Search
Search Results
-
Analysis and Architecture of Clinical Workflow Systems using Agent-Oriented Lifecycle Models
Healthcare executives are grappling with a climate of great change in the healthcare industry. This is coming from a number of sources. First, there... -
Current Status of Computerized Decision Support Systems in Mammography
Breast cancer is one of the most devastating and deadly diseases for women today. Despite advances in cancer treatment, early mammographic detection... -
Computerization of Clinical Guidelines: an Application of Medical Document Processing
Clinical Guidelines are being developed as a tool to promote Best Practice in Medicine. They are usually defined as “systematically developed... -
Case-based Medical Informatics
The “applied” nature distinguishes applied sciences from theoretical sciences. To emphasize this distinction, we begin with a general, meta-level... -
Medical Diagnosis and Prognosis Based on the DNA Microarray Technology
Immense genomic data have been accumulated through various research activities such as the Human Genome Project. A genome is the entire collection of... -
Wearable Devices in Healthcare
The miniaturization of electrical and electronic equipment is certainly not a new phenomenon, and its effects have long been evident in the... -
Evidence Based Telemedicine
This chapter focuses on evidence based telemedicine and its various applications. Evidence based medicine is the integration of best research... -
Virtual Communities in Health Care
A virtual community is a social entity involving several individuals who relate to one another by the use of a specific communication technology that... -
Explicit constructions of NMDS self-dual codes
Near maximum distance separable (NMDS) codes are important in finite geometry and coding theory. Self-dual codes are closely related to...
-
M2AST:MLP-mixer-based adaptive spatial-temporal graph learning for human motion prediction
Human motion prediction is a challenging task in human-centric computer vision, involving forecasting future poses based on historical sequences....
-
Simultaneous grading diagnosis of liver fibrosis, inflammation, and steatosis using multimodal quantitative ultrasound and artificial intelligence framework
Noninvasive, accurate, and simultaneous grading of liver fibrosis, inflammation, and steatosis is valuable for reversing the progression and...
-
Threshold ring signature: generic construction and logarithmic size instantiation
A ring signature is a variant of normal digital signature and protects the privacy of a specific signer in the sense that a ring signature can be...
-
Global adaptive histogram feature network for automatic segmentation of infection regions in CT images
Accurate and timely diagnosis of COVID-like virus is of paramount importance for lifesaving. In this work, deep learning techniques are applied to...
-
Why the use of domain-specific modeling in airworthy software requires new methods and how these might look like? (extended version)
The use of domain-specific modeling (DSM) in safety-critical avionics is rare, even though the ever-increasing complexity of avionics systems makes...
-
Survey-based analysis of cybersecurity awareness of Turkish seafarers
In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an...
-
Smart contract vulnerabilities detection with bidirectional encoder representations from transformers and control flow graph
Up to now, the smart contract vulnerabilities detection methods based on sequence modal data and sequence models have been the most commonly used....
-
-
Adaptive context-aware access control for IoT environments leveraging fog computing
The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from...
-
Using the ACE framework to enforce access and usage control with notifications of revoked access rights
The standard ACE framework provides authentication and authorization mechanisms similar to those of the standard OAuth 2.0 framework, but it is...
-
A three-stage quality evaluation method for experience products: taking animation as an example
The diversity and dynamics of quality index information bring challenges to quality assessment of experience products. This paper proposes a...