We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Analysis and Architecture of Clinical Workflow Systems using Agent-Oriented Lifecycle Models

    Healthcare executives are grappling with a climate of great change in the healthcare industry. This is coming from a number of sources. First, there...
    James P. Davis, Raphael Blanco in Intelligent Paradigms for Healthcare Enterprises
    Chapter
  2. Current Status of Computerized Decision Support Systems in Mammography

    Breast cancer is one of the most devastating and deadly diseases for women today. Despite advances in cancer treatment, early mammographic detection...
    Chapter
  3. Computerization of Clinical Guidelines: an Application of Medical Document Processing

    Clinical Guidelines are being developed as a tool to promote Best Practice in Medicine. They are usually defined as “systematically developed...
    Chapter
  4. Case-based Medical Informatics

    The “applied” nature distinguishes applied sciences from theoretical sciences. To emphasize this distinction, we begin with a general, meta-level...
    Stefan V. Pantazi, José F. Arocha, Jochen R. Moehr in Intelligent Paradigms for Healthcare Enterprises
    Chapter
  5. Medical Diagnosis and Prognosis Based on the DNA Microarray Technology

    Immense genomic data have been accumulated through various research activities such as the Human Genome Project. A genome is the entire collection of...
    Y. Fukuoka, H. Inaoka, I. S. Kohane in Intelligent Paradigms for Healthcare Enterprises
    Chapter
  6. Wearable Devices in Healthcare

    The miniaturization of electrical and electronic equipment is certainly not a new phenomenon, and its effects have long been evident in the...
    Constantine Glaros, Dimitrios I. Fotiadis in Intelligent Paradigms for Healthcare Enterprises
    Chapter
  7. Evidence Based Telemedicine

    This chapter focuses on evidence based telemedicine and its various applications. Evidence based medicine is the integration of best research...
    George Anogianakis, Anelia Klisarova, ... Antonia Anogeianaki in Intelligent Paradigms for Healthcare Enterprises
    Chapter
  8. Virtual Communities in Health Care

    A virtual community is a social entity involving several individuals who relate to one another by the use of a specific communication technology that...
    Chapter
  9. Simultaneous grading diagnosis of liver fibrosis, inflammation, and steatosis using multimodal quantitative ultrasound and artificial intelligence framework

    Noninvasive, accurate, and simultaneous grading of liver fibrosis, inflammation, and steatosis is valuable for reversing the progression and...

    **ngyue Wei, Yuanyuan Wang, ... Jianwen Luo in Medical & Biological Engineering & Computing
    Article 11 July 2024
  10. Threshold ring signature: generic construction and logarithmic size instantiation

    A ring signature is a variant of normal digital signature and protects the privacy of a specific signer in the sense that a ring signature can be...

    Huizhuo Wang, Yang Tao, Rui Zhang in Cybersecurity
    Article Open access 11 July 2024
  11. Why the use of domain-specific modeling in airworthy software requires new methods and how these might look like? (extended version)

    The use of domain-specific modeling (DSM) in safety-critical avionics is rare, even though the ever-increasing complexity of avionics systems makes...

    Vanessa Tietz, Constantin Frey, ... Bjoern Annighoefer in Innovations in Systems and Software Engineering
    Article Open access 10 July 2024
  12. Detecting mistakes in a domain model: a comparison of three approaches

    Domain models are a fundamental part of software engineering, thus it is important for every software engineer to know the principles of domain...

    Prabhsimran Singh, Younes Boubekeur, Gunter Mussbacher in Innovations in Systems and Software Engineering
    Article 08 July 2024
  13. ConKeD: multiview contrastive descriptor learning for keypoint-based retinal image registration

    Abstract

    Retinal image registration is of utmost importance due to its wide applications in medical practice. In this context, we propose ConKeD, a...

    David Rivas-Villar, Álvaro S. Hervella, ... Jorge Novo in Medical & Biological Engineering & Computing
    Article Open access 06 July 2024
  14. Enhanced deep leaning model for detection and grading of lumbar disc herniation from MRI

    Lumbar disc herniation is one of the most prevalent orthopedic issues in clinical practice. The lumbar spine is a crucial joint for movement and...

    **anyin Duan, Hanlin **ong, ... Haotian Yu in Medical & Biological Engineering & Computing
    Article 05 July 2024
  15. FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption

    Unprotected gradient exchange in federated learning (FL) systems may lead to gradient leakage-related attacks. CKKS is a promising approximate...

    Yao Pan, Zheng Chao, ... Wang Liming in Cybersecurity
    Article Open access 04 July 2024
  16. Qualitative reasoning and cyber-physical systems: abstraction, modeling, and optimized simulation

    Complex systems modeling and simulation are critical in many industrial and research fields, specifically to predict, prove, verify, and understand...

    Baptiste Gueuziec, Jean-Pierre Gallois, Frédéric Boulanger in Innovations in Systems and Software Engineering
    Article 04 July 2024
  17. DNN-BP: a novel framework for cuffless blood pressure measurement from optimal PPG features using deep learning model

    Abstract

    Continuous blood pressure (BP) provides essential information for monitoring one’s health condition. However, BP is currently monitored using...

    S. M. Taslim Uddin Raju, Safin Ahmed Dipto, ... M. M. A. Hashem in Medical & Biological Engineering & Computing
    Article 04 July 2024
  18. A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud

    With the popularity of the media cloud computing industry, individuals and organizations outsource image computation and storage to the media cloud...

    Miao Tian, Yushu Zhang, ... Wenying Wen in Cybersecurity
    Article Open access 03 July 2024
  19. Improved homomorphic evaluation for hash function based on TFHE

    Homomorphic evaluation of hash functions offers a solution to the challenge of data integrity authentication in the context of homomorphic...

    Benqiang Wei, **anhui Lu in Cybersecurity
    Article Open access 02 July 2024
  20. A method for visualizing urban road events using distributed acoustic sensing

    This study presents the construction of an urban underground sensing system using distributed acoustic sensing (DAS) technology, which utilizes the...

    Shitong Hou, Yaojie Li, ... **g Wu in Urban Lifeline
    Article Open access 01 July 2024
Did you find what you were looking for? Share feedback.