Search
Search Results
-
Analysis and Architecture of Clinical Workflow Systems using Agent-Oriented Lifecycle Models
Healthcare executives are grappling with a climate of great change in the healthcare industry. This is coming from a number of sources. First, there... -
Current Status of Computerized Decision Support Systems in Mammography
Breast cancer is one of the most devastating and deadly diseases for women today. Despite advances in cancer treatment, early mammographic detection... -
Computerization of Clinical Guidelines: an Application of Medical Document Processing
Clinical Guidelines are being developed as a tool to promote Best Practice in Medicine. They are usually defined as “systematically developed... -
Case-based Medical Informatics
The “applied” nature distinguishes applied sciences from theoretical sciences. To emphasize this distinction, we begin with a general, meta-level... -
Medical Diagnosis and Prognosis Based on the DNA Microarray Technology
Immense genomic data have been accumulated through various research activities such as the Human Genome Project. A genome is the entire collection of... -
Wearable Devices in Healthcare
The miniaturization of electrical and electronic equipment is certainly not a new phenomenon, and its effects have long been evident in the... -
Evidence Based Telemedicine
This chapter focuses on evidence based telemedicine and its various applications. Evidence based medicine is the integration of best research... -
Virtual Communities in Health Care
A virtual community is a social entity involving several individuals who relate to one another by the use of a specific communication technology that... -
ASDMG: business topic clustering-based architecture smell detection for microservice granularity
Microservices architecture smells can significantly affect the quality of microservices due to poor design decisions, especially the granularity...
-
Adaptive context-aware access control for IoT environments leveraging fog computing
The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from...
-
Using the ACE framework to enforce access and usage control with notifications of revoked access rights
The standard ACE framework provides authentication and authorization mechanisms similar to those of the standard OAuth 2.0 framework, but it is...
-
A three-stage quality evaluation method for experience products: taking animation as an example
The diversity and dynamics of quality index information bring challenges to quality assessment of experience products. This paper proposes a...
-
An efficient quantum oblivious transfer protocol
Oblivious transfer (OT) is a significant two party privacy preserving cryptographic primitive. OT involves a sender having several pieces of...
-
Detecting mistakes in a domain model: a comparison of three approaches
Domain models are a fundamental part of software engineering, thus it is important for every software engineer to know the principles of domain...
-
Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system
Software can be vulnerable to various types of interference. The production of cyber threat intelligence for closed source software requires...
-
Multi-strategy improved sparrow search algorithm based on first definition of ellipse and group co-evolutionary mechanism for engineering optimization problems
The Sparrow Search Algorithm (SSA) is recognized for its rapid convergence and precision in engineering optimization, yet it faces the challenge of...
-
An improved weighted mean of vectors optimizer for multi-threshold image segmentation: case study of breast cancer
Women are commonly diagnosed with breast cancer (BC), and early detection can significantly increase the cure rate. This study suggested a...
-
Accurate entropy modeling in learned image compression with joint enchanced SwinT and CNN
Recently, learned image compression (LIC) has shown significant research potential. Most existing LIC methods are CNN-based or transformer-based or...
-
A hybrid multi-objective algorithm based on slime mould algorithm and sine cosine algorithm for overlap** community detection in social networks
In recent years, extensive studies have been carried out in community detection for social network analysis because it plays a crucial role in social...
-
Hyper-relational knowledge graph neural network for next POI recommendation
With the advancement of mobile technology, Point of Interest (POI) recommendation systems in Location-based Social Networks (LBSN) have brought...