Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
Subclassification of lung adenocarcinoma through comprehensive multi-omics data to benefit survival outcomes
Computational Biology and Chemistry (COBC), Volume 112, Issue Chttps://doi.org/10.1016/j.compbiolchem.2024.108150Abstract ObjectivesLung adenocarcinoma (LUAD) is the most common subtype of non-small cell lung cancer. Understanding the molecular mechanisms underlying tumor progression is of great clinical significance. This study aims to identify novel molecular ...
Graphical AbstractDisplay Omitted
Highlights- Feature Selection from Multi-Omics Data: Employed a feature-selection process integrating multi-omics data from TCGA.
- Machine Learning Integration: Utilized a range of machine learning classifiers to classify LUAD subtypes.
- ...
- research-articleOctober 2024
Brain Function Analysis Of Insomnia Disorder Based On Hypergraph Combined With Deep Learning
SPML '24: Proceedings of the 2024 7th International Conference on Signal Processing and Machine LearningPages 216–224https://doi.org/10.1145/3686490.3686522Insomnia (ID) is a chronic sleep disorder with a high prevalence and a heavy socioeconomic burden. Despite extensive research, the relationship between ID and brain activity is complex and the exact etiology is difficult to determine. In this study, we ...
- research-articleMay 2023
Stable electrospray signal on a microfabricated glass chip with three-dimensional open edge and tiered depth geometries
- Alexander J. Schmidt,
- Konstantin O. Zamuruyev,
- Michael K. LeVasseur,
- Stephanie Fung,
- Ilya M. Anishchenko,
- Nicholas J. Kenyon,
- Cristina E. Davis
AbstractThis paper presents the microfabrication and performance of a three-dimensional electrospray ionization (ESI) emitter tip made from glass, which achieves stable current signals important for chemical analysis. Our novel ...
Graphical abstractDisplay Omitted
Highlights- Fundamental performance of electrospray ionization was demonstrated with a glass microfluidic chip.
- research-articleMarch 2023
Detecting evidence of invasive fungal infections in cytology and histopathology reports enriched with concept-level annotations
- Vlada Rozova,
- Anna Khanina,
- Jasmine C. Teng,
- Joanne S.K. Teh,
- Leon J. Worth,
- Monica A. Slavin,
- Karin A. Thursky,
- Karin Verspoor
Journal of Biomedical Informatics (JOBI), Volume 139, Issue Chttps://doi.org/10.1016/j.jbi.2023.104293Graphical abstractDisplay Omitted
AbstractInvasive fungal infections (IFIs) are particularly dangerous to high-risk patients with haematological malignancies and are responsible for excessive mortality and delays in cancer therapy. Surveillance of IFI in clinical settings offers an ...
- research-articleDecember 2022
A multi-feature deep learning system to enhance glaucoma severity diagnosis with high accuracy and fast speed
- Ying Xue,
- Jiazhu Zhu,
- Xiaoling Huang,
- Xiaobin Xu,
- Xiaojing Li,
- Yameng Zheng,
- Zhijing Zhu,
- Kai Jin,
- Juan Ye,
- Wei Gong,
- Ke Si
Journal of Biomedical Informatics (JOBI), Volume 136, Issue Chttps://doi.org/10.1016/j.jbi.2022.104233Graphical abstractDisplay Omitted
Highlights- A multi-feature deep learning system for classifying glaucoma severity levels to aid the clinical management.
- The algorithm of three-phase framework for glaucoma severity diagnosis was superior to the direct four classification deep ...
Glaucoma is the leading cause of irreversible blindness, and the early detection and timely treatment are essential for glaucoma management. However, due to the interindividual variability in the characteristics of glaucoma onset, a single ...
-
- research-articleSeptember 2022
Graph neural network modelling as a potentially effective method for predicting and analyzing procedures based on patients' diagnoses
Artificial Intelligence in Medicine (AIIM), Volume 131, Issue Chttps://doi.org/10.1016/j.artmed.2022.102359Abstract BackgroundCurrently, the healthcare sector strives to improve the quality of patient care management and to enhance/increase its economic performance/efficiency (e.g., cost-effectiveness) by healthcare providers. The data ...
Highlights
- Graph Neural Networks applied to the analysis of ICD ontologies in patient populations
- research-articleAugust 2022
Simulation of intra-saccular devices for pre-operative device size selection: Method and validation for sizing and porosity simulation
Computers in Biology and Medicine (CBIM), Volume 147, Issue Chttps://doi.org/10.1016/j.compbiomed.2022.105744AbstractIntra-saccular devices (ID) are novel braided devices used for complex intracranial aneurysms treatment. Treatment success is associated with correct device size selection. A technique that predicts the ID size within the aneurysm before ...
Highlights- Method for sizing and porosity simulation of intra-saccular devices.
- Simulation allows assess, before intervention, size, position and porosity of different devices.
- Validation showed that simulation can accurately show the outcome ...
- discussionMay 2022
Supporting rural public health practice to address local-level social determinants of health across Northwest states: Development of an interactive visualization dashboard
- Uba Backonja,
- Seungeun Park,
- Amae Kurre,
- Hayley Yudelman,
- Sam Heindel,
- Melinda Schultz,
- Greg Whitman,
- Anne M. Turner,
- Natasza T. Marchak,
- Betty Bekemeier
Journal of Biomedical Informatics (JOBI), Volume 129, Issue Chttps://doi.org/10.1016/j.jbi.2022.104051Graphical abstractDisplay Omitted
Highlights- SHARE-NW: Solutions in Health Analytics for Rural Equity across the Northwest is a dashboard designed with and for rural health practitioners.
Rural local health departments (LHDs) lack adequate capacity and funding to effectively make data-driven decisions to support their communities that face greater health disparities compared to urban counterparts. ...
- research-articleAugust 2019
Employee’s ubiquitous learning engagement: Impact of innovativeness-oriented learning system design factors and the mediating role of imagery
Telematics and Informatics (TINF), Volume 41, Issue CPages 156–167https://doi.org/10.1016/j.tele.2019.04.010Highlights- We propose a research model to investigate essential factors affecting employee ubiquitous-learning engagement (U-LE).
- The impact of domain-specific innovativeness factors on U-LE is explored.
- Interface design factors are ...
This study investigates the essential factors involved in employees’ ubiquitous-learning engagement (U-LE). In this study, a research model was proposed based on learning engagement (LE) and narrative transportation theory, focusing on the impact ...
- articleApril 2018
Dynamic ID authentication scheme using chaotic map
Dynamic ID authentication protects user's identity from being revealed by any outsider during remote login processes. In independent multi-server environments, a user might have to login different servers for accessing various resources. Password based ...
- rfcMay 2016
RFC 7843: Port Control Protocol (PCP) Third-Party ID Option
This document describes a new Port Control Protocol (PCP) option called the THIRD_PARTY_ID option. It is designed to be used together with the THIRD_PARTY option specified in RFC 6887.
The THIRD_PARTY_ID option serves to identify a third party in ...
- articleNovember 2014
Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update
International Journal of Communication Systems (IJOCS), Volume 27, Issue 11Pages 3430–3440https://doi.org/10.1002/dac.2552People are always concerned about privacy. Techniques tracing specific user activities may damage privacy seriously. To protect user privacy, a dynamic-identity-based remote user authentication scheme will be proposed in this manuscript. This scheme ...
- ArticleSeptember 2014
Novel Multibiosensors and Biomedical Application
AMS '14: Proceedings of the 2014 8th Asia Modelling SymposiumPages 235–240https://doi.org/10.1109/AMS.2014.53Annually, a lot of patients in Canadian hospitals are contaminated with antibiotic-resistant bacteria, resulting in abundant amounts of money spent on the health-care system. Even though most bacteria are risk-free to healthy individuals, the symptoms ...
- ArticleSeptember 2014
Design and Implementation of Heterogeneous Internet of Things Identifier Recognition System
WISA '14: Proceedings of the 2014 11th Web Information System and Application ConferencePages 8–11https://doi.org/10.1109/WISA.2014.10In Internet of Things (IoT), both physical things (such as devices, gateways and commodities etc.) and virtual things (like multimedia content and application software) are assigned unique IoT identifiers (IoT ID), which are similar to the domain name ...
- articleSeptember 2014
Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme
Wireless Personal Communications: An International Journal (WPCO), Volume 78, Issue 2Pages 1487–1494https://doi.org/10.1007/s11277-014-1829-5When it comes to key agreement protocol, mutual authentication is regarded as a crucial security requirement. Yet, conventional authenticated key agreement using static ID cannot provide user anonymity if the communication content is compromised. A ...
- articleJanuary 2014
An ID-based approach to the caching and distribution of peer-to-peer, proxy-based video content
Journal of Network and Computer Applications (JNCA), Volume 37Pages 293–314https://doi.org/10.1016/j.jnca.2013.03.005The viewing of streamed video content has become second nature these days for many Internet users. With such copious amounts of data being transferred between hosts involved in this streaming, it is prudent to establish some method of effectively ...
- ArticleNovember 2012
Flapping RADIUS Accounting Server Behavior with Toggle-Timer
BWCCA '12: Proceedings of the 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and ApplicationsPages 558–561https://doi.org/10.1109/BWCCA.2012.98RADIUS Accounting Server is used for receiving an accounting request and returning a response to a client. When the client is configured to use RADIUS Accounting, it will generate accounting requests towards accounting server. In case of accounting ...
- ArticleOctober 2010
An Optimization of Rekeying Scheme for Secure Multicast
WISM '10: Proceedings of the 2010 International Conference on Web Information Systems and Mining - Volume 02Pages 66–70https://doi.org/10.1109/WISM.2010.109The security management of group key is essential to secure multicast. This paper analyzes the advantages and disadvantages of a key management scheme for secure multicast, and proposes a new rekeying scheme based on it. By adding one-way hash function, ...
- ArticleApril 2010
Research on ID Resolution of Speech Communication in VANET
CMC '10: Proceedings of the 2010 International Conference on Communications and Mobile Computing - Volume 03Pages 532–535https://doi.org/10.1109/CMC.2010.189Speech communication is an important application in vehicular ad hoc network (VANET). The ID of vehicles plays a role on building speech communication. However, there are no servers like DNS in VANET. Through flooding messages including a node’s ...
- research-articleFebruary 2010
Goal oriented ranking scheme
ICWET '10: Proceedings of the International Conference and Workshop on Emerging Trends in TechnologyPages 505–508https://doi.org/10.1145/1741906.1742019Evolutionary algorithms (EAs) are always be a good choice to solve multi-objective problems (MLPs). EA use ranking schemes to solve MLP's. Most of ranking schemes use only objective values to rank the solution where as some use the condition in which ...