algorithm

Development of the Children With Disabilities Algorithm

There are no validated claims-based algorithms for identifying children with disabilities (CWD) to facilitate larger-scale studies of care quality for CWD.

This study develops the CWD algorithm, a claims-based algorithm for identifying diagnostic codes with a ≥75% chance of indicating CWD, and triangulates the algorithm against parent report and physician chart abstraction. (Read the full article)




algorithm

Healthcare Algorithms Are Biased, and the Results Can Be Deadly

Deep-learning algorithms suffer from a fundamental problem: They can adopt unwanted biases from the data on which they're trained. In healthcare, this can lead to bad diagnoses and care recommendations.




algorithm

Which algorithm is used in Modus ATPG?

According to the book Electronic Design Automation For Integrated Circuits Handbook there are mutiple algorithms available. Quote from book: "One of the first complete ATPG algorithms is the D-algorithm [9]. Subsequently, other algorithms were proposed, including PODEM [14], FAN [15], and SOCRATES [10]."

I was wondering which algorithms are used in Cadence Modus.




algorithm

Botan C++ Crypto Algorithms Library 2.11.0

Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release.




algorithm

Botan C++ Crypto Algorithms Library 2.12.0

Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release.




algorithm

Botan C++ Crypto Algorithms Library 2.12.1

Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release.




algorithm

Botan C++ Crypto Algorithms Library 2.13.0

Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release.




algorithm

Botan C++ Crypto Algorithms Library 2.14.0

Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release.




algorithm

OpenSSL signature_algorithms_cert Denial Of Service

Proof of concept denial of service exploit for the recent OpenSSL signature_algorithms_cert vulnerability.





algorithm

New Algorithms Aim To Stamp Out Abuse On Twitter




algorithm

RSA Factorization Attack Using Fermat's Algorithm

Script that performs RSA factorization attack using Fermat's algorithm.




algorithm

Google’s quantum supremacy algorithm has found its first practical use

Google has put the algorithm it used to achieve quantum supremacy to work. It generated verifiably random numbers, which could be used one day in encryption or lotteries




algorithm

Initial Resuscitation Algorithm for Children




algorithm

Fast Algorithms for Conducting Large-Scale GWAS of Age-at-Onset Traits Using Cox Mixed-Effects Models [Statistical Genetics and Genomics]

Age-at-onset is one of the critical traits in cohort studies of age-related diseases. Large-scale genome-wide association studies (GWAS) of age-at-onset traits can provide more insights into genetic effects on disease progression and transitions between stages. Moreover, proportional hazards (or Cox) regression models can achieve higher statistical power in a cohort study than a case-control trait using logistic regression. Although mixed-effects models are widely used in GWAS to correct for sample dependence, application of Cox mixed-effects models (CMEMs) to large-scale GWAS is so far hindered by intractable computational cost. In this work, we propose COXMEG, an efficient R package for conducting GWAS of age-at-onset traits using CMEMs. COXMEG introduces fast estimation algorithms for general sparse relatedness matrices including, but not limited to, block-diagonal pedigree-based matrices. COXMEG also introduces a fast and powerful score test for dense relatedness matrices, accounting for both population stratification and family structure. In addition, COXMEG generalizes existing algorithms to support positive semidefinite relatedness matrices, which are common in twin and family studies. Our simulation studies suggest that COXMEG, depending on the structure of the relatedness matrix, is orders of magnitude computationally more efficient than coxme and coxph with frailty for GWAS. We found that using sparse approximation of relatedness matrices yielded highly comparable results in controlling false-positive rate and retaining statistical power for an ethnically homogeneous family-based sample. By applying COXMEG to a study of Alzheimer’s disease (AD) with a Late-Onset Alzheimer’s Disease Family Study from the National Institute on Aging sample comprising 3456 non-Hispanic whites and 287 African Americans, we identified the APOE 4 variant with strong statistical power (P = 1e–101), far more significant than that reported in a previous study using a transformed variable and a marginal Cox model. Furthermore, we identified novel SNP rs36051450 (P = 2e–9) near GRAMD1B, the minor allele of which significantly reduced the hazards of AD in both genders. These results demonstrated that COXMEG greatly facilitates the application of CMEMs in GWAS of age-at-onset traits.




algorithm

Structured assessment of frailty in multiple myeloma as a paradigm of individualized treatment algorithms in cancer patients at advanced age




algorithm

Efficacy and Safety of Use of the Fasting Algorithm for Singaporeans With Type 2 Diabetes (FAST) During Ramadan: A Prospective, Multicenter, Randomized Controlled Trial [Original Research]

PURPOSE

We aimed to evaluate the efficacy and safety of use of the Fasting Algorithm for Singaporeans with Type 2 Diabetes (FAST) during Ramadan.

METHODS

We performed a prospective, multicenter, randomized controlled trial. The inclusion criteria were age ≥21 years, baseline glycated hemoglobin (HbA1c) level ≤9.5%, and intention to fast for ≥10 days during Ramadan. Exclusion criteria included baseline estimated glomerular filtration rate <30 mL/min, diabetes-related hospitalization, and short-term corticosteroid therapy. Participants were randomized to intervention (use of FAST) or control (usual care without FAST) groups. Efficacy outcomes were HbA1c level and fasting blood glucose and postprandial glucose changes, and the safety outcome was incidence of major or minor hypoglycemia during the Ramadan period. Glycemic variability and diabetes distress were also investigated. Linear mixed models were constructed to assess changes.

RESULTS

A total of 97 participants were randomized (intervention: n = 46, control: n = 51). The HbA1c improvement during Ramadan was 4 times greater in the intervention group (–0.4%) than in the control group (–0.1%) (P = .049). The mean fasting blood glucose level decreased in the intervention group (–3.6 mg/dL) and increased in the control group (+20.9 mg/dL) (P = .034). The mean postprandial glucose level showed greater improvement in the intervention group (–16.4 mg/dL) compared to the control group (–2.3 mg/dL). There were more minor hypoglycemic events based on self-monitered blood glucose readings in the control group (intervention: 4, control: 6; P = .744). Glycemic variability was not significantly different between the 2 groups (P = .284). No between-group differences in diabetes distress were observed (P = .479).

CONCLUSIONS

Our findings emphasize the importance of efficacious, safe, and culturally tailored epistemic tools for diabetes management.




algorithm

Pregnancy-adapted YEARS algorithm: can YEARS do more for pregnant women?

Venous thromboembolism (VTE), as a term that encompasses pulmonary embolism (PE) and deep vein thrombosis (DVT), is one of the leading causes of maternal morbidity and mortality [1], especially in developed countries, where PE takes second place after complications of hypertensive disorders [2]. When compared to non-pregnant women of similar age, pregnant women have an approximately four to five times higher risk of VTE [3], with an incidence of 1 in 1000 pregnancies [4]. Approximately 20–25% of VTE cases are caused by PE and 75–80% of cases are caused by DVT [5]. About 60% of DVT occurs antepartum, with the highest risk of antepartum pregnancy-associated VTE being in the third trimester.However, about 60% of PE occurs postpartum [3].




algorithm

How well can algorithms recognize your masked face?

There's a scramble to adapt to a world where people routinely cover their faces.




algorithm

COVID-19 is triggering a massive experiment in algorithmic content moderation

Major social media companies are having to adjust to a difficult reality: Due to social distancing requirements, much of their human workforce that moderates content has been sent home.  The timing is challenging, as platforms are fighting to contain an epidemic of misinformation, with user traffic hitting all-time records. To make up for the absence…

       




algorithm

Trade secrets shouldn’t shield tech companies’ algorithms from oversight

Technology companies increasingly hide the world’s most powerful algorithms and business models behind the shield of trade secret protection. The legitimacy of these protections needs to be revisited when they obscure companies’ impact on the public interest or the rule of law. In 2016 and 2018, the United States and the European Union each adopted…

       




algorithm

COVID-19 is triggering a massive experiment in algorithmic content moderation

Major social media companies are having to adjust to a difficult reality: Due to social distancing requirements, much of their human workforce that moderates content has been sent home.  The timing is challenging, as platforms are fighting to contain an epidemic of misinformation, with user traffic hitting all-time records. To make up for the absence…

       




algorithm

Trade secrets shouldn’t shield tech companies’ algorithms from oversight

Technology companies increasingly hide the world’s most powerful algorithms and business models behind the shield of trade secret protection. The legitimacy of these protections needs to be revisited when they obscure companies’ impact on the public interest or the rule of law. In 2016 and 2018, the United States and the European Union each adopted…

       




algorithm

Why a proposed HUD rule could worsen algorithm-driven housing discrimination

In 1968 Congress passed and President Lyndon B. Johnson then signed into law the Fair Housing Act (FHA), which prohibits housing-related discrimination on the basis of race, color, religion, sex, disability, familial status, and national origin. Administrative rulemaking and court cases in the decades since the FHA’s enactment have helped shape a framework that, for…

       




algorithm

Trade secrets shouldn’t shield tech companies’ algorithms from oversight

Technology companies increasingly hide the world’s most powerful algorithms and business models behind the shield of trade secret protection. The legitimacy of these protections needs to be revisited when they obscure companies’ impact on the public interest or the rule of law. In 2016 and 2018, the United States and the European Union each adopted…

       




algorithm

Why a proposed HUD rule could worsen algorithm-driven housing discrimination

In 1968 Congress passed and President Lyndon B. Johnson then signed into law the Fair Housing Act (FHA), which prohibits housing-related discrimination on the basis of race, color, religion, sex, disability, familial status, and national origin. Administrative rulemaking and court cases in the decades since the FHA’s enactment have helped shape a framework that, for…

       




algorithm

Why a proposed HUD rule could worsen algorithm-driven housing discrimination

In 1968 Congress passed and President Lyndon B. Johnson then signed into law the Fair Housing Act (FHA), which prohibits housing-related discrimination on the basis of race, color, religion, sex, disability, familial status, and national origin. Administrative rulemaking and court cases in the decades since the FHA’s enactment have helped shape a framework that, for…

       




algorithm

5 questions policymakers should ask about facial recognition, law enforcement, and algorithmic bias

In the futuristic 2002 film “Minority Report,” law enforcement uses a predictive technology that includes artificial intelligence (AI) for risk assessments to arrest possible murderers before they commit crimes. However, a police officer is now one of the accused future murderers and is on the run from the Department of Justice to prove that the…

       




algorithm

Algorithms and sentencing: What does due process require?

There are significant potential benefits to using data-driven risk assessments in criminal sentencing. For example, risk assessments have rightly been endorsed as a mechanism to enable courts to reduce or waive prison sentences for offenders who are very unlikely to reoffend. Multiple states have recently enacted laws requiring the use of risk assessment instruments. And…

       




algorithm

Why a proposed HUD rule could worsen algorithm-driven housing discrimination

In 1968 Congress passed and President Lyndon B. Johnson then signed into law the Fair Housing Act (FHA), which prohibits housing-related discrimination on the basis of race, color, religion, sex, disability, familial status, and national origin. Administrative rulemaking and court cases in the decades since the FHA’s enactment have helped shape a framework that, for…

       




algorithm

Undulating Root Bench is designed with computer algorithms

Emerging out of a park in Seoul, South Korea, this dynamic piece of urban furniture offers a place to sit, walk and play.





algorithm

Algorithms and competition: Friends or foes?

This article by OECD's Antonio Capobianco and Pedro Gonzaga focuses on whether algorithms can make tacit collusion easier, both in oligopolistic markets and in markets which do not manifest the structural features that are usually associated with the risk of collusion. It was published in the August 2017 edition of the CPI Chronicle.




algorithm

Algorithms and collusion: Competition policy in the digital age

The combination of big data with technologically advanced tools is changing the competitive landscape in many markets and sectors. While this is producing benefits and efficiencies, it is also raising concerns of possible anti-competitive behaviour. This paper looks at whether algorithms can make tacit collusion easier and discusses some of the challenges they present for both competition law enforcement and market regulation.




algorithm

Instagram ‘pods’ game the algorithm by coordinating likes and comments on millions of posts

Researchers at NYU have identified hundreds of groups of Instagram users, some with thousands of members, that systematically exchange likes and comments in order to game the service’s algorithms and boost visibility. In the process, they also trained machine learning agents to identify whether a post has been juiced in this way. “Pods,” as they’ve […]




algorithm

New York ICE officials accused of rigging algorithms to detain immigrants in detention centers 

The New York Civil Liberties Union has filed a lawsuit against ICE claiming New York officers rigged algorithms to always recommend people arrested for immigration violations be detained.




algorithm

Leiden University's computer algorithm spots ELEVEN asteroids that could hit Earth

Each of the asteroids flagged by a computer algorithm at Leiden University are more than 328 feet wide and will pass close between the Earth and the moon between the years 2131 and 2923.




algorithm

YouTube blames removal of a live-streamed women's sex tech conference on moderation algorithm

The conference, Women of Sex Tech, had its live feed auto-banned from YouTube just four minutes into the broadcast for allegedly violating the platform's community guidelines.




algorithm

'New algorithm to prevent self-driving cars from bumping into each other'




algorithm

Pervasive Systems, Algorithms and Networks [Electronic book] : 16th International Symposium, I-SPAN 2019, Naples, Italy, September 16-20, 2019, Proceedings / Christian Esposito, Jiman Hong, Kim-Kwang Raymond Choo, editors.

Cham : Springer, 2019.




algorithm

The ethical algorithm: the science of socially aware algorithm design / Michael Kearns and Aaron Roth

Dewey Library - HC79.I55 K43 2020




algorithm

Rescheduling Under Disruptions in Manufacturing Systems: Models and Algorithms / by Dujuan Wang, Yunqiang Yin, Yaochu Jin

Online Resource




algorithm

The nonlinear workbook : chaos, fractals, cellular automata, genetic algorithms, gene expression programming, support vector machine, wavelets, hidden Markov models, fuzzy logic with C++, Java and symbolic C++ programs / Willi-Hans Steeb, University of Jo

Steeb, W.-H




algorithm

Algorithms for computational biology: third International Conference, AlCoB 2016, Trujillo, Spain, June 21-22, 2016, Proceedings / María Botón-Fernández, Carlos Martín-Vide, Sergio Santander-Jiménez, Miguel A. Vega-Rodríguez

Online Resource




algorithm

Algorithms for computational biology: 4th International Conference, AlCoB 2017, Aveiro, Portugal, June 5-6, 2017, Proceedings / edited by Daniel Figueiredo, Carlos Martín-Vide, Diogo Pratas, Miguel A. Vega-Rodríguez (eds.)

Online Resource




algorithm

Algorithms for computational biology: 5th International Conference, AlCoB 2018, Hong Kong, China, June 25-26, 2018, Proceedings / Jesper Jansson, Carlos Martín-Vide, Miguel A. Vega-Rodríguez (eds.)

Online Resource




algorithm

Bioinformatics algorithms: design and implementation in Python / Miguel Rocha, Pedro G. Ferreira

Online Resource




algorithm

Algorithms for computational biology: 6th International Conference, AlCoB 2019, Berkeley, CA, USA, May 28-30, 2019, Proceedings / Ian Holmes, Carlos Martín-Vide, Miguel A. Vega-Rodríguez, editors

Online Resource




algorithm

Making Sense of Sensors: End-to-End Algorithms and Infrastructure Design from Wearable-Devices to Data Center / Omesh Tickoo, Ravi Iyer

Online Resource




algorithm

The burden of choice: recommendations, subversion, and algorithmic culture / Jonathan Cohn

Dewey Library - HF5415.32.C643 2019