We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 61-80 of 10,000 results
  1. Intelligent alert system for predicting invasive mechanical ventilation needs via noninvasive parameters: employing an integrated machine learning method with integration of multicenter databases

    The use of invasive mechanical ventilation (IMV) is crucial in rescuing patients with respiratory dysfunction. Accurately predicting the demand for...

    Guang Zhang, Qingyan **e, ... Chen Su in Medical & Biological Engineering & Computing
    Article 11 June 2024
  2. Influence of framing coil orientation and its shape on the hemodynamics of a basilar aneurysm model

    Abstract

    Aneurysms are bulges of an artery, which require clinical management solutions. Due to the inherent advantages, endovascular coil filling is...

    Nisanth Kumar Panneerselvam, B. J. Sudhir, ... B.S.V. Patnaik in Medical & Biological Engineering & Computing
    Article 10 June 2024
  3. Integrating online partial pair programming and socially shared metacognitive regulation for the improvement of students’ learning

    Many universities around the world were forced to lock down and students had to continue their learning in online environments in response to the...

    Chia-Wen Tsai, Michael Yu-Ching Lin, ... Wen-Yu Chen in Universal Access in the Information Society
    Article 09 June 2024
  4. Machine learning models’ assessment: trust and performance

    Abstract

    The common black box nature of machine learning models is an obstacle to their application in health care context. Their widespread...

    S. Sousa, S. Paredes, ... L. Gonçalves in Medical & Biological Engineering & Computing
    Article Open access 08 June 2024
  5. Self-Sovereign Identity Model: Ethics and Legal Principles

    The emergence of Self-Sovereign Identity (SSI) as a new digital identity paradigm has gained significant attention due to its potential to...

    Luca Mattei, Francesca Morpurgo, ... Tetiana Vasylieva in Digital Society
    Article 07 June 2024
  6. Evaluation of geosynthetic encased columns in Zambian heterogenous soils

    The development of Zambia has brought increased large-scale infrastructure construction that has necessitated the need for improved foundation...

    Ada Farai Shaba, Goodson Masheka in Urban Lifeline
    Article Open access 07 June 2024
  7. Layer-selective deep representation to improve esophageal cancer classification

    Abstract

    Even though artificial intelligence and machine learning have demonstrated remarkable performances in medical image computing, their...

    Luis A. Souza Jr., Leandro A. Passos, ... Christoph Palm in Medical & Biological Engineering & Computing
    Article 07 June 2024
  8. Soft-tissue sound-speed-aware ultrasound-CT registration method for computer-assisted orthopedic surgery

    Ultrasound (US) has been introduced to computer-assisted orthopedic surgery for bone registration owing to its advantages of nonionizing radiation,...

    Chuanba Liu, Wenshuo Wang, ... Yimin Song in Medical & Biological Engineering & Computing
    Article 07 June 2024
  9. The Adoption of smart health services by older adults in retirement communities: analysis with the technology acceptance model (TAM)

    Currently, an increasing number of elderly people are choosing to live in elderly care communities, where they have access to smart health services....

    Yongming Li, Yiming Ma, ... Wenjia Hong in Universal Access in the Information Society
    Article 07 June 2024
  10. Automatic text classification of prostate cancer malignancy scores in radiology reports using NLP models

    Abstract

    This paper presents the implementation of two automated text classification systems for prostate cancer findings based on the PI-RADS...

    Jaime Collado-Montañez, Pilar López-Úbeda, ... M. Teresa Martín-Valdivia in Medical & Biological Engineering & Computing
    Article Open access 07 June 2024
  11. Preparation of surgical meshes using self-regulating technology based on reaction-diffusion processes

    Abstract

    While reaction-diffusion processes are utilized in multiple scientific fields, these phenomena have seen limited practical application in the...

    Péter Polyák, Katalin Fodorné Vadász, ... Judit E. Puskas in Medical & Biological Engineering & Computing
    Article Open access 05 June 2024
  12. CommanderUAP: a practical and transferable universal adversarial attacks on speech recognition models

    Most of the adversarial attacks against speech recognition systems focus on specific adversarial perturbations, which are generated by adversaries...

    Zheng Sun, **xiao Zhao, ... Lei Ju in Cybersecurity
    Article Open access 05 June 2024
  13. Abnormal trial-to-trial variability in P300 time-varying directed eeg network of schizophrenia

    Cognitive disturbance in identifying, processing, and responding to salient or novel stimuli are typical attributes of schizophrenia (SCH), and P300...

    Chanlin Yi, Fali Li, ... Wentian Dong in Medical & Biological Engineering & Computing
    Article 05 June 2024
  14. Optimized attention-induced multihead convolutional neural network with efficientnetv2-fostered melanoma classification using dermoscopic images

    Abstract

    Melanoma is an uncommon and dangerous type of skin cancer. Dermoscopic imaging aids skilled dermatologists in detection, yet the nuances...

    M. Maheswari, Mohamed Uvaze Ahamed Ayoobkhan, ... T. R. Vijaya Lakshmi in Medical & Biological Engineering & Computing
    Article 04 June 2024
  15. Enhancing fairness of trading environment: discovering overlap** spammer groups with dynamic co-review graph optimization

    Within the thriving e-commerce landscape, some unscrupulous merchants hire spammer groups to post misleading reviews or ratings, aiming to manipulate...

    Chaoqun Wang, Ning Li, ... Zhen Wang in Cybersecurity
    Article Open access 04 June 2024
  16. In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium

    During the standardisation process of post-quantum cryptography, NIST encourages research on side-channel analysis for candidate schemes. As the...

    Huaxin Wang, Yiwen Gao, ... Yongbin Zhou in Cybersecurity
    Article Open access 03 June 2024
  17. Session-independent subject-adaptive mental imagery BCI using selective filter-bank adaptive Riemannian features

    Abstract

    The brain-computer interfaces (BCIs) facilitate the users to exploit information encoded in neural signals, specifically electroencephalogram...

    Jayasandhya Meenakshinathan, Vinay Gupta, ... Tushar Sandhan in Medical & Biological Engineering & Computing
    Article 03 June 2024
  18. Atomic cross-chain swap based on private key exchange

    Atomic Cross-Chain Swap (ACCS) is one important topic in cryptocurrency, where users can securely and trustlessly exchange assets between two...

    Zeshuo Zhu, Rui Zhang, Yang Tao in Cybersecurity
    Article Open access 02 June 2024
  19. Effect of trabecular architectures on the mechanical response in osteoporotic and healthy human bone

    Research at the mesoscale bone trabeculae arrangement yields intriguing results that, due to their clinical resolution, can be applied in clinical...

    Chiara Bregoli, Carlo Alberto Biffi, ... Federica Buccino in Medical & Biological Engineering & Computing
    Article Open access 01 June 2024
Did you find what you were looking for? Share feedback.