We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Analysis and Architecture of Clinical Workflow Systems using Agent-Oriented Lifecycle Models

    Healthcare executives are grappling with a climate of great change in the healthcare industry. This is coming from a number of sources. First, there...
    James P. Davis, Raphael Blanco in Intelligent Paradigms for Healthcare Enterprises
    Chapter
  2. Current Status of Computerized Decision Support Systems in Mammography

    Breast cancer is one of the most devastating and deadly diseases for women today. Despite advances in cancer treatment, early mammographic detection...
    Chapter
  3. Computerization of Clinical Guidelines: an Application of Medical Document Processing

    Clinical Guidelines are being developed as a tool to promote Best Practice in Medicine. They are usually defined as “systematically developed...
    Chapter
  4. Case-based Medical Informatics

    The “applied” nature distinguishes applied sciences from theoretical sciences. To emphasize this distinction, we begin with a general, meta-level...
    Stefan V. Pantazi, José F. Arocha, Jochen R. Moehr in Intelligent Paradigms for Healthcare Enterprises
    Chapter
  5. Medical Diagnosis and Prognosis Based on the DNA Microarray Technology

    Immense genomic data have been accumulated through various research activities such as the Human Genome Project. A genome is the entire collection of...
    Y. Fukuoka, H. Inaoka, I. S. Kohane in Intelligent Paradigms for Healthcare Enterprises
    Chapter
  6. Wearable Devices in Healthcare

    The miniaturization of electrical and electronic equipment is certainly not a new phenomenon, and its effects have long been evident in the...
    Constantine Glaros, Dimitrios I. Fotiadis in Intelligent Paradigms for Healthcare Enterprises
    Chapter
  7. Evidence Based Telemedicine

    This chapter focuses on evidence based telemedicine and its various applications. Evidence based medicine is the integration of best research...
    George Anogianakis, Anelia Klisarova, ... Antonia Anogeianaki in Intelligent Paradigms for Healthcare Enterprises
    Chapter
  8. Virtual Communities in Health Care

    A virtual community is a social entity involving several individuals who relate to one another by the use of a specific communication technology that...
    Chapter
  9. ASDMG: business topic clustering-based architecture smell detection for microservice granularity

    Microservices architecture smells can significantly affect the quality of microservices due to poor design decisions, especially the granularity...

    Sixuan Wang, Baoqing **, ... Shuhan Cheng in Software Quality Journal
    Article 08 July 2024
  10. Adaptive context-aware access control for IoT environments leveraging fog computing

    The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from...

    Rudri Kalaria, A. S. M. Kayes, ... Ahmad Salehi Shahraki in International Journal of Information Security
    Article Open access 08 July 2024
  11. Using the ACE framework to enforce access and usage control with notifications of revoked access rights

    The standard ACE framework provides authentication and authorization mechanisms similar to those of the standard OAuth 2.0 framework, but it is...

    Marco Rasori, Andrea Saracino, ... Marco Tiloca in International Journal of Information Security
    Article Open access 08 July 2024
  12. A three-stage quality evaluation method for experience products: taking animation as an example

    The diversity and dynamics of quality index information bring challenges to quality assessment of experience products. This paper proposes a...

    Qianqian Chen, Zhongjun Tang, ... **g Wang in Multimedia Systems
    Article 08 July 2024
  13. An efficient quantum oblivious transfer protocol

    Oblivious transfer (OT) is a significant two party privacy preserving cryptographic primitive. OT involves a sender having several pieces of...

    Sushmita Sarkar, Vikas Srivastava, ... Sihem Mesnager in Cluster Computing
    Article 08 July 2024
  14. Detecting mistakes in a domain model: a comparison of three approaches

    Domain models are a fundamental part of software engineering, thus it is important for every software engineer to know the principles of domain...

    Prabhsimran Singh, Younes Boubekeur, Gunter Mussbacher in Innovations in Systems and Software Engineering
    Article 08 July 2024
  15. Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system

    Software can be vulnerable to various types of interference. The production of cyber threat intelligence for closed source software requires...

    Süleyman Muhammed Arıkan, Aynur Koçak, Mustafa Alkan in International Journal of Information Security
    Article Open access 08 July 2024
  16. Multi-strategy improved sparrow search algorithm based on first definition of ellipse and group co-evolutionary mechanism for engineering optimization problems

    The Sparrow Search Algorithm (SSA) is recognized for its rapid convergence and precision in engineering optimization, yet it faces the challenge of...

    Gang Chen, Hu Sun in Cluster Computing
    Article 07 July 2024
  17. An improved weighted mean of vectors optimizer for multi-threshold image segmentation: case study of breast cancer

    Women are commonly diagnosed with breast cancer (BC), and early detection can significantly increase the cure rate. This study suggested a...

    Shuhui Hao, Changcheng Huang, ... Guoxi Liang in Cluster Computing
    Article 07 July 2024
  18. Accurate entropy modeling in learned image compression with joint enchanced SwinT and CNN

    Recently, learned image compression (LIC) has shown significant research potential. Most existing LIC methods are CNN-based or transformer-based or...

    Dongjian Yang, **aopeng Fan, ... Debin Zhao in Multimedia Systems
    Article 07 July 2024
  19. A hybrid multi-objective algorithm based on slime mould algorithm and sine cosine algorithm for overlap** community detection in social networks

    In recent years, extensive studies have been carried out in community detection for social network analysis because it plays a crucial role in social...

    Ahmad Heydariyan, Farhad Soleimanian Gharehchopogh, Mohammad Reza Ebrahimi Dishabi in Cluster Computing
    Article 06 July 2024
  20. Hyper-relational knowledge graph neural network for next POI recommendation

    With the advancement of mobile technology, Point of Interest (POI) recommendation systems in Location-based Social Networks (LBSN) have brought...

    Jixiao Zhang, Yongkang Li, ... Xuan Song in World Wide Web
    Article 06 July 2024
Did you find what you were looking for? Share feedback.