Search results for "Cryptography"

showing 10 items of 657 documents

Statistical Explorations and Univariate Timeseries Analysis on COVID-19 Datasets to Understand the Trend of Disease Spreading and Death

2020

&ldquo

0301 basic medicinetransmission ratepopulationSevere Acute Respiratory Syndromemedicine.disease_causelcsh:Chemical technologyBiochemistryRNNDisease OutbreaksAnalytical Chemistry0302 clinical medicinePandemiclcsh:TP1-1185030212 general & internal medicineInstrumentationVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Coronaviruskeraseducation.field_of_studypublic healthartificial intelligenceAtomic and Molecular Physics and OpticsRegressionmachine learningGeographySevere acute respiratory syndrome-related coronavirusstatisticsMiddle East Respiratory Syndrome Coronaviruscommunity diseaseregressionCoronavirus InfectionsLSTMPneumonia ViralPopulationWorld Health OrganizationArticleBetacoronavirusspread factor03 medical and health sciencesCode (cryptography)medicineAnimalsHumansElectrical and Electronic EngineeringeducationPandemicsmeasurable sensor dataalgorithmSARS-CoV-2ICDUnivariatedeep learningOutbreakCOVID-19medicine.diseasehypothesis testpython030104 developmental biologycorrelationCatsMiddle East respiratory syndromeCattleDemographySensors
researchProduct

Guidelines Have a Key Role in Driving HCV Elimination by Advocating for Simple HCV Care Pathways.

2021

The availability of pangenotypic direct-acting antivirals for treatment of hepatitis C (HCV) has provided an opportunity to simplify patient pathways. Recent clinical practice guidelines have recognised the need for simplification to ensure that elimination of HCV as a public health concern remains a priority. Despite the move towards simplified treatment algorithms, there remains some complexity in the recommendations for the management of genotype 3 patients with compensated cirrhosis. In an era where additional clinical trial data are not anticipated, clinical guidance should consider experience gained in real-world settings. Although more experience is required for some pangenotypic the…

030213 general clinical medicinemedicine.medical_specialtyCoronavirus disease 2019 (COVID-19)EliminationGuidelineGuidelinesGlobal HealthAntiviral AgentsPatient pathwaySimplification03 medical and health sciences0302 clinical medicinePandemicGlobal healthMedicineHumansPharmacology (medical)Disease EradicationIntensive care medicineAntiviral Agentbusiness.industrySARS-CoV-2Public healthCOVID-19General MedicineHepatitis CHcv eliminationClinical trialCritical Pathway030220 oncology & carcinogenesisCommunicable Disease ControlPractice Guidelines as TopicKey (cryptography)Critical PathwaysCommentarybusinessHumanAdvances in therapy
researchProduct

Towards identifying drug side effects from social media using active learning and crowd sourcing.

2019

Motivation Social media is a largely untapped source of information on side effects of drugs. Twitter in particular is widely used to report on everyday events and personal ailments. However, labeling this noisy data is a difficult problem because labeled training data is sparse and automatic labeling is error-prone. Crowd sourcing can help in such a scenario to obtain more reliable labels, but is expensive in comparison because workers have to be paid. To remedy this, semi-supervised active learning may reduce the number of labeled data needed and focus the manual labeling process on important information. Results We extracted data from Twitter using the public API. We subsequently use Ama…

0303 health sciencesFocus (computing)Information retrievalDrug-Related Side Effects and Adverse ReactionsProcess (engineering)business.industryActive learning (machine learning)Computer scienceComputational BiologyCrowdsourcing03 medical and health sciences0302 clinical medicineProblem-based learningCode (cryptography)CrowdsourcingHumansSocial media030212 general & internal medicinebusinessBaseline (configuration management)Social Media030304 developmental biologyPacific Symposium on Biocomputing. Pacific Symposium on Biocomputing
researchProduct

Sort and beer: Everything you wanted to know about the sorting task but did not dare to ask

2011

author cannot archive publisher's version/PDF; International audience; In industries, the sensory characteristics of products are key points to control. The method commonly used to characterize and describe products is the conventional profile. This very efficient method requires a lot of time to train assessors and to teach them how to quantify the sensory characteristics of interest. Over the last few years, other faster and less restricting methods have been developed, such as free choice profile, flash profile, projective mapping or sorting tasks. Among these methods, the sorting task has recently become quite popular in sensory evaluation because of its simplicity: it only requires ass…

030309 nutrition & dieteticsComputer sciencemedia_common.quotation_subjectControl (management)NovicesStability (learning theory)Sensory systemMachine learningcomputer.software_genreTask (project management)03 medical and health sciences0404 agricultural biotechnologysortSimplicitySorting taskmedia_common0303 health sciencesNutrition and Dieteticsbusiness.industrySortingBeer04 agricultural and veterinary sciences040401 food scienceKey (cryptography)Artificial intelligencebusinesscomputer[SDV.AEN]Life Sciences [q-bio]/Food and NutritionFood ScienceExperts
researchProduct

Ensuring Diverse User Experiences and Accessibility While Developing the TeSLA e-Assessment System

2019

The TeSLA project, with its new, innovative approaches for e-assessment, offers a great possibility for increasing the educational equality and making higher education studies available for all. It has been estimated that 10–15% of students in higher education institutions have some disabilities or special educational needs. At online universities or in online programmes, the number is even higher. These numbers emphasise the importance of the universal design for learning as a leading principle while developing the digital learning environments and e-assessment procedures. In this chapter, we describe the key elements of ensuring the accessibility of the TeSLA e-assessment system during th…

030506 rehabilitationKnowledge managementHigher educationkoulutusteknologiaoppiminenComputer sciencearviointimenetelmätstudent with special educational needs and disabilities (SEND student)luottamuksellisuus03 medical and health sciencesTeSLA ProjectvammaisuusUser experience designerityisopetusverkko-opiskeluuser experienceetäopetusComputingMilieux_COMPUTERSANDEDUCATIONerityiskasvatusverkkoarviointiTeSLA-projektiDigital learninge-assessmentetäopiskeluspecial educational needskäytettävyysbusiness.industry4. Education05 social sciences050301 educationUniversal Design for LearningUsabilityaccessibilityusabilityE-assessmente-arviointidisabilitysaavutettavuusKey (cryptography)Special educational needskäyttäjäkokemus0305 other medical sciencebusiness0503 educationarviointi
researchProduct

Acceptability of the e-authentication in higher education studies: views of students with special educational needs and disabilities

2021

AbstractTrust-based e-assessment systems are increasingly important in the digital age for both academic institutions and students, including students with special educational needs and disabilities (SEND). Recent literature indicates a growing number of studies about e-authentication and authorship verification for quality assurance with more flexible modes of assessment. Yet understanding the acceptability of e-authentication systems among SEND students is underexplored. This study examines SEND students’ views about the use of e-authentication systems, including perceived advantages and disadvantages of new technology-enhanced assessment. This study aims to shed light on this area by exa…

030506 rehabilitationPersonal dataeducación superiorSpecial educationaccesibilidadAcceptabilitymedia_commonlcsh:LC8-6691lcsh:T58.5-58.64lcsh:Information technology4. Education05 social scienceseducació superiordades personals050301 educatione-AuthenticationAccessibilityAuthentication (law)acceptabilitatComputer Science ApplicationssaavutettavuusStudents with special educational needs and disabilitiesaccessibilitat0305 other medical sciencePsychologyResearch Articleautenticación electrónicaEducation HigherHigher educationmedia_common.quotation_subjectCheatingInternet privacyEducationerityisopiskelijat03 medical and health sciencesOriginalityaceptabilidadEnsenyament universitariHigher educationsähköinen tunnistaminendatos personaleslcsh:Special aspects of educationbusiness.industryEducational technologyestudiantes con necesidades educativas especiales y discapacidadesautenticació electrònicahenkilötiedotkorkeakouluopiskeluKey (cryptography)Enseñanza universitariaComputerized adaptive testingbusiness0503 educationestudiants amb necessitats educatives especials i discapacitats
researchProduct

Evolutionary ethics and adaptive atheism

2020

In Evolution Science and Ethics in the Third Millennium (2018), whose key arguments are summarized in the target article above, Cliquet and Avramov offer an exacting and extensive analysis of the e...

05 social sciencesKey (cryptography)050109 social psychology0501 psychology and cognitive sciencesExperimental and Cognitive PsychologySociologyAtheismEvolutionary ethics050105 experimental psychologyEpistemologyReligion, Brain & Behavior
researchProduct

Optimizing Query Perturbations to Enhance Shape Retrieval

2020

3D Shape retrieval algorithms use shape descriptors to identify shapes in a database that are the most similar to a given key shape, called the query. Many shape descriptors are known but none is perfect. Therefore, the common approach in building 3D Shape retrieval tools is to combine several descriptors with some fusion rule. This article proposes an orthogonal approach. The query is improved with a Genetic Algorithm. The latter makes evolve a population of perturbed copies of the query, called clones. The best clone is the closest to its closest shapes in the database, for a given shape descriptor. Experimental results show that improving the query also improves the precision and complet…

050101 languages & linguisticsComputer scienceInformationSystems_INFORMATIONSTORAGEANDRETRIEVALPopulationComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION02 engineering and technology[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]Search engineCompleteness (order theory)Genetic algorithm0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciences[INFO]Computer Science [cs]educationMassively parallelComputingMilieux_MISCELLANEOUSThesaurus (information retrieval)education.field_of_studyCloning (programming)business.industry05 social sciencesPattern recognitionKey (cryptography)020201 artificial intelligence & image processingArtificial intelligencebusiness
researchProduct

India’s Turn to Rights-Based Legislation (2004–2014): A Critical Review of the Literature

2018

This article surveys the academic literature on rights-based legislation and critically discusses key findings and arguments that emerge from this literature. I conduct this survey and discussion in light of a wider understanding of the political economy of Indian democracy as resilient but limited in terms of substantial forms of redistribution and recognition in favour of subaltern groups. This contradiction has arguably become especially pronounced in the context of neoliberalisation, where, despite the active participation of the poor in electoral democracy, socioeconomic inequality has reached dramatic heights, and I discuss rights-based legislation as a response to this. In conclusio…

050204 development studiesmedia_common.quotation_subject05 social sciencesLegislationGeneral Medicine050601 international relationsDemocracy0506 political sciencePolitical science0502 economics and businessKey (cryptography)General Earth and Planetary SciencesGeneral Environmental ScienceLaw and economicsmedia_commonSocial Change
researchProduct

Bank Loan Loss Accounting and Its Contracting Effects: The New Expected Loss Models

2019

As a result of the recent financial crisis, several key institutions urged the IASB and the FASB to re-evaluate their models for loan loss accounting and use more forward-looking information. The paper examines the principal features of the new expected loss approach, taking into account the tensions between accounting and prudential objectives with respect to credit losses. We discuss the rationales for the change introduced by IFRS 9 and explore the differences between the IASB and the FASB models. Based on the notions of accounting conservatism and earnings management, we discuss the potential consequences of the new models. While both the FASB and the IASB model are more conservative th…

050208 financeIFRS 9business.industry05 social sciencesAccounting050201 accountingConservatismBusiness modelPrincipal (commercial law)Earnings managementLoanAccounting0502 economics and businessFinancial crisisKey (cryptography)EconomicsbusinessExpected lossFinanceSSRN Electronic Journal
researchProduct