • In this paper, we propose three practical strategies for reducing re-identification risks in beacons. The first two strategies manipulate the beacon such that the presence of rare alleles is obscured; the third strategy budgets the number of accesses per user for each individual genome.

    pdf7p visteverogers 24-06-2023 3 2   Download

  • Decentralized privacy-preserving predictive modeling enables multiple institutions to learn a more generalizable model on healthcare or genomic data by sharing the partially trained models instead of patientlevel data, while avoiding risks such as single point of control. State-of-the-art blockchain-based methods remove the “server” role but can be less accurate than models that rely on a server.

    pdf12p visteverogers 24-06-2023 7 2   Download

  • Concerns regarding inappropriate leakage of sensitive personal information as well as unauthorized data use are increasing with the growth of genomic data repositories. Therefore, privacy and security of genomic data have become increasingly important and need to be studied. With many proposed protection techniques, their applicability in support of biomedical research should be well understood.

    pdf9p vighostrider 25-05-2023 4 2   Download

  • Genomic global positioning system (GPS) applies the multilateration technique commonly used in the GPS to genomic data. In the framework we present here, investigators calculate genetic distances from their samples to reference samples, which are from data held in the public domain, and share this information with others.

    pdf5p vielonmusk 30-01-2022 13 0   Download

  • Aggregating transcriptomics data across hospitals can increase sensitivity and robustness of differential expression analyses, yielding deeper clinical insights. As data exchange is often restricted by privacy legislation, meta-analyses are frequently employed to pool local results.

    pdf26p viarchimedes 26-01-2022 11 0   Download

  • The current and future applications of genomic data may raise ethical and privacy concerns. Processing and storing of this data introduce a risk of abuse by potential offenders since the human genome contains sensitive personal information. For this reason, we have developed a privacy-preserving method, named Varlock providing secure storage of sequenced genomic data. We used a public set of population allele frequencies to mask the personal alleles detected in genomic reads.

    pdf13p vilarryellison 29-10-2021 9 1   Download

  • Single Nucleotide Polymorphism (SNP) in the genome has become crucial information for clinical use. For example, the targeted cancer therapy is primarily based on the information which clinically important SNPs are detectable from the tumor. Many hospitals have developed their own panels that include clinically important SNPs. The genome information exchange between the patient and the hospital has become more popular.

    pdf12p visilicon2711 20-08-2021 4 1   Download

  • The deployment of Genome-wide association studies (GWASs) requires genomic information of a large population to produce reliable results. This raises significant privacy concerns, making people hesitate to contribute their genetic information to such studies.

    pdf12p vicoachella2711 27-10-2020 7 1   Download

  • Mutations arise in the human genome in two major settings: The germline and the soma. These settings involve different inheritance patterns, time scales, chromatin structures, and environmental exposures, all of which impact the resulting distribution of substitutions.

    pdf22p vicolorado2711 22-10-2020 10 0   Download

  • Every company is always at risk of having trade secrets compromised, intellectual property stolen, and business plans revealed in an untimely manner. Industrial espionage and spying remain at a high level and are practiced on an international scale. An organization’s privacy planning process needs to take these threats into consideration. However, theft of proprietary information is only part of an organization’s vulnerability in privacy wars. How it uses the information it collects about its customers, or even its suppliers, can also increase its vulnerability.

    pdf13p khongmuonnghe 04-01-2013 35 2   Download

  • This study forms part of a longitudinal study (the main study) on a population consisting of institutionalised peo- ple aged 52–102 living in the Province of Granada, Spain. Data was collected from April 2009 to September 2010. The main study’s inclusion criteria were to have at least three natural teeth and/or to wear dentures. 369 residents were examined at baseline. During the 12-month follow- up period 102 participants were retired from the study, 66 because they died and 36 because of other causes.

    pdf6p taisaokhongthedung 01-01-2013 45 3   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2