Results 51 to 60 of about 1,275,223 (320)

Digit Recognition From Wrist Movements and Security Concerns with Smart Wrist Wearable IOT Devices [PDF]

open access: yes, 2020
In this paper, we investigate a potential security vulnerability associated with wrist wearable devices. Hardware components on common wearable devices include an accelerometer and gyroscope, among other sensors. We demonstrate that an accelerometer and gyroscope can pick up enough unique wrist movement information to identify digits being written by a
arxiv   +1 more source

AAPM Task Group No. 249.B—Essentials and guidelines for clinical medical physics residency training program

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract The establishment of guidelines and curriculum standards for medical physics residency training is a critical component of setting expectations and competencies for the profession. Since the last publication of these standards, residency training has become integrated into the eligibility criteria for most medical physics certification bodies.
Jonathon A. Nye   +16 more
wiley   +1 more source

HDLNIDS: Hybrid Deep-Learning-Based Network Intrusion Detection System

open access: yesApplied Sciences, 2023
Attacks on networks are currently the most pressing issue confronting modern society. Network risks affect all networks, from small to large. An intrusion detection system must be present for detecting and mitigating hostile attacks inside networks ...
Emad Ul Haq Qazi   +2 more
doaj   +1 more source

Digital Watermarking Security [PDF]

open access: yes, 2011
As creative works (e.g. books, films, music, photographs) become increasingly available in digital formats in a highly connected world, it also becomes increasingly difficult to secure intellectual property rights.
Blake, Jonathan, Latifi, Shahram
core   +4 more sources

Enhanced analysis of gating latency in 0.35T MR‐linac through innovative time synchronization of a motion phantom and plastic scintillation detector

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose This study aims to evaluate how different gantry angles, breathing rates (BPM), cine image speeds, and tracking algorithms affect beam on/off latency and the subsequent impact on target dose for a 0.35T MR‐Linac with a 6 MV FFF beam.
Mateb Al Khalifa   +4 more
wiley   +1 more source

SoK: Security of the Ascon Modes

open access: yesIACR Transactions on Symmetric Cryptology
The Ascon authenticated encryption scheme and hash function of Dobraunig et al. (Journal of Cryptology 2021) were recently selected as winner of the NIST lightweight cryptography competition. The mode underlying Ascon authenticated encryption (Ascon-AE)
Charlotte Lefevre, Bart Mennink
doaj   +1 more source

A One-Dimensional Convolutional Neural Network (1D-CNN) Based Deep Learning System for Network Intrusion Detection

open access: yesApplied Sciences, 2022
The connectivity of devices through the internet plays a remarkable role in our daily lives. Many network-based applications are utilized in different domains, e.g., health care, smart environments, and businesses.
Emad Ul Haq Qazi   +2 more
doaj   +1 more source

Tropical cryptography III: digital signatures [PDF]

open access: yesarXiv, 2023
We use tropical algebras as platforms for a very efficient digital signature protocol. Security relies on computational hardness of factoring one-variable tropical polynomials; this problem is known to be NP-hard.
arxiv  

Threshold Values of Sleep Spindles Features in Healthy Adults Using Scalp‐EEG and Associations With Sleep Parameters

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Sleep spindles are an electrophysiological fingerprint of the sleeping human brain. They can be described in terms of duration, frequency, amplitude, and density, and vary widely according to age and sex. Spindles play a role in sleep and wake functions and are altered in several neurological and psychiatric disorders.
Julien Coelho   +8 more
wiley   +1 more source

Deep Learning-Based Digital Image Forgery Detection System

open access: yesApplied Sciences, 2022
The advancements of technology in every aspect of the current age are leading to the misuse of data. Researchers, therefore, face the challenging task of identifying these manipulated forms of data and distinguishing the real data from the manipulated ...
Emad Ul Haq Qazi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy