There is great interest to develop artificial intelligence-based protein-ligand binding affinity models due to their immense applications in drug discovery. In this paper, PointNet and PointTransformer, two pointwise multi-layer perceptrons have been...
Mathematical biosciences and engineering : MBE
Jan 14, 2022
The industrial internet depends on the development of cloud computing, artificial intelligence, and big data analysis. Intelligent fusion is dependent on the architecture and security features of the industrial internet. Firstly, the paper studies th...
PURPOSE OF REVIEW: This article aims to discuss the current state of resources enabling the democratization of artificial intelligence (AI) in ophthalmology.
Zhongguo yi liao qi xie za zhi = Chinese journal of medical instrumentation
Jul 30, 2021
In clinical medicine, patient drainage monitoring and early warning have received extensive attention from the clinical medical community since they reflect the real-time status of patients. Firstly, this study points out the shortcomings of current ...
Journal of the American College of Radiology : JACR
Jan 1, 2020
Radiologists today are under increasing work pressure. We surveyed radiologists in the United States across practice settings, and the overwhelming majority reported an increased workload. Artificial intelligence (AI), which includes machine learning...
Classification of the privacy preserved medical data is the domain of the researchers as it stirs the importance behind hiding the sensitive data from the third-party authenticator. Ensuring the privacy of the medical records and using the disease pr...
PURPOSE: We have created a cloud-based machine learning system (CLOBNET) that is an open-source, lean infrastructure for electronic health record (EHR) data integration and is capable of extract, transform, and load (ETL) processing. CLOBNET enables ...
Mathematical biosciences and engineering : MBE
Mar 26, 2019
The promotion of cloud computing makes the virtual machine (VM) increasingly a target of malware attacks in cybersecurity such as those by kernel rootkits. Memory forensic, which observes the malicious tracks from the memory aspect, is a useful way f...