Results 61 to 70 of about 815,217 (293)

Information Security Games: A Survey [PDF]

open access: yesarXiv, 2021
We introduce some preliminaries about game theory and information security. Then surveying a subset of the literature, we identify opportunities for future research.
arxiv  

AAPM Task Group No. 249.B—Essentials and guidelines for clinical medical physics residency training program

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract The establishment of guidelines and curriculum standards for medical physics residency training is a critical component of setting expectations and competencies for the profession. Since the last publication of these standards, residency training has become integrated into the eligibility criteria for most medical physics certification bodies.
Jonathon A. Nye   +16 more
wiley   +1 more source

Part-Based Enhanced Super Resolution Network for Low-Resolution Person Re-Identification

open access: yesIEEE Access, 2020
Person re-identification (REID) is an important task in video surveillance and forensics applications. Many previous works often build models on the assumption that they have same resolution cross different camera views, while it is divorced from reality.
Yan Ha   +5 more
doaj   +1 more source

CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing [PDF]

open access: yesarXiv, 2019
Cloud computing has been adopted widely, providing on-demand computing resources to improve perfornance and reduce the operational costs. However, these new functionalities also bring new ways to exploit the cloud computing environment. To assess the security of the cloud, graphical security models can be used, such as Attack Graphs and Attack Trees ...
arxiv  

Enhanced analysis of gating latency in 0.35T MR‐linac through innovative time synchronization of a motion phantom and plastic scintillation detector

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose This study aims to evaluate how different gantry angles, breathing rates (BPM), cine image speeds, and tracking algorithms affect beam on/off latency and the subsequent impact on target dose for a 0.35T MR‐Linac with a 6 MV FFF beam.
Mateb Al Khalifa   +4 more
wiley   +1 more source

A Modified ck-Secure Sum Protocol for Multi-Party Computation [PDF]

open access: yesJournal of Computing, Volume 2, Issue 2, February 2010, https://sites.google.com/site/journalofcomputing/, 2010
Secure Multi-Party Computation (SMC) allows multiple parties to compute some function of their inputs without disclosing the actual inputs to one another. Secure sum computation is an easily understood example and the component of the various SMC solutions.
arxiv  

Social engineering: Concepts, Techniques and Security Countermeasures [PDF]

open access: yesarXiv, 2021
The purpose of this report is to research the topic called Social Engineering in Cyber Security and present the explanation of the meaning, concepts, techniques, and security countermeasures of Social Engineering based on factual academic research.
arxiv  

Empowering young minds through STEM education: Engaging high schoolers in Ghana through medical physics

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose To promote diversity in Science, Technology, Engineering, and Mathematics (STEM), an educational presentation and hands‐on session was organised to raise awareness of STEM career opportunities among high school girls to introduce the students to the field of medical physics. Materials and Methods The study involved 65 first‐year Senior
Afua A. Yorke   +7 more
wiley   +1 more source

Security Architecture for Cloud-Based Command and Control System in IoT Environment

open access: yesApplied Sciences, 2020
With the development of the fourth industrial technology, such as the Internet of Things (IoT) and cloud computing, developed countries including the U.S.
Jahoon Koo   +3 more
doaj   +1 more source

Threshold Values of Sleep Spindles Features in Healthy Adults Using Scalp‐EEG and Associations With Sleep Parameters

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Sleep spindles are an electrophysiological fingerprint of the sleeping human brain. They can be described in terms of duration, frequency, amplitude, and density, and vary widely according to age and sex. Spindles play a role in sleep and wake functions and are altered in several neurological and psychiatric disorders.
Julien Coelho   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy