Learn More
BACKGROUND Accurate analysis of CT brain scans is vital for diagnosis and treatment of Traumatic Brain Injuries (TBI). Automatic processing of these CT brain scans could speed up the decision making process, lower the cost of healthcare, and reduce the chance of human error. In this paper, we focus on automatic processing of CT brain images to segment and(More)
BACKGROUND This paper focuses on the creation of a predictive computer-assisted decision making system for traumatic injury using machine learning algorithms. Trauma experts must make several difficult decisions based on a large number of patient attributes, usually in a short period of time. The aim is to compare the existing machine learning methods(More)
Understanding mechanisms of protein flexibility is of great importance to structural biology. The ability to detect similarities between proteins and their patterns is vital in discovering new information about unknown protein functions. A Distance Constraint Model (DCM) provides a means to generate a variety of flexibility measures based on a given protein(More)
Detection of hypovolemia prior to overt hemodynamic decompensation remains an elusive goal in the treatment of critically injured patients in both civilian and combat settings. Monitoring of heart rate variability has been advocated as a potential means to monitor the rapid changes in the physiological state of hemorrhaging patients, with the most popular(More)
Based on the National Vital Statistics Reports 2001, nearly 115,200 lives are cut short annually because of traumatic injuries and many patients who survive traumatic events have to face the future with life-long disabilities that negatively affect them and their families [29]. Moreover, U.S. trauma center reports suggest that the annual death rate, as well(More)
Many organizations transact in large amounts of data often containing personal identifiable information (PII) and various confidential data. Such organizations are bound by state, federal, and international laws to ensure that the confidentiality of both individuals and sensitive data is not compromised. However, during the privacy preserving process, the(More)
As network traffic grows and attacks become more prevalent and complex, we must find creative new ways to enhance intrusion detection systems (IDSes). Recently, researchers have begun to harness both machine learning and cloud computing technology to better identify threats and speed up computation times. This paper explores current research at the(More)