![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
6,621 Result(s)
-
Article
A simple projection method to correlate the principal mechanical direction with the principal microstructural direction of human osteoporotic femoral heads
The mechanics of the trabecular bone is related to its structure; this work aimed to propose a simple projection method to clarify the correlation between the principal mechanical direction (PMD) and the princ...
-
Article
Simultaneous grading diagnosis of liver fibrosis, inflammation, and steatosis using multimodal quantitative ultrasound and artificial intelligence framework
Noninvasive, accurate, and simultaneous grading of liver fibrosis, inflammation, and steatosis is valuable for reversing the progression and improving the prognosis quality of chronic liver diseases (CLDs). In...
-
Article
Open AccessThreshold ring signature: generic construction and logarithmic size instantiation
A ring signature is a variant of normal digital signature and protects the privacy of a specific signer in the sense that a ring signature can be verified, but the signer’s identity can only be traced to a lim...
-
Article
Open AccessFedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption
Unprotected gradient exchange in federated learning (FL) systems may lead to gradient leakage-related attacks. CKKS is a promising approximate homomorphic encryption scheme to protect gradients, owing to its u...
-
Article
Constantly optimized mean teacher for semi-supervised 3D MRI image segmentation
The mean teacher model and its variants, as important methods in semi-supervised learning, have demonstrated promising performance in magnetic resonance imaging (MRI) data segmentation. However, the superior p...
-
Article
LGDNet: local feature coupling global representations network for pulmonary nodules detection
Detection of suspicious pulmonary nodules from lung CT scans is a crucial task in computer-aided diagnosis (CAD) systems. In recent years, various deep learning-based approaches have been proposed and demonstr...
-
Article
Open AccessCustom orthotic design by integrating 3D scanning and subject-specific FE modelling workflow
The finite element (FE) foot model can help estimate pathomechanics and improve the customized foot orthoses design. However, the procedure of develo** FE models can be time-consuming and costly. This study ...
-
Article
The role of eye movement signals in non-invasive brain-computer interface ty** system
Brain-Computer Interfaces (BCIs) have shown great potential in providing communication and control for individuals with severe motor disabilities. However, traditional BCIs that rely on electroencephalography ...
-
Article
Intelligent alert system for predicting invasive mechanical ventilation needs via noninvasive parameters: employing an integrated machine learning method with integration of multicenter databases
The use of invasive mechanical ventilation (IMV) is crucial in rescuing patients with respiratory dysfunction. Accurately predicting the demand for IMV is vital for clinical decision-making. However, current t...
-
Article
Soft-tissue sound-speed-aware ultrasound-CT registration method for computer-assisted orthopedic surgery
Ultrasound (US) has been introduced to computer-assisted orthopedic surgery for bone registration owing to its advantages of nonionizing radiation, low cost, and noninvasiveness. However, the registration accu...
-
Article
Abnormal trial-to-trial variability in P300 time-varying directed eeg network of schizophrenia
Cognitive disturbance in identifying, processing, and responding to salient or novel stimuli are typical attributes of schizophrenia (SCH), and P300 has been proven to serve as a reliable psychosis endophenoty...
-
Article
Open AccessEnhancing fairness of trading environment: discovering overlap** spammer groups with dynamic co-review graph optimization
Within the thriving e-commerce landscape, some unscrupulous merchants hire spammer groups to post misleading reviews or ratings, aiming to manipulate public perception and disrupt fair market competition. This...
-
Article
Open AccessIn-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium
During the standardisation process of post-quantum cryptography, NIST encourages research on side-channel analysis for candidate schemes. As the recommended lattice signature scheme, CRYSTALS-Dilithium, when i...
-
Article
MSNSegNet: attention-based multi-shape nuclei instance segmentation in histopathology images
In clinical research, the segmentation of irregularly shaped nuclei, particularly in mesenchymal areas like fibroblasts, is crucial yet often neglected. These irregular nuclei are significant for assessing tis...
-
Article
Structure-aware independently trained multi-scale registration network for cardiac images
Image registration is a primary task in various medical image analysis applications. However, cardiac image registration is difficult due to the large non-rigid deformation of the heart and the complex anatomi...
-
Article
COPD stage detection: leveraging the auto-metric graph neural network with inspiratory and expiratory chest CT images
Chronic obstructive pulmonary disease (COPD) is a common lung disease that can lead to restricted airflow and respiratory problems, causing a significant health, economic, and social burden. Detecting the COPD...
-
Article
Recent advances in the precision control strategy of artificial pancreas
The scientific diagnosis and treatment of patients with diabetes require frequent blood glucose testing and insulin delivery to normoglycemia. Therefore, an artificial pancreas with a continuous blood glucose ...
-
Article
CT-Net: an interpretable CNN-Transformer fusion network for fNIRS classification
Functional near-infrared spectroscopy (fNIRS), an optical neuroimaging technique, has been widely used in the field of brain activity recognition and brain-computer interface. Existing works have proposed deep...
-
Article
Open AccessKey derivable signature and its application in blockchain stealth address
Stealth address protocol (SAP) is widely used in blockchain to achieve anonymity. In this paper, we formalize a key derivable signature scheme (KDS) to capture the functionality and security requirements of SA...
-
Article
Analysis of non-physiological shear stress-induced red blood cell trauma across different clinical support conditions of the blood pump
Systematic research into device-induced red blood cell (RBC) damage beyond hemolysis, including correlations between hemolysis and RBC-derived extracellular vesicles, remains limited. This study investigated n...