Author of the publication

Checklist for Early Recognition and Treatment of Acute Illness (CERTAIN): evolution of a content management system for point-of-care clinical decision support.

, , , , , , , , , , , and . BMC Medical Informatics Decis. Mak., (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hierarchical Delay-Dependent Distributed Coordinated Control for DC Ring-Bus Microgrids., , , and . IEEE Access, (2017)Global Redundancy Optimization of Manipulability for 7-DOFs Anthropomorphic Manipulator Using Joint Monotonicity., , , , , , and . J. Intell. Robotic Syst., 109 (1): 10 (September 2023)Sampling period scheduling of networked control systems with multiple-control loops., , , and . Math. Comput. Simul., 79 (5): 1502-1511 (2009)Locality-constrained feature space learning for cross-resolution sketch-photo face recognition., , , , , and . Multim. Tools Appl., 79 (21-22): 14903-14917 (2020)Development of Machine Vision System for Off-Line Inspection of Fine Defects on Glass Screen Surface., , , , and . IEEE Trans. Instrum. Meas., (2022)Economic-Driven Hierarchical Voltage Regulation of Incremental Distribution Networks: A Cloud-Edge Collaboration Based Perspective., , , , , and . IEEE Trans. Ind. Informatics, 18 (3): 1746-1757 (2022)Multiagent System-Based Event-Triggered Hybrid Controls for High-Security Hybrid Energy Generation Systems., , and . IEEE Trans. Ind. Informatics, 13 (2): 584-594 (2017)Iterated dynamic neighborhood search for packing equal circles on a sphere., , , , and . Comput. Oper. Res., (2023)End-Edge-Cloud Collaboration-Based False Data Injection Attack Detection in Distribution Networks., , , , , , and . IEEE Trans. Ind. Informatics, 20 (2): 1786-1797 (February 2024)Distributed Resilient Finite-Time Secondary Control for Heterogeneous Battery Energy Storage Systems Under Denial-of-Service Attacks., , , and . IEEE Trans. Ind. Informatics, 16 (7): 4909-4919 (2020)