Track topics on Twitter Track topics that are important to you
Sensitive genomic data should remain secure - whether on disk for storage, or analysis, or in transport. However, secure storage, delivery, and usage of genomic data is complicated by the size of files and diversity of workflows. This paper presents solutions developed by GA4GH and EGA to use customized encryption, encrypted file formats, toolchain integration, and intelligent APIs to help solve this problem.
This article was published in the following journal.
Name: IEEE/ACM transactions on computational biology and bioinformatics
With China's implementing big data strategy, health care becomes one of the key areas in which the national big data strategy is highly promoted. However, as the health care big data industry grows ra...
Archaeologists and other scholars have long studied the causes of collapse and other major social transformations and debated how they can be understood. This article instead focuses on the human expe...
The article raises the question of the need to consider aging in the context of social security. The author the author shows the main stages of the humanitarization of social security, the trend of de...
Climate change is affecting food systems globally, with implications for food security, nutrition, and the health of human populations. There are limited data characterizing the current and future con...
The purpose of this study is to compare two methods for remote genetic counseling (telephone and two-way videoconferencing) for patients who are receiving disclosure of their APOE (apolipo...
This research trial studies how well pre-test genetic education and remote genetic counseling works in communicating tumor profiling results to patients with advanced cancer. Web-based gen...
To evaluate the safety and performance of CorPath GRX POP System, in the ReMOTE (location outside hospital) delivery and manipulation of coronary guidewires and stent/balloon catheters, an...
Health-related applications for smartphones represent a new and popular market for consumer oriented products. These applications are generally not considered medical devices and, as such,...
Remote monitoring of implantable cardioverter-defibrillators (ICDs) for patients has led to efficient, safe, and satisfying analysis of their device and cardiac status; resulting in an ove...
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or data structures, especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or so-called computer hackers aiming to compromise stored data.
Observation and aquisition of physical data from a distance by viewing and making measurements from a distance or receiving transmitted data from observations made at distant location.
Various units or machines that operate in combination or in conjunction with a computer but are not physically part of it. Peripheral devices typically display computer data, store data from the computer and return the data to the computer on demand, prepare data for human use, or acquire data from a source and convert it to a form usable by a computer. (Computer Dictionary, 4th ed.)
Consultation via remote telecommunications, generally for the purpose of diagnosis or treatment of a patient at a site remote from the patient or primary physician.
Information application based on a variety of coding methods to minimize the amount of data to be stored, retrieved, or transmitted. Data compression can be applied to various forms of data, such as images and signals. It is used to reduce costs and increase efficiency in the maintenance of large volumes of data.