Results 181 to 190 of about 6,442,831 (407)
Abstract Purpose To promote diversity in Science, Technology, Engineering, and Mathematics (STEM), an educational presentation and hands‐on session was organised to raise awareness of STEM career opportunities among high school girls to introduce the students to the field of medical physics. Materials and Methods The study involved 65 first‐year Senior
Afua A. Yorke+7 more
wiley +1 more source
MODIFICATION OF A RESPONSE BIAS THROUGH DIFFERENTIAL AMOUNT OF REINFORCEMENT1 [PDF]
Charles M. Galloway
openalex +1 more source
Modeling exchange bias microscopically
Exchange bias is a horizontal shift of the hysteresis loop observed for a ferromagnetic layer in contact with an antiferromagnetic layer. Since exchange bias is related to the spin structure of the antiferromagnet, for its fundamental understanding a ...
Misra, A., Nowak, U., Usadel, K. D.
core +1 more source
Abstract Purpose Stereotactic radiotherapy (SRT) is a highly effective treatment with precision for small, localized lesions. Proton therapy, characterized by the Bragg peak, offers superior dose conformity compared to photon‐based approaches. However, challenges remain in minimizing lateral penumbra and optimizing dose delivery, particularly for small
Chen‐Yu Chou+3 more
wiley +1 more source
Experimenter bias in the prisoner’s dilemma game [PDF]
Philip S. Gallo, Irina Avery Dale
openalex +1 more source
Renate Baumgartner, Sarah Kuhn
openaire +5 more sources
Fighting Quantization Bias With Bias
Accepted to ECV workshop at ...
Finkelstein, Alexander+2 more
openaire +2 more sources
Localization accuracy of 6‐second CBCT for lung IGRT with various breathing patterns
Abstract Purpose The 6‐second cone beam computed tomography (CBCT) acquisition of the Ethos HyperSight (Varian Medical Systems, Inc. Palo Alto, CA, USA) on‐board imaging system offers benefits, but could be too fast to accurately capture an average target position in a free‐breathing lung cancer patient. This study aimed to ascertain whether a 6‐second
Jihye Koo+5 more
wiley +1 more source
We present a novel approach for securing valuable documents using a complementary approach based on the encryption of computer-generated holograms (CGHs).
Zakaria E. Ahmed+6 more
doaj +1 more source