Results 21 to 30 of about 1,916,317 (370)
Abstract Purpose MRI is increasingly used for brain and head and neck radiotherapy treatment planning due to its superior soft tissue contrast. Flexible array coils can be arranged to encompass treatment immobilization devices, which do not fit in diagnostic head/neck coils. Selecting a flexible coil arrangement to replace a diagnostic coil should rely
Evangelia Kaza+6 more
wiley +1 more source
COMPUTER NETWORK SECURITY [PDF]
Computers that we connect to a network serve to exchange data, which is located in the computer’s working memory. Data transmission can also be done through electronic signals, and these connections can be wireless networks or wired networks.
Marijan MIJATOVIĆ, Marko MIJATOVIĆ
doaj
Treatment planning with a 2.5 MV photon beam for radiation therapy
Abstract Purpose The shallow depth of maximum dose and higher dose fall‐off gradient of a 2.5 MV beam along the central axis that is available for imaging on linear accelerators is investigated for treatment of shallow tumors and sparing the organs at risk (OARs) beyond it.
Navid Khaledi+5 more
wiley +1 more source
Abstract The present study was conducted as part of a comprehensive work to establish National Diagnostic Reference Levels (NDRLs) in Sri Lanka for the first time. DRLs can be used as an effective optimization tool for identifying unusually high or low patient doses during X‐ray examinations.
Sachith Welarathna+3 more
wiley +1 more source
Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks
Power consumption and electromagnetic emissions analyses are well established attack avenues for secret values extraction in a large range of embedded devices.
Francesco Antognazza+2 more
doaj +1 more source
Privacy-preserving computation (PPC) enables encrypted computation of private data. While advantageous in theory, the complex technology has steep barriers to entry in practice. Here, we derive design goals and principles for a middleware that encapsulates the demanding cryptography server side and provides a simple-to-use interface to client-side ...
Hendrik Ballhausen+1 more
openaire +2 more sources
Computer security is an important part of the computer science (CS) curriculum in all kinds of universities. Although the educational approach tends to be highly technical and practical, it cannot be avoided that some understanding and memorizing of the ...
Joan Arnedo-Moreno, Victor Garcia-Font
doaj +1 more source
Human Factors in Security – Cybersecurity Education and Awareness of Business Students
Theoretical background: The rapid development of Internet interactions and a growing number of information technology users caused by digital society development and accelerated by the COVID-19 pandemic yield the significant growth of cyber-attacks and ...
Łukasz Wiechetek, Marek Mędrek
doaj +1 more source
Interactive Secure Function Computation [PDF]
We consider interactive computation of randomized functions between two users with the following privacy requirement: the interaction should not reveal to either user any extra information about the other user's input and output other than what can be inferred from the user's own input and output.
Deepesh Data+3 more
openaire +5 more sources
Siber Suçların Siber Saldırılara Maruz Kalan Şirketlerin Hisse Senedi Fiyatları Üzerindeki Etkileri
Amaç: İnternet ve diğer dijital teknolojileri kullanarak işlenen yasa dışı faaliyetler, siber suç olarak adlandırılmaktadır. Siber suçlar, kullanıcıların gizli verilerine yetkisiz erişim, DOS saldırıları, virüs yayma, çevrimiçi dolandırıcılık ve ...
Barış Aksoy, Necati Alp Erilli
doaj +1 more source