An efficient method of modulo adder design for Digital Signal Processing applications. [PDF]
Kumar Singhal S+4 more
europepmc +1 more source
Abstract Background Dual‐energy cone‐beam CT (DE‐CBCT) has become subject of recent interest due to the ability to produce virtual monoenergetic images (VMIs) with improved soft‐tissue contrast and reduced nonuniformity artifacts. However, efficient production and optimization of VMIs remains an under‐explored part of DE‐CBCT's application.
Andrew Keeler+4 more
wiley +1 more source
HERMEES: A Holistic Evaluation and Ranking Model for Energy-Efficient Systems Applied to Selecting Optimal Lightweight Cryptographic and Topology Construction Protocols in Wireless Sensor Networks. [PDF]
Prvulovic P+3 more
europepmc +1 more source
Comprehensive clinical evaluation of novel 4DCT‐based lung function imaging methods
Abstract Purpose Methods have been developed that apply image processing to 4DCTs to generate 4DCT‐ventilation/perfusion lung imaging. Traditional methods for 4DCT‐ventilation rely on Hounsfield‐Unit (HU) density‐change methods and suffer from poor numerical robustness while not providing 4DCT‐perfusion data.
Ehsan Golkar+6 more
wiley +1 more source
Prediction of android ransomware with deep learning model using hybrid cryptography. [PDF]
Kalphana KR+7 more
europepmc +1 more source
Contribution to the random vector generation and cryptography
Abalo Baya
openalex +1 more source
Are quantum teleportation and cryptography predicted by quantum mechanics?
M. V. Lokajíček
openalex +2 more sources
Abstract Background The use of deep learning‐based auto‐contouring algorithms in various treatment planning services is increasingly common. There is a notable deficit of commercially or publicly available models trained on large or diverse datasets containing high‐dose‐rate (HDR) brachytherapy treatment scans, leading to poor performance on images ...
Andrew J. Krupien+8 more
wiley +1 more source
Validation and user experience testing of DataCryptChain: An open-source standard combining blockchain technology with asymmetric encryption for private, secure, shareable, and tamper-proof research data. [PDF]
Franc JM.
europepmc +1 more source