We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Analysis and Architecture of Clinical Workflow Systems using Agent-Oriented Lifecycle Models

    Healthcare executives are grappling with a climate of great change in the healthcare industry. This is coming from a number of sources. First, there...
    James P. Davis, Raphael Blanco in Intelligent Paradigms for Healthcare Enterprises
    Chapter
  2. Current Status of Computerized Decision Support Systems in Mammography

    Breast cancer is one of the most devastating and deadly diseases for women today. Despite advances in cancer treatment, early mammographic detection...
    Chapter
  3. Computerization of Clinical Guidelines: an Application of Medical Document Processing

    Clinical Guidelines are being developed as a tool to promote Best Practice in Medicine. They are usually defined as “systematically developed...
    Chapter
  4. Case-based Medical Informatics

    The “applied” nature distinguishes applied sciences from theoretical sciences. To emphasize this distinction, we begin with a general, meta-level...
    Stefan V. Pantazi, José F. Arocha, Jochen R. Moehr in Intelligent Paradigms for Healthcare Enterprises
    Chapter
  5. Medical Diagnosis and Prognosis Based on the DNA Microarray Technology

    Immense genomic data have been accumulated through various research activities such as the Human Genome Project. A genome is the entire collection of...
    Y. Fukuoka, H. Inaoka, I. S. Kohane in Intelligent Paradigms for Healthcare Enterprises
    Chapter
  6. Wearable Devices in Healthcare

    The miniaturization of electrical and electronic equipment is certainly not a new phenomenon, and its effects have long been evident in the...
    Constantine Glaros, Dimitrios I. Fotiadis in Intelligent Paradigms for Healthcare Enterprises
    Chapter
  7. Evidence Based Telemedicine

    This chapter focuses on evidence based telemedicine and its various applications. Evidence based medicine is the integration of best research...
    George Anogianakis, Anelia Klisarova, ... Antonia Anogeianaki in Intelligent Paradigms for Healthcare Enterprises
    Chapter
  8. Virtual Communities in Health Care

    A virtual community is a social entity involving several individuals who relate to one another by the use of a specific communication technology that...
    Chapter
  9. Explicit constructions of NMDS self-dual codes

    Near maximum distance separable (NMDS) codes are important in finite geometry and coding theory. Self-dual codes are closely related to...

    Dongchun Han, Hanbin Zhang in Designs, Codes and Cryptography
    Article 12 July 2024
  10. M2AST:MLP-mixer-based adaptive spatial-temporal graph learning for human motion prediction

    Human motion prediction is a challenging task in human-centric computer vision, involving forecasting future poses based on historical sequences....

    Junyi Tang, Simin An, ... ** Chen in Multimedia Systems
    Article 12 July 2024
  11. Simultaneous grading diagnosis of liver fibrosis, inflammation, and steatosis using multimodal quantitative ultrasound and artificial intelligence framework

    Noninvasive, accurate, and simultaneous grading of liver fibrosis, inflammation, and steatosis is valuable for reversing the progression and...

    **ngyue Wei, Yuanyuan Wang, ... Jianwen Luo in Medical & Biological Engineering & Computing
    Article 11 July 2024
  12. Threshold ring signature: generic construction and logarithmic size instantiation

    A ring signature is a variant of normal digital signature and protects the privacy of a specific signer in the sense that a ring signature can be...

    Huizhuo Wang, Yang Tao, Rui Zhang in Cybersecurity
    Article Open access 11 July 2024
  13. Global adaptive histogram feature network for automatic segmentation of infection regions in CT images

    Accurate and timely diagnosis of COVID-like virus is of paramount importance for lifesaving. In this work, deep learning techniques are applied to...

    **nren Min, Yang Liu, ... Mingyang Zhong in Multimedia Systems
    Article 11 July 2024
  14. Why the use of domain-specific modeling in airworthy software requires new methods and how these might look like? (extended version)

    The use of domain-specific modeling (DSM) in safety-critical avionics is rare, even though the ever-increasing complexity of avionics systems makes...

    Vanessa Tietz, Constantin Frey, ... Bjoern Annighoefer in Innovations in Systems and Software Engineering
    Article Open access 10 July 2024
  15. Survey-based analysis of cybersecurity awareness of Turkish seafarers

    In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an...

    Ivar Moen, Aybars Oruc, ... Georgios Kavallieratos in International Journal of Information Security
    Article Open access 10 July 2024
  16. Smart contract vulnerabilities detection with bidirectional encoder representations from transformers and control flow graph

    Up to now, the smart contract vulnerabilities detection methods based on sequence modal data and sequence models have been the most commonly used....

    Peng Su, **gyuan Hu in Multimedia Systems
    Article 10 July 2024
  17. New spence difference sets

    James A. Davis, John Polhill, ... Jordan Webster in Designs, Codes and Cryptography
    Article Open access 10 July 2024
  18. Adaptive context-aware access control for IoT environments leveraging fog computing

    The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from...

    Rudri Kalaria, A. S. M. Kayes, ... Ahmad Salehi Shahraki in International Journal of Information Security
    Article Open access 08 July 2024
  19. Using the ACE framework to enforce access and usage control with notifications of revoked access rights

    The standard ACE framework provides authentication and authorization mechanisms similar to those of the standard OAuth 2.0 framework, but it is...

    Marco Rasori, Andrea Saracino, ... Marco Tiloca in International Journal of Information Security
    Article Open access 08 July 2024
  20. A three-stage quality evaluation method for experience products: taking animation as an example

    The diversity and dynamics of quality index information bring challenges to quality assessment of experience products. This paper proposes a...

    Qianqian Chen, Zhongjun Tang, ... **g Wang in Multimedia Systems
    Article 08 July 2024
Did you find what you were looking for? Share feedback.