Vol. 2 No. 4 (2024): Volume-II, Number-IV, 2024
-
Near-Term Quantum Computing Applications for Solving Complex Scheduling Problems in Hospital Resource Allocation
Abstract 0
Abstract
Hospital resource allocation and scheduling covering operating rooms, staff shifts, bed assignments, and equipment utilization pose large-scale combinatorial optimization challenges with high stakes for patient outcomes, throughput, staff wellbeing and cost efficiency. Classical optimization methods (integer programming, heuristics, meta-heuristics) have had success ... read more -
Quantum Neural Network (QNN) Architectures and Their Potential in High-Dimensional Medical Image Classification
Abstract 0
The rapid expansion of medical imaging modalities (high-resolution CT, MRI, whole-slide histopathology, and multi-omics image representations) stresses current classical deep-learning pipelines with rising dimensionality, complex feature manifolds, and often limited labeled data. Quantum neural networks (QNNs) an umbrella term for quantum-native and hybrid variational models offer new represent ... read more
-
Robotic Process Automation (RPA) Impact on Operational Efficiency and Compliance in Health Insurance Claims Processing
Abstract 0
Robotic Process Automation (RPA) and its intelligent extensions (IDP, NLP, ML/AI-enhanced RPA) are widely adopted across the insurance sector to accelerate claims throughput, reduce error rates, and strengthen compliance workflows. This article presents a comprehensive, submission-ready review and empirical-methods roadmap that (1) synthesizes the academic and industry literature on RPA in heal ... read more
-
The Role of Explainability in Detecting Adversarial Attacks on AI-Powered Cybersecurity Systems
Abstract 0
Artificial Intelligence (AI) has become increasingly central to modern cybersecurity systems, enabling adaptive threat detection, anomaly recognition, and predictive defense mechanisms. However, the widespread deployment of AI introduces new vulnerabilities, particularly through adversarial attacks that exploit model weaknesses to bypass detection. Explainable AI (XAI) methods have emerged as c ... read more