Results 31 to 40 of about 66,060 (274)
This study generates high‐fidelity synthetic longitudinal records for a million‐patient diabetes cohort, successfully replicating clinical predictive performance. However, deeper analysis reveals algorithmic biases and trajectory inconsistencies that escape standard quality metrics. These findings challenge current validation norms, demonstrating why a
Francisco Ortuño +5 more
wiley +1 more source
Integrating whole‐bone and regional analyses to understand human scapular growth
Abstract This study investigates ontogenetic changes in human scapular morphology using three‐dimensional geometric morphometrics with whole‐bone and region‐specific analyses. The aim is to evaluate whether the scapula follows a regular developmental pattern and whether its functionally distinct components, the scapular spine (SS) and glenoid fossa ...
Azahara Salazar‐Fernández +3 more
wiley +1 more source
The class imbalance problem negatively impacts learning algorithms’ performance in minority classes which may constitute more severe attacks than the majority ones.
Seyed Mohammad Hadi Mirsadeghi +3 more
doaj +1 more source
Zipper Pattern: An Investigation into Psychotic Criminal Detection Using EEG Signals
Background: Electroencephalography (EEG) signal-based machine learning models are among the most cost-effective methods for information retrieval.
Gulay Tasci +14 more
doaj +1 more source
ABSTRACT Bankruptcy and financial distress commonly precipitate suicidal crises, putting bankruptcy attorneys in potentially difficult situations with clients. This qualitative study explored attorneys' experiences with clients' risk for suicide and attorneys' recommendations for suicide prevention.
John R. Blosnich +4 more
wiley +1 more source
Advancements in detecting Deepfakes: AI algorithms and future prospects − a review
The rise of Deepfake technology in the information age provided significant challenges in ensuring the reliability and authenticity of digital media content.
Laishram Hemanta Singh +2 more
doaj +1 more source
A Systematic Literature Review of Cyber Security Monitoring in Maritime
In recent years, many cyber incidents have occurred in the maritime sector, targeting the information technology (IT) and operational technology (OT) infrastructure.
Risto Vaarandi +4 more
doaj +1 more source
DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications
Both Android application developers and malware authors use sophisticated obfuscation tools to prevent their mobile applications from being repackaged and analyzed.
Haehyun Cho +2 more
doaj +1 more source
Bitcoin forensics: a tutorial [PDF]
Over the past eighteen months, the digital cryptocurrency Bitcoin has experienced significant growth in terms of usage and adoption. It has also been predicted that if this growth continues then it will become an increasingly useful tool for various ...
Hara, Sukhvinder +2 more
core +1 more source
ABSTRACT With the rise of digital technology, adolescent cyberviolence has become a growing global concern in public health and criminal justice. This study used nationally representative data from South Korea (2017–2024) to examine the prevalence of eight types of cyberviolence (i.e., verbal abuse, defamation, stalking, sexual abuse, personal ...
Heng Choon (Oliver) Chan +2 more
wiley +1 more source

