Search results
From LIMSWiki
Jump to navigationJump to search
- Preventing the loss of access to the results of your investment in R&D projects will rely on information technology. That reliance will be built ...projects or provide a source of new products, acting as basic and applied R&D. What is expected out of these labs is the development of new knowledge,218 KB (34,907 words) - 16:00, 29 March 2024
- ...l condition with a minimum achievement limit.<ref>{{Cite web |last=Vaidya, R. |date=03 April 2019 |title=Cyber Security Breaches Survey 2019 |work=GOV.U ...|first3=Wencheng |last4=Valli |first4=Craig |last5=Kebande |first5=Victor R. |date=2021 |title=A Review of Security Standards and Frameworks for IoT-Ba94 KB (12,503 words) - 17:15, 16 March 2023
- ...yes|tracking=yes|description=Pages are added to this category with {{tlx|R protected}}.}} This category contains redirects that have been protected. 'Protected Redirects' are constructed for the purpose of preventing [[LIMSWiki:Vandali3 members (0 subcategories, 0 files) - 23:27, 24 October 2013
- ...outlined above can serve to represent sensitive datasets without divulging protected information. Moreover, these descriptive files can be made available and di ...he same results.”<ref>{{Cite web |last=Bollen, K.; Cacioppo, J.T.; Kaplan. R.M. et al. |date=May 2015 |title=Social, Behavioral, and Economic Sciences P65 KB (9,385 words) - 16:33, 29 April 2024
- ...all critical considerations of using, storing, and transferring regulated, protected data in the cloud, especially for laboratories. ...abis users associated with three dispensary clients in the U.S. Given that protected health information (PHI) was included in the exposed data, serious privacy60 KB (7,949 words) - 20:10, 16 August 2023
- ...ot Sales Spur Data Privacy Concerns |work=Bloomberg BNA |author=Stoller, D.R. |date=18 November 2018 |archivedate=02 January 2019 |accessdate=08 July 20 ...liance/ |title=Cannabis and privacy compliance: Is your health information protected? |author=Drolet, M. |work=Cannabis Business Executive |date=15 May 2017 |ac9 KB (1,230 words) - 18:10, 20 December 2023
- ...sks due to their different security requirements and infrastructures to be protected. For instance, financial and healthcare organizations have [[Regulatory com ...journal |last=Koumenides |first=Christos L. |last2=Shadbolt |first2=Nigel R. |date=2012 |title=Combining link and content-based information in a Bayesi136 KB (18,556 words) - 18:40, 6 October 2021
- ...|first2=Rongwei |last3=Bulger |first3=Eileen |last4=Hedges |first4=Jerris R. |last5=Mann |first5=N. Clay |last6=Wright |first6=Dagan A. |last7=Lehrfeld ...roup |last2=Karstoft |first2=Karen-Inge |last3=Galatzer-Levy |first3=Isaac R |last4=Statnikov |first4=Alexander |last5=Li |first5=Zhiguo |last6=Shalev |76 KB (10,420 words) - 23:03, 7 June 2022
- ...ef><ref>{{Cite journal |last=Carey |first=T. S. |last2=Halladay |first2=J. R. |last3=Donahue |first3=K. E. |last4=Cykert |first4=S. |date=2015-09-01 |ti ...)20:9<867::AID-SMJ55>3.0.CO;2-6}}</ref><ref>{{Cite journal |last=Ashkenas, R. |year=2015 |title=There is a difference between cooperation and collaborat62 KB (7,916 words) - 23:58, 26 December 2023
- #How are the current cloud-based eHealth systems being protected? ...ealth Care: A Comprehensive Survey |journal=IEEE Access |author=Islam, S.M.R.; Kwak, D.; Kabir, H. et al. |volume=3 |pages=678–708 |year=2015 |doi=10.60 KB (8,281 words) - 20:49, 19 September 2021
- ...l=Progress in the Chemistry of Organic Natural Products |author=Mechoulam, R.; Gaoni, Y. |volume=25 |pages=175–213 |year=1967 |doi=10.1007/978-3-7091- ...etry |journal=Clinical Chemistry and Laboratory Medicine |author=Pacifici, R.; Marchei, E.; Salvatore, F. et al. |volume=55 |issue=10 |pages=1555–156345 KB (6,273 words) - 17:09, 22 June 2020
- ...ning from SARS: Preparing for the Next Disease Outbreak |author=Denison, M.R. |publisher=Institute of Medicine |pages=137–72 |year=2004 |isbn=97803091 ...t Types of Clinical Specimens |journal=JAMA |author=Wang, W.; Xu, Y.; Gao, R. et al. |year=2020 |doi=10.1001/jama.2020.3786 |pmid=32159775 |pmc=PMC7066540 KB (5,527 words) - 18:55, 7 September 2021
- ...|journal=Bioinformatics |author=Hosny, A.; Vera-Licona, P.; Laubenbacher, R. et al. |volume=32 |issue=15 |pages=2396–8 |year=2016 |doi=10.1093/bioinf ...An introduction to commercial sequence analysis software |author=Smith, D.R. |volume=16 |issue=4 |page=700-9 |year=2015 |doi=10.1093/bib/bbu030 |pmid=297 KB (13,006 words) - 00:53, 7 January 2020
- ...ler |first5=Matthew A. |last6=Liu |first6=Mei |last7=Hogan |first7=William R. |last8=Brochhausen |first8=Mathias |last9=Lemas |first9=Dominick J. |date= ...1}}</ref> (Note that while there are other types of restricted and privacy-protected data, this section will focus largely on clinical data and research objects44 KB (6,212 words) - 22:10, 9 May 2024
- ...= Dufresnes, Christophe; Jan, Catherine; Bienert, Friederike; Goudet, Jérôme; Fumagalli, Luca ...bis |title=Handbook of Cannabis |author=de Meijer, E.P.M. |editor=Pertwee, R. |publisher=Oxford University Press |year=2014 |pages=89–110 |isbn=97801947 KB (6,409 words) - 00:22, 3 July 2019
- ...ues |author=Acevedo, L.G.; Iniguez, A.L.; Holster, H.L.; Zhang, X.; Green, R.; Farnham, P.J. |volume=43 |issue=6 |pages=791-797 |year=2007 |pmid=1825125 ...eutsch, E.W.; Ball, C.A.; Berman, J.J.; Bova, G.S.; Brazma, A.; Bumgarner, R.E.; et al. |volume=26 |issue=3 |pages=305-312 |year=2008 |doi=10.1038/nbt1356 KB (7,883 words) - 19:57, 19 September 2021
- ...rnet-of-Things |author=del Peral-Rosado, J.A.; Seco-Granados, G.; Raulefs, R. et al. |editor=Witrisal, K.; Antón-Haro, C. |publisher=COST |date=April 2 <math id="M1">P_{r}\left( d \right) = P_{r}\left( d_{0} \right) - 10\eta\log_{10}\;\left( \frac{d}{d_{0}} \right) + w<85 KB (11,018 words) - 18:48, 6 October 2021
- |editors = Lupica, Carl R. ...emp and marijuana types of plants.<ref name=":0">{{Cite web |last=Johnson, R. |date=22 March 2019 |title=Defining Hemp: A Fact Sheet |url=https://www.ev142 KB (19,594 words) - 22:55, 27 December 2023
- ...title=DNA could store all of the world's data in one room |author=Service, R.F. |work=Science |date=02 March 2017 |doi=10.1126/science.aal0852}}</ref><r ...hes |journal=JAMA Internal Medicine |author=Bai, G.; Jiang, J.X.; Flasher, R. |volume=1777 |issue=6 |pages=878-880 |year=2017 |doi=10.1001/jamainternmed47 KB (6,188 words) - 18:25, 18 June 2019
- ...eenth International AAAI Conference on Web and Social Media |author=Abebe, R.; Hill, S.; Vaughan, J.W. et al. |volume=13 |issue=1 |pages=3–14 |year=20 ...13th International Computer Engineering Conference |author=Abd El-Ghafar, R.M.; Gheith, M.H.; El-Bastawissy, A. et al. |pages=224-230 |year=2017 |doi=168 KB (9,594 words) - 18:38, 22 December 2020