Results 61 to 70 of about 1,098,399 (202)
Representative Names of Computing Degree Programs Worldwide [PDF]
Through the auspices of ACM and with support from the IEEE Computer Society, a task group charged to prepare the IT2017 report conducted an online international survey of computing faculty members about their undergraduate degree programs in computing ...
Clear, Alison+5 more
core +2 more sources
Abstract The Mammography Quality Standards Act (MQSA) sets quality standards for displays used to interpret mammography images. With the shift to digital mammography and the widespread use of remote reading workstations (RWS), updated quality management (QM) programs are needed to ensure consistent image presentation and accurate interpretation.
Rebecca Milman+12 more
wiley +1 more source
A Framework for Private Matrix Analysis [PDF]
We study private matrix analysis in the sliding window model where only the last $W$ updates to matrices are considered useful for analysis. We give first efficient $o(W)$ space differentially private algorithms for spectral approximation, principal component analysis, and linear regression.
arxiv
Efficient and Robust Optical Character Recognition Algorithm for Signature Recognition [PDF]
With the technology development over the past decades, it became necessary to provide secure recognition systems. The Optical Character Recognition (OCR) can be considered as one of the most useful software to offer security. It works on the principal of
Elleithy, Khaled M.+2 more
core
Abstract Recurrent imaging is an essential tool for patient care but with an attendant dose from radiation exposure. Recurrent imaging has been the subject of increasing scrutiny and debate based largely on the risk from increasing cumulative doses. However, the accountability for and actions with recurrent imaging as a special component in the general
Donald P. Frush+8 more
wiley +1 more source
Secure Information Flow Connections [PDF]
Denning's lattice model provided secure information flow analyses with an intuitive mathematical foundation: the lattice ordering determines permitted flows. We examine how this framework may be extended to support the flow of information between autonomous organisations, each employing possibly quite different security lattices and information flow ...
arxiv
ABSTRACT Objective Music interventions have been shown to have beneficial effects on hemodynamic parameters, pain, and anxiety in various medical settings. However, music interventions in the setting of acute stroke have not been studied. The objective of this trial was to perform a pilot feasibility study of music interventions in the setting of acute
Jeffrey J. Fletcher+7 more
wiley +1 more source
Objective Posttraumatic osteoarthritis (PTOA) accounts for nearly 12% of osteoarthritis incidences and often occurs after anterior cruciate ligament (ACL) tear. Ensuring the uptake of preventive treatments for PTOA requires that investigators and clinicians understand factors influencing patients to seek preventive therapies.
Lily M. Waddell+10 more
wiley +1 more source
Multilayer ferrite inductor prototypes are fabricated by cofiring metallized tapes of NiCuZn ferrite and glass‐ceramic composite. Prerequisites for a predictive component simulation are discussed. An automated data‐pipeline stores and semantically links the experimental data acquired in the study according to a domain ontology.
Björn Mieller+8 more
wiley +1 more source
An Efficient Support Vector Machine Algorithm Based Network Outlier Detection System
With the increase of cyber-attacks and security threats in the recent decade, it is necessary to safeguard sensitive data and provide robust protection to information systems and computer networks.
Omar Alghushairy+6 more
doaj +1 more source