algorithm Development of the Children With Disabilities Algorithm By pediatrics.aappublications.org Published On :: 2015-09-28T00:07:28-07:00 There are no validated claims-based algorithms for identifying children with disabilities (CWD) to facilitate larger-scale studies of care quality for CWD.This study develops the CWD algorithm, a claims-based algorithm for identifying diagnostic codes with a ≥75% chance of indicating CWD, and triangulates the algorithm against parent report and physician chart abstraction. (Read the full article) Full Article
algorithm Healthcare Algorithms Are Biased, and the Results Can Be Deadly By www.pcmag.com Published On :: Deep-learning algorithms suffer from a fundamental problem: They can adopt unwanted biases from the data on which they're trained. In healthcare, this can lead to bad diagnoses and care recommendations. Full Article
algorithm Which algorithm is used in Modus ATPG? By feedproxy.google.com Published On :: Mon, 09 Mar 2020 13:29:27 GMT According to the book Electronic Design Automation For Integrated Circuits Handbook there are mutiple algorithms available. Quote from book: "One of the first complete ATPG algorithms is the D-algorithm [9]. Subsequently, other algorithms were proposed, including PODEM [14], FAN [15], and SOCRATES [10]." I was wondering which algorithms are used in Cadence Modus. Full Article
algorithm Botan C++ Crypto Algorithms Library 2.11.0 By packetstormsecurity.com Published On :: Mon, 01 Jul 2019 15:32:42 GMT Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release. Full Article
algorithm Botan C++ Crypto Algorithms Library 2.12.0 By packetstormsecurity.com Published On :: Mon, 07 Oct 2019 15:02:16 GMT Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release. Full Article
algorithm Botan C++ Crypto Algorithms Library 2.12.1 By packetstormsecurity.com Published On :: Mon, 14 Oct 2019 15:16:36 GMT Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release. Full Article
algorithm Botan C++ Crypto Algorithms Library 2.13.0 By packetstormsecurity.com Published On :: Mon, 06 Jan 2020 17:14:06 GMT Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release. Full Article
algorithm Botan C++ Crypto Algorithms Library 2.14.0 By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 19:22:31 GMT Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release. Full Article
algorithm OpenSSL signature_algorithms_cert Denial Of Service By packetstormsecurity.com Published On :: Fri, 01 May 2020 19:22:22 GMT Proof of concept denial of service exploit for the recent OpenSSL signature_algorithms_cert vulnerability. Full Article
algorithm RSA Warns Over NSA Link To Encryption Algorithm By packetstormsecurity.com Published On :: Fri, 20 Sep 2013 15:16:59 GMT Full Article headline government privacy flaw nsa cryptography rsa
algorithm New Algorithms Aim To Stamp Out Abuse On Twitter By packetstormsecurity.com Published On :: Wed, 18 Sep 2019 16:39:03 GMT Full Article headline fraud twitter
algorithm RSA Factorization Attack Using Fermat's Algorithm By packetstormsecurity.com Published On :: Thu, 05 Apr 2018 20:22:20 GMT Script that performs RSA factorization attack using Fermat's algorithm. Full Article
algorithm Google’s quantum supremacy algorithm has found its first practical use By www.newscientist.com Published On :: Fri, 13 Dec 2019 18:36:25 +0000 Google has put the algorithm it used to achieve quantum supremacy to work. It generated verifiably random numbers, which could be used one day in encryption or lotteries Full Article
algorithm Initial Resuscitation Algorithm for Children By pediatrics.aappublications.org Published On :: 2020-05-01T01:00:46-07:00 Full Article
algorithm Fast Algorithms for Conducting Large-Scale GWAS of Age-at-Onset Traits Using Cox Mixed-Effects Models [Statistical Genetics and Genomics] By www.genetics.org Published On :: 2020-05-05T06:43:41-07:00 Age-at-onset is one of the critical traits in cohort studies of age-related diseases. Large-scale genome-wide association studies (GWAS) of age-at-onset traits can provide more insights into genetic effects on disease progression and transitions between stages. Moreover, proportional hazards (or Cox) regression models can achieve higher statistical power in a cohort study than a case-control trait using logistic regression. Although mixed-effects models are widely used in GWAS to correct for sample dependence, application of Cox mixed-effects models (CMEMs) to large-scale GWAS is so far hindered by intractable computational cost. In this work, we propose COXMEG, an efficient R package for conducting GWAS of age-at-onset traits using CMEMs. COXMEG introduces fast estimation algorithms for general sparse relatedness matrices including, but not limited to, block-diagonal pedigree-based matrices. COXMEG also introduces a fast and powerful score test for dense relatedness matrices, accounting for both population stratification and family structure. In addition, COXMEG generalizes existing algorithms to support positive semidefinite relatedness matrices, which are common in twin and family studies. Our simulation studies suggest that COXMEG, depending on the structure of the relatedness matrix, is orders of magnitude computationally more efficient than coxme and coxph with frailty for GWAS. We found that using sparse approximation of relatedness matrices yielded highly comparable results in controlling false-positive rate and retaining statistical power for an ethnically homogeneous family-based sample. By applying COXMEG to a study of Alzheimer’s disease (AD) with a Late-Onset Alzheimer’s Disease Family Study from the National Institute on Aging sample comprising 3456 non-Hispanic whites and 287 African Americans, we identified the APOE 4 variant with strong statistical power (P = 1e–101), far more significant than that reported in a previous study using a transformed variable and a marginal Cox model. Furthermore, we identified novel SNP rs36051450 (P = 2e–9) near GRAMD1B, the minor allele of which significantly reduced the hazards of AD in both genders. These results demonstrated that COXMEG greatly facilitates the application of CMEMs in GWAS of age-at-onset traits. Full Article
algorithm Structured assessment of frailty in multiple myeloma as a paradigm of individualized treatment algorithms in cancer patients at advanced age By www.haematologica.org Published On :: 2020-05-01T00:05:41-07:00 Full Article
algorithm Efficacy and Safety of Use of the Fasting Algorithm for Singaporeans With Type 2 Diabetes (FAST) During Ramadan: A Prospective, Multicenter, Randomized Controlled Trial [Original Research] By www.annfammed.org Published On :: 2020-03-09T14:00:11-07:00 PURPOSE We aimed to evaluate the efficacy and safety of use of the Fasting Algorithm for Singaporeans with Type 2 Diabetes (FAST) during Ramadan. METHODS We performed a prospective, multicenter, randomized controlled trial. The inclusion criteria were age ≥21 years, baseline glycated hemoglobin (HbA1c) level ≤9.5%, and intention to fast for ≥10 days during Ramadan. Exclusion criteria included baseline estimated glomerular filtration rate <30 mL/min, diabetes-related hospitalization, and short-term corticosteroid therapy. Participants were randomized to intervention (use of FAST) or control (usual care without FAST) groups. Efficacy outcomes were HbA1c level and fasting blood glucose and postprandial glucose changes, and the safety outcome was incidence of major or minor hypoglycemia during the Ramadan period. Glycemic variability and diabetes distress were also investigated. Linear mixed models were constructed to assess changes. RESULTS A total of 97 participants were randomized (intervention: n = 46, control: n = 51). The HbA1c improvement during Ramadan was 4 times greater in the intervention group (–0.4%) than in the control group (–0.1%) (P = .049). The mean fasting blood glucose level decreased in the intervention group (–3.6 mg/dL) and increased in the control group (+20.9 mg/dL) (P = .034). The mean postprandial glucose level showed greater improvement in the intervention group (–16.4 mg/dL) compared to the control group (–2.3 mg/dL). There were more minor hypoglycemic events based on self-monitered blood glucose readings in the control group (intervention: 4, control: 6; P = .744). Glycemic variability was not significantly different between the 2 groups (P = .284). No between-group differences in diabetes distress were observed (P = .479). CONCLUSIONS Our findings emphasize the importance of efficacious, safe, and culturally tailored epistemic tools for diabetes management. Full Article
algorithm Pregnancy-adapted YEARS algorithm: can YEARS do more for pregnant women? By breathe.ersjournals.com Published On :: 2020-03-18T06:44:39-07:00 Venous thromboembolism (VTE), as a term that encompasses pulmonary embolism (PE) and deep vein thrombosis (DVT), is one of the leading causes of maternal morbidity and mortality [1], especially in developed countries, where PE takes second place after complications of hypertensive disorders [2]. When compared to non-pregnant women of similar age, pregnant women have an approximately four to five times higher risk of VTE [3], with an incidence of 1 in 1000 pregnancies [4]. Approximately 20–25% of VTE cases are caused by PE and 75–80% of cases are caused by DVT [5]. About 60% of DVT occurs antepartum, with the highest risk of antepartum pregnancy-associated VTE being in the third trimester.However, about 60% of PE occurs postpartum [3]. Full Article
algorithm How well can algorithms recognize your masked face? By arstechnica.com Published On :: Sun, 03 May 2020 10:55:37 +0000 There's a scramble to adapt to a world where people routinely cover their faces. Full Article Biz & IT Policy AI facial recognition surveillance
algorithm COVID-19 is triggering a massive experiment in algorithmic content moderation By webfeeds.brookings.edu Published On :: Tue, 28 Apr 2020 16:20:00 +0000 Major social media companies are having to adjust to a difficult reality: Due to social distancing requirements, much of their human workforce that moderates content has been sent home. The timing is challenging, as platforms are fighting to contain an epidemic of misinformation, with user traffic hitting all-time records. To make up for the absence… Full Article
algorithm Trade secrets shouldn’t shield tech companies’ algorithms from oversight By webfeeds.brookings.edu Published On :: Mon, 04 May 2020 12:00:00 +0000 Technology companies increasingly hide the world’s most powerful algorithms and business models behind the shield of trade secret protection. The legitimacy of these protections needs to be revisited when they obscure companies’ impact on the public interest or the rule of law. In 2016 and 2018, the United States and the European Union each adopted… Full Article
algorithm COVID-19 is triggering a massive experiment in algorithmic content moderation By webfeeds.brookings.edu Published On :: Tue, 28 Apr 2020 16:20:00 +0000 Major social media companies are having to adjust to a difficult reality: Due to social distancing requirements, much of their human workforce that moderates content has been sent home. The timing is challenging, as platforms are fighting to contain an epidemic of misinformation, with user traffic hitting all-time records. To make up for the absence… Full Article
algorithm Trade secrets shouldn’t shield tech companies’ algorithms from oversight By webfeeds.brookings.edu Published On :: Mon, 04 May 2020 12:00:00 +0000 Technology companies increasingly hide the world’s most powerful algorithms and business models behind the shield of trade secret protection. The legitimacy of these protections needs to be revisited when they obscure companies’ impact on the public interest or the rule of law. In 2016 and 2018, the United States and the European Union each adopted… Full Article
algorithm Why a proposed HUD rule could worsen algorithm-driven housing discrimination By webfeeds.brookings.edu Published On :: Thu, 16 Apr 2020 17:28:58 +0000 In 1968 Congress passed and President Lyndon B. Johnson then signed into law the Fair Housing Act (FHA), which prohibits housing-related discrimination on the basis of race, color, religion, sex, disability, familial status, and national origin. Administrative rulemaking and court cases in the decades since the FHA’s enactment have helped shape a framework that, for… Full Article
algorithm Trade secrets shouldn’t shield tech companies’ algorithms from oversight By webfeeds.brookings.edu Published On :: Mon, 04 May 2020 12:00:00 +0000 Technology companies increasingly hide the world’s most powerful algorithms and business models behind the shield of trade secret protection. The legitimacy of these protections needs to be revisited when they obscure companies’ impact on the public interest or the rule of law. In 2016 and 2018, the United States and the European Union each adopted… Full Article
algorithm Why a proposed HUD rule could worsen algorithm-driven housing discrimination By webfeeds.brookings.edu Published On :: Thu, 16 Apr 2020 17:28:58 +0000 In 1968 Congress passed and President Lyndon B. Johnson then signed into law the Fair Housing Act (FHA), which prohibits housing-related discrimination on the basis of race, color, religion, sex, disability, familial status, and national origin. Administrative rulemaking and court cases in the decades since the FHA’s enactment have helped shape a framework that, for… Full Article
algorithm Why a proposed HUD rule could worsen algorithm-driven housing discrimination By webfeeds.brookings.edu Published On :: Thu, 16 Apr 2020 17:28:58 +0000 In 1968 Congress passed and President Lyndon B. Johnson then signed into law the Fair Housing Act (FHA), which prohibits housing-related discrimination on the basis of race, color, religion, sex, disability, familial status, and national origin. Administrative rulemaking and court cases in the decades since the FHA’s enactment have helped shape a framework that, for… Full Article
algorithm 5 questions policymakers should ask about facial recognition, law enforcement, and algorithmic bias By webfeeds.brookings.edu Published On :: Thu, 20 Feb 2020 05:05:52 +0000 In the futuristic 2002 film “Minority Report,” law enforcement uses a predictive technology that includes artificial intelligence (AI) for risk assessments to arrest possible murderers before they commit crimes. However, a police officer is now one of the accused future murderers and is on the run from the Department of Justice to prove that the… Full Article
algorithm Algorithms and sentencing: What does due process require? By webfeeds.brookings.edu Published On :: Thu, 21 Mar 2019 11:00:31 +0000 There are significant potential benefits to using data-driven risk assessments in criminal sentencing. For example, risk assessments have rightly been endorsed as a mechanism to enable courts to reduce or waive prison sentences for offenders who are very unlikely to reoffend. Multiple states have recently enacted laws requiring the use of risk assessment instruments. And… Full Article
algorithm Why a proposed HUD rule could worsen algorithm-driven housing discrimination By webfeeds.brookings.edu Published On :: Thu, 16 Apr 2020 17:28:58 +0000 In 1968 Congress passed and President Lyndon B. Johnson then signed into law the Fair Housing Act (FHA), which prohibits housing-related discrimination on the basis of race, color, religion, sex, disability, familial status, and national origin. Administrative rulemaking and court cases in the decades since the FHA’s enactment have helped shape a framework that, for… Full Article
algorithm Undulating Root Bench is designed with computer algorithms By www.treehugger.com Published On :: Thu, 29 Nov 2018 11:02:21 -0500 Emerging out of a park in Seoul, South Korea, this dynamic piece of urban furniture offers a place to sit, walk and play. Full Article Design
algorithm the algorithm By www.toothpastefordinner.com Published On :: Mon, 30 Sep 2019 04:00:00 EDT Today on Toothpaste For Dinner: the algorithmThe Worst Things For Sale is Drew's blog. It updates every day. Subscribe to the Worst Things For Sale RSS! Full Article comic
algorithm Algorithms and competition: Friends or foes? By bit.ly Published On :: Sat, 02 Sep 2017 13:09:00 GMT This article by OECD's Antonio Capobianco and Pedro Gonzaga focuses on whether algorithms can make tacit collusion easier, both in oligopolistic markets and in markets which do not manifest the structural features that are usually associated with the risk of collusion. It was published in the August 2017 edition of the CPI Chronicle. Full Article
algorithm Algorithms and collusion: Competition policy in the digital age By www.oecd.org Published On :: Wed, 13 Sep 2017 20:22:00 GMT The combination of big data with technologically advanced tools is changing the competitive landscape in many markets and sectors. While this is producing benefits and efficiencies, it is also raising concerns of possible anti-competitive behaviour. This paper looks at whether algorithms can make tacit collusion easier and discusses some of the challenges they present for both competition law enforcement and market regulation. Full Article
algorithm Instagram ‘pods’ game the algorithm by coordinating likes and comments on millions of posts By feedproxy.google.com Published On :: Wed, 29 Apr 2020 22:11:51 +0000 Researchers at NYU have identified hundreds of groups of Instagram users, some with thousands of members, that systematically exchange likes and comments in order to game the service’s algorithms and boost visibility. In the process, they also trained machine learning agents to identify whether a post has been juiced in this way. “Pods,” as they’ve […] Full Article Social TC Facebook Instagram
algorithm New York ICE officials accused of rigging algorithms to detain immigrants in detention centers By www.dailymail.co.uk Published On :: Wed, 04 Mar 2020 21:00:30 GMT The New York Civil Liberties Union has filed a lawsuit against ICE claiming New York officers rigged algorithms to always recommend people arrested for immigration violations be detained. Full Article
algorithm Leiden University's computer algorithm spots ELEVEN asteroids that could hit Earth By www.dailymail.co.uk Published On :: Wed, 19 Feb 2020 20:56:24 GMT Each of the asteroids flagged by a computer algorithm at Leiden University are more than 328 feet wide and will pass close between the Earth and the moon between the years 2131 and 2923. Full Article
algorithm YouTube blames removal of a live-streamed women's sex tech conference on moderation algorithm By www.dailymail.co.uk Published On :: Fri, 08 May 2020 22:59:25 GMT The conference, Women of Sex Tech, had its live feed auto-banned from YouTube just four minutes into the broadcast for allegedly violating the platform's community guidelines. Full Article
algorithm 'New algorithm to prevent self-driving cars from bumping into each other' By timesofindia.indiatimes.com Published On :: Tue, 25 Feb 2020 15:41:39 IST Full Article
algorithm Pervasive Systems, Algorithms and Networks [Electronic book] : 16th International Symposium, I-SPAN 2019, Naples, Italy, September 16-20, 2019, Proceedings / Christian Esposito, Jiman Hong, Kim-Kwang Raymond Choo, editors. By encore.st-andrews.ac.uk Published On :: Cham : Springer, 2019. Full Article
algorithm The ethical algorithm: the science of socially aware algorithm design / Michael Kearns and Aaron Roth By library.mit.edu Published On :: Sun, 8 Mar 2020 08:11:31 EDT Dewey Library - HC79.I55 K43 2020 Full Article
algorithm Rescheduling Under Disruptions in Manufacturing Systems: Models and Algorithms / by Dujuan Wang, Yunqiang Yin, Yaochu Jin By library.mit.edu Published On :: Sun, 12 Apr 2020 09:49:18 EDT Online Resource Full Article
algorithm The nonlinear workbook : chaos, fractals, cellular automata, genetic algorithms, gene expression programming, support vector machine, wavelets, hidden Markov models, fuzzy logic with C++, Java and symbolic C++ programs / Willi-Hans Steeb, University of Jo By prospero.murdoch.edu.au Published On :: Steeb, W.-H Full Article
algorithm Algorithms for computational biology: third International Conference, AlCoB 2016, Trujillo, Spain, June 21-22, 2016, Proceedings / María Botón-Fernández, Carlos Martín-Vide, Sergio Santander-Jiménez, Miguel A. Vega-Rodríguez By library.mit.edu Published On :: Sun, 17 Jul 2016 06:35:59 EDT Online Resource Full Article
algorithm Algorithms for computational biology: 4th International Conference, AlCoB 2017, Aveiro, Portugal, June 5-6, 2017, Proceedings / edited by Daniel Figueiredo, Carlos Martín-Vide, Diogo Pratas, Miguel A. Vega-Rodríguez (eds.) By library.mit.edu Published On :: Sun, 25 Jun 2017 06:24:20 EDT Online Resource Full Article
algorithm Algorithms for computational biology: 5th International Conference, AlCoB 2018, Hong Kong, China, June 25-26, 2018, Proceedings / Jesper Jansson, Carlos Martín-Vide, Miguel A. Vega-Rodríguez (eds.) By library.mit.edu Published On :: Sun, 29 Jul 2018 07:36:13 EDT Online Resource Full Article
algorithm Bioinformatics algorithms: design and implementation in Python / Miguel Rocha, Pedro G. Ferreira By library.mit.edu Published On :: Sun, 21 Apr 2019 07:26:01 EDT Online Resource Full Article
algorithm Algorithms for computational biology: 6th International Conference, AlCoB 2019, Berkeley, CA, USA, May 28-30, 2019, Proceedings / Ian Holmes, Carlos Martín-Vide, Miguel A. Vega-Rodríguez, editors By library.mit.edu Published On :: Sun, 14 Jul 2019 08:50:33 EDT Online Resource Full Article
algorithm Making Sense of Sensors: End-to-End Algorithms and Infrastructure Design from Wearable-Devices to Data Center / Omesh Tickoo, Ravi Iyer By library.mit.edu Published On :: Sun, 14 Jan 2018 06:37:15 EST Online Resource Full Article
algorithm The burden of choice: recommendations, subversion, and algorithmic culture / Jonathan Cohn By library.mit.edu Published On :: Sun, 4 Aug 2019 08:43:47 EDT Dewey Library - HF5415.32.C643 2019 Full Article