Results 61 to 70 of about 760,777 (341)

Information Security

open access: yes, 2013
Information ...
You,Ilsun, Weippl,Edgar
openaire   +1 more source

Designing Informative Securities [PDF]

open access: yes, 2012
Appears in Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence (UAI2012)
Yiling Chen   +2 more
openaire   +2 more sources

Quantum Private Query Protocol Based on Two Non-Orthogonal States

open access: yesEntropy, 2016
We propose a loss tolerant quantum private query (QPQ) protocol based on two non-orthogonal states and unambiguous state discrimination (USD) measurement.
Yan Chang   +5 more
doaj   +1 more source

DyCARS: A dynamic context-aware recommendation system

open access: yesMathematical Biosciences and Engineering
Dynamic recommendation systems aim to achieve real-time updates and dynamic migration of user interests, primarily utilizing user-item interaction sequences with timestamps to capture the dynamic changes in user interests and item attributes.
Zhiwen Hou   +7 more
doaj   +1 more source

Research on Hybrid Recommendation Model for Personalized Recommendation Scenarios

open access: yesApplied Sciences, 2023
One of the five types of Internet information service recommendation technologies is the personalized recommendation algorithm, and knowledge graphs are frequently used in these algorithms.
Wenkai Ni   +3 more
doaj   +1 more source

Does dose calculation algorithm affect the dosimetric accuracy of synthetic CT for MR‐only radiotherapy planning in brain tumors?

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose This study compares the dosimetric accuracy of deep‐learning‐based MR synthetic CT (sCT) in brain radiotherapy between the Analytical Anisotropic Algorithm (AAA) and AcurosXB (AXB). Additionally, it proposes a novel metric to predict the dosimetric accuracy of sCT for individual post‐surgical brain cases.
Jeffrey C. F. Lui   +3 more
wiley   +1 more source

Secure Web-Based Student Information Management System [PDF]

open access: yesarXiv, 2022
The reliability and success of any organization such as academic institution rely on its ability to provide secure, accurate and timely data about its operations. Erstwhile managing student information in academic institution was done through paper-based information system, where academic records are documented in several files that are kept in shelves.
arxiv  

Recent Advances in Information Security

open access: yesThe Scientific World Journal, 2014
[No abstract available]
Fei Yu   +4 more
openaire   +6 more sources

DICOM attribute manipulation tool: Easily change frame of reference, series instance, and SOP instance UID

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose In radiation oncology, the integration and registration of multiple imaging modalities is a crucial aspect of the diagnosis and treatment planning process. These images are often inherently registered, a useful feature in most cases, but possibly a hindrance when registration modifications are required.
Brian M. Anderson, Casey Bojechko
wiley   +1 more source

Considerations for Cloud Security Operations [PDF]

open access: yesOracle CSO Advisory Board, Cloud Security Session, January, 2016, 2016
Information Security in Cloud Computing environments is explored. Cloud Computing is presented, security needs are discussed, and mitigation approaches are listed. Topics covered include Information Security, Cloud Computing, Private Cloud, Public Cloud, SaaS, PaaS, IaaS, ISO 27001, OWASP, Secure SDLC.
arxiv  

Home - About - Disclaimer - Privacy