Results 51 to 60 of about 1,275,223 (320)
Digit Recognition From Wrist Movements and Security Concerns with Smart Wrist Wearable IOT Devices [PDF]
In this paper, we investigate a potential security vulnerability associated with wrist wearable devices. Hardware components on common wearable devices include an accelerometer and gyroscope, among other sensors. We demonstrate that an accelerometer and gyroscope can pick up enough unique wrist movement information to identify digits being written by a
arxiv +1 more source
Abstract The establishment of guidelines and curriculum standards for medical physics residency training is a critical component of setting expectations and competencies for the profession. Since the last publication of these standards, residency training has become integrated into the eligibility criteria for most medical physics certification bodies.
Jonathon A. Nye+16 more
wiley +1 more source
HDLNIDS: Hybrid Deep-Learning-Based Network Intrusion Detection System
Attacks on networks are currently the most pressing issue confronting modern society. Network risks affect all networks, from small to large. An intrusion detection system must be present for detecting and mitigating hostile attacks inside networks ...
Emad Ul Haq Qazi+2 more
doaj +1 more source
Digital Watermarking Security [PDF]
As creative works (e.g. books, films, music, photographs) become increasingly available in digital formats in a highly connected world, it also becomes increasingly difficult to secure intellectual property rights.
Blake, Jonathan, Latifi, Shahram
core +4 more sources
Abstract Purpose This study aims to evaluate how different gantry angles, breathing rates (BPM), cine image speeds, and tracking algorithms affect beam on/off latency and the subsequent impact on target dose for a 0.35T MR‐Linac with a 6 MV FFF beam.
Mateb Al Khalifa+4 more
wiley +1 more source
SoK: Security of the Ascon Modes
The Ascon authenticated encryption scheme and hash function of Dobraunig et al. (Journal of Cryptology 2021) were recently selected as winner of the NIST lightweight cryptography competition. The mode underlying Ascon authenticated encryption (Ascon-AE)
Charlotte Lefevre, Bart Mennink
doaj +1 more source
The connectivity of devices through the internet plays a remarkable role in our daily lives. Many network-based applications are utilized in different domains, e.g., health care, smart environments, and businesses.
Emad Ul Haq Qazi+2 more
doaj +1 more source
Tropical cryptography III: digital signatures [PDF]
We use tropical algebras as platforms for a very efficient digital signature protocol. Security relies on computational hardness of factoring one-variable tropical polynomials; this problem is known to be NP-hard.
arxiv
ABSTRACT Objective Sleep spindles are an electrophysiological fingerprint of the sleeping human brain. They can be described in terms of duration, frequency, amplitude, and density, and vary widely according to age and sex. Spindles play a role in sleep and wake functions and are altered in several neurological and psychiatric disorders.
Julien Coelho+8 more
wiley +1 more source
Deep Learning-Based Digital Image Forgery Detection System
The advancements of technology in every aspect of the current age are leading to the misuse of data. Researchers, therefore, face the challenging task of identifying these manipulated forms of data and distinguishing the real data from the manipulated ...
Emad Ul Haq Qazi+2 more
doaj +1 more source