Results 21 to 30 of about 1,916,317 (370)

Image quality comparisons of coil setups in 3T MRI for brain and head and neck radiotherapy simulations

open access: yesJournal of Applied Clinical Medical Physics, Volume 23, Issue 12, December 2022., 2022
Abstract Purpose MRI is increasingly used for brain and head and neck radiotherapy treatment planning due to its superior soft tissue contrast. Flexible array coils can be arranged to encompass treatment immobilization devices, which do not fit in diagnostic head/neck coils. Selecting a flexible coil arrangement to replace a diagnostic coil should rely
Evangelia Kaza   +6 more
wiley   +1 more source

COMPUTER NETWORK SECURITY [PDF]

open access: yesCarpathian Journal of Electrical Engineering, 2023
Computers that we connect to a network serve to exchange data, which is located in the computer’s working memory. Data transmission can also be done through electronic signals, and these connections can be wireless networks or wired networks.
Marijan MIJATOVIĆ, Marko MIJATOVIĆ
doaj  

Treatment planning with a 2.5 MV photon beam for radiation therapy

open access: yesJournal of Applied Clinical Medical Physics, Volume 23, Issue 12, December 2022., 2022
Abstract Purpose The shallow depth of maximum dose and higher dose fall‐off gradient of a 2.5 MV beam along the central axis that is available for imaging on linear accelerators is investigated for treatment of shallow tumors and sparing the organs at risk (OARs) beyond it.
Navid Khaledi   +5 more
wiley   +1 more source

Evaluation of patient doses for routine digital radiography procedures toward establishing an institutional diagnostic reference levels: A case study in Sri Lanka

open access: yesJournal of Applied Clinical Medical Physics, Volume 23, Issue 12, December 2022., 2022
Abstract The present study was conducted as part of a comprehensive work to establish National Diagnostic Reference Levels (NDRLs) in Sri Lanka for the first time. DRLs can be used as an effective optimization tool for identifying unusually high or low patient doses during X‐ray examinations.
Sachith Welarathna   +3 more
wiley   +1 more source

Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks

open access: yesIEEE Access, 2021
Power consumption and electromagnetic emissions analyses are well established attack avenues for secret values extraction in a large range of embedded devices.
Francesco Antognazza   +2 more
doaj   +1 more source

Federated Secure Computing

open access: yesInformatics, 2023
Privacy-preserving computation (PPC) enables encrypted computation of private data. While advantageous in theory, the complex technology has steep barriers to entry in practice. Here, we derive design goals and principles for a middleware that encapsulates the demanding cryptography server side and provides a simple-to-use interface to client-side ...
Hendrik Ballhausen   +1 more
openaire   +2 more sources

A Study on the Design and Application of Fictional Storytelling in Online Learning of Computer Security

open access: yesApplied Sciences, 2021
Computer security is an important part of the computer science (CS) curriculum in all kinds of universities. Although the educational approach tends to be highly technical and practical, it cannot be avoided that some understanding and memorizing of the ...
Joan Arnedo-Moreno, Victor Garcia-Font
doaj   +1 more source

Human Factors in Security – Cybersecurity Education and Awareness of Business Students

open access: yesAnnales Universitatis Mariae Curie-Skłodowska Sectio H, Oeconomia, 2022
Theoretical background: The rapid development of Internet interactions and a growing number of information technology users caused by digital society development and accelerated by the COVID-19 pandemic yield the significant growth of cyber-attacks and ...
Łukasz Wiechetek, Marek Mędrek
doaj   +1 more source

Interactive Secure Function Computation [PDF]

open access: yesIEEE Transactions on Information Theory, 2020
We consider interactive computation of randomized functions between two users with the following privacy requirement: the interaction should not reveal to either user any extra information about the other user's input and output other than what can be inferred from the user's own input and output.
Deepesh Data   +3 more
openaire   +5 more sources

Siber Suçların Siber Saldırılara Maruz Kalan Şirketlerin Hisse Senedi Fiyatları Üzerindeki Etkileri

open access: yesİşletme Bilimi Dergisi, 2021
Amaç: İnternet ve diğer dijital teknolojileri kullanarak işlenen yasa dışı faaliyetler, siber suç olarak adlandırılmaktadır. Siber suçlar, kullanıcıların gizli verilerine yetkisiz erişim, DOS saldırıları, virüs yayma, çevrimiçi dolandırıcılık ve ...
Barış Aksoy, Necati Alp Erilli
doaj   +1 more source

Home - About - Disclaimer - Privacy