existing data
Recently Published Documents


TOTAL DOCUMENTS

1974
(FIVE YEARS 729)

H-INDEX

62
(FIVE YEARS 10)

Author(s):  
Tarasvi Lakum ◽  
Barige Thirumala Rao

<p><span>In this paper, we are proposing a mutual query data sharing protocol (MQDS) to overcome the encryption or decryption time limitations of exiting protocols like Boneh, rivest shamir adleman (RSA), Multi-bit transposed ring learning parity with noise (TRLPN), ring learning parity with noise (Ring-LPN) cryptosystem, key-Ordered decisional learning parity with noise (kO-DLPN), and KD_CS protocol’s. Titled scheme is to provide the security for the authenticated user data among the distributed physical users and devices. The proposed data sharing protocol is designed to resist the chosen-ciphertext attack (CCA) under the hardness solution for the query shared-strong diffie-hellman (SDH) problem. The evaluation of proposed work with the existing data sharing protocols in computational and communication overhead through their response time is evaluated.</span></p>


Author(s):  
Jessie R. Baldwin ◽  
Jean-Baptiste Pingault ◽  
Tabea Schoeler ◽  
Hannah M. Sallis ◽  
Marcus R. Munafò

AbstractAnalysis of secondary data sources (such as cohort studies, survey data, and administrative records) has the potential to provide answers to science and society’s most pressing questions. However, researcher biases can lead to questionable research practices in secondary data analysis, which can distort the evidence base. While pre-registration can help to protect against researcher biases, it presents challenges for secondary data analysis. In this article, we describe these challenges and propose novel solutions and alternative approaches. Proposed solutions include approaches to (1) address bias linked to prior knowledge of the data, (2) enable pre-registration of non-hypothesis-driven research, (3) help ensure that pre-registered analyses will be appropriate for the data, and (4) address difficulties arising from reduced analytic flexibility in pre-registration. For each solution, we provide guidance on implementation for researchers and data guardians. The adoption of these practices can help to protect against researcher bias in secondary data analysis, to improve the robustness of research based on existing data.


2022 ◽  
Vol 2 (1) ◽  
pp. 39-44
Author(s):  
Nurhasanah Nasution

Background: Incomplete filling of medical record files for inpatients at Dr. Reksodiwiryo hospital medical records will be describe health services and the quality of medical record services. Medical record quality services include the completeness of medical record files, accuracy in providing diagnosis and diagnosis codes, as well as speed in providing service information. The requirements for quality medical records must be accurate, complete, reliable, valid, timely, usable, common, comparable, guaranteed, and easy.Methods: This research method is a descriptive with a retrospective approach or looking at existing data. This study was carried out in September 2021. The population was 70 files cases of inpatient digestive surgery. Samples were taken from 27 files of inpatients with appendicitis cases.Results: From the research that has been done, the highest percentage of incomplete identification components is found on the gender item about 81.48%, the highest percentage of incomplete important report components is obtained on the medical resume and informed consent items about 11.1%. The highest percentage of incomplete authentication components was obtained in the nursing degree about 96.3%. The highest percentage of the components of the recording method was obtained by 59.3%, there are several blank sections about 16 files. The percentage of incomplete diagnostic codes and procedures is 100%  Conclusions: the researcher suggested that the hospital can have an Operational Standart on filling out the completeness of medical records files


Autism ◽  
2022 ◽  
pp. 136236132110536
Author(s):  
Stacey D Elkhatib Smidt ◽  
Nalaka Gooneratne ◽  
Edward S Brodkin ◽  
Maja Bucan ◽  
Jonathan A Mitchell

Emerging evidence suggests that physical activity may be associated with improved sleep in autistic children. We aimed to determine whether physical activity associated with sufficient sleep duration in children and whether this association was modified by reported autism spectrum disorder (ASD) status. We analyzed existing data of children 6–17 years old whose caregivers completed the 2018 National Survey of Children’s Health (nonautistic N = 20,845; ASD N = 681). Logistic regression determined whether physical activity (days active in the past week) associated with sufficient sleep duration. Physical activity-by-ASD interactions were included to determine whether the association differed for autistic children. Physical activity-by-ASD-by-sex and physical activity-by-ASD-by-age-group interactions were also modeled. Physical activity was associated with increased odds of sufficient sleep duration (e.g. 0 days vs 4–6 days: odds ratio (OR) = 1.85; 95% confidence interval (CI): 1.48–2.32). We did not observe an overall statistically significant interaction between physical activity and reported ASD status; however, the positive association between physical activity and sufficient sleep duration was weaker in autistic children, especially those with more severe ASD, female autistic children, and autistic children ages 6–12 years old. In conclusion, physical activity is a promising approach to improve sufficient sleep duration but with nuanced findings in autistic children. Lay abstract Higher levels of physical activity may be associated with improved sleep in children, but this relationship is still being determined, especially in autistic children. In this study, we used existing data from the 2018 National Survey of Children’s Health. Caregivers of children 6–17 years old, including caregivers of autistic children, completed a questionnaire that included questions about physical activity (days active in the past week) and sleep duration. We then determined if children were obtaining the recommended hours of sleep for their age (i.e. sufficient sleep). We found that higher physical activity levels were associated with sufficient sleep duration, but this finding was weaker in autistic children. In particular, this association was not observed in autistic children with more severe autism spectrum disorder, female autistic children, and autistic children 6–12 years old. In conclusion, physical activity is a promising approach to help children obtain sufficient sleep duration. However, more personalized approaches to improving sleep may be needed for certain groups of autistic children.


JUSTISI ◽  
2022 ◽  
Vol 8 (1) ◽  
pp. 15
Author(s):  
Sri Wahyu Ningsih ◽  
Winda Fitri

With the development of the times, fintech companies in Indonesia are increasingly popular and are also increasingly sought after by many people. One of the developments in fintech is the emergence of Sharia fintech. This study aims to analyze fintech crimes that occur from the perspective of jinayah law and to analyze relevant dispute resolution for fintech crimes from the perspective of jinayah law. In this study, the author uses a normative legal research method that uses qualitative analysis, namely by explaining the existing data with words or statements not with numbers. Sharia fintech has a difference with conventional fintech, namely sharia fintech is carried out in the contract process between business owners and investors. The emergence of sharia fintech provides convenience for the community to carry out a credit process using sharia principles and principles. But there is also a negative side, namely sharia fintech crimes such as fraud, fraud. Based on the results of the study, it shows that this sharia fintech crime when viewed from the perspective of jinayah law is included in the ta'zir crime, which if there is a violation the law enforcement is in accordance with the existing legislation in the fairest manner and carried out indiscriminately and discipline that actually carries out sanki ta'zir for sharia fintech crimes, which in essence contain benefits for human life both in the world and in the hereafter.


2022 ◽  
Vol 12 (1) ◽  
pp. 35
Author(s):  
Carlos M. Laborde ◽  
Leyre Larzabal ◽  
Álvaro González-Cantero ◽  
Patricia Castro-Santos ◽  
Roberto Díaz-Peña

Psoriatic arthritis (PsA) is a common type of inflammatory arthritis found in up to 40% of patients with psoriasis. Although early diagnosis is important for reducing the risk of irreversible structural damage, there are no adequate screening tools for this purpose, and there are no clear markers of predisposition to the disease. Much evidence indicates that PsA disorder is complex and heterogeneous, where genetic and environmental factors converge to trigger inflammatory events and the development of the disease. Nevertheless, the etiologic events that underlie PsA are complex and not completely understood. In this review, we describe the existing data in PsA in order to highlight the need for further research in this disease to progress in the knowledge of its pathobiology and to obtain early diagnosis tools for these patients.


2022 ◽  
Vol 12 (1) ◽  
pp. 1-14
Author(s):  
Parmeet Kaur ◽  
Sanya Deshmukh ◽  
Pranjal Apoorva ◽  
Simar Batra

Humongous volumes of data are being generated every minute by individual users as well as organizations. This data can be turned into a valuable asset only if it is analyzed, interpreted and used for improving processes or for benefiting users. One such source that is contributing huge data every year is a large number of web-based crowd-funding projects. These projects and related campaigns help ventures to raise money by acquiring small amounts of funding from different small organizations and people. The funds raised for crowdfunded projects and hence, their success depends on multiple elements of the project. The current work predicts the success of a new venture by analysis and visualization of the existing data and determining the parameters on which success of a project depends. The prediction of a project’s outcome is performed by application of machine learning algorithms on crowd-funding data stored in the NoSQL database, MongoDB. The results of this work can prove beneficial for the investors to have an estimate about the success of a project before investing in it.


Author(s):  
Carmen Păunescu ◽  
Katri-Liis Lepik ◽  
Nicholas Spencer

AbstractThe ambition for this book is to demonstrate how higher education institutions (HEIs) can respond to societal challenges, support positive social change and influence the international public discourse on social innovation. It attempts to answer the question, ‘how does the present higher education system, in different countries, promote social innovation and create social change and impact’. In answering this question, the book identifies factors driving success as well as obstacles. The book offers suggestions about how the present system can be improved both based on existing data and international literature on social innovation in higher education. The book presents a selected set of peer reviewed chapters presenting different perspectives against which relevant actors can identify and analyse social innovation in HEIs.


eLife ◽  
2021 ◽  
Vol 10 ◽  
Author(s):  
Bin Wang ◽  
Olga K Dudko

Rapid and precise neuronal communication is enabled through a highly synchronous release of signaling molecules neurotransmitters within just milliseconds of the action potential. Yet neurotransmitter release lacks a theoretical framework that is both phenomenologically accurate and mechanistically realistic. Here, we present an analytic theory of the action-potential-triggered neurotransmitter release at the chemical synapse. The theory is demonstrated to be in detailed quantitative agreement with existing data on a wide variety of synapses from electrophysiological recordings in vivo and fluorescence experiments in vitro. Despite up to ten orders of magnitude of variation in the release rates among the synapses, the theory reveals that synaptic transmission obeys a simple, universal scaling law, which we confirm through a collapse of the data from strikingly diverse synapses onto a single master curve. This universality is complemented by the ability of the theory to readily extract, through a fit to the data, the kinetic and energetic parameters that uniquely identify each synapse. The theory provides a means to detect cooperativity among the SNARE complexes that mediate vesicle fusion and reveals such cooperativity in several existing data sets. The theory is further applied to establish connections between molecular constituents of synapses and synaptic function. The theory allows competing hypotheses of short-term plasticity to be tested and identifies the regimes where particular mechanisms of synaptic facilitation dominate or, conversely, fail to account for the existing data for the paired-pulse ratio. The derived trade-off relation between the transmission rate and fidelity shows how transmission failure can be controlled by changing the microscopic properties of the vesicle pool and SNARE complexes. The established condition for the maximal synaptic efficacy reveals that no fine tuning is needed for certain synapses to maintain near-optimal transmission. We discuss the limitations of the theory and propose possible routes to extend it. These results provide a quantitative basis for the notion that the molecular-level properties of synapses are crucial determinants of the computational and information-processing functions in synaptic transmission.


Sign in / Sign up

Export Citation Format

Share Document