Results 131 to 140 of about 1,349,866 (407)

Research on the Volumetric Efficiency of 2D Piston Pumps with a Balanced Force

open access: yesEnergies, 2020
Axial piston pumps with high rotational speeds are required in many fields to increase the power-to-weight ratio. However, three main sliding friction pairs in the pump restrict the increase in rotational speed.
Yu Huang   +4 more
doaj   +1 more source

Classical leakage resilience from fault-tolerant quantum computation [PDF]

open access: yesarXiv, 2014
Physical implementations of cryptographic algorithms leak information, which makes them vulnerable to so-called side-channel attacks. The problem of secure computation in the presence of leakage is generally known as leakage resilience. In this work, we establish a connection between leakage resilience and fault-tolerant quantum computation.
arxiv  

Effects of Leakage Neutral Particles on Shocks

open access: yes, 2012
In this paper we investigate effects of neutral particles on shocks propagating into the partially ionized medium. We find that for 120 km/s < u_{sh} < 3000 km/s (u_{sh} is the shock velocity), about ten percent of upstream neutral particles leak into ...
Abdo   +29 more
core   +1 more source

Quantum information leakage [PDF]

open access: yesNature Reviews Chemistry, 2020
Decoherence in quantum systems compromises the quantum information processing. However, in molecular systems, coherence is not completely lost and residual coherence can provide important information to guide the design of efficient molecular qubits.
openaire   +2 more sources

Risk analysis of the Unity 1.5T MR‐Linac adapt‐to‐shape workflow

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Background and Purpose The adapt‐to‐shape (ATS) workflow on the Unity MR‐Linac (Elekta AB, Stockholm, Sweden) allows for full replanning including recontouring and reoptimization5. Additional complexity to this workflow is added when the adaptation involves the use of MIM Maestro (MIM Software, Cleveland, OH) software in conjunction with ...
Jiayi Liang   +13 more
wiley   +1 more source

Zero-leakage valves [PDF]

open access: yes, 1972
Valve action confines polymeric material in a metal groove effecting seal by compressive reaction of the polymer.
Salvinski, R. J.
core   +1 more source

Implementation of needle‐tracking technology for real‐time transrectal ultrasound‐guided interstitial gynecological HDR brachytherapy: A feasibility study

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose To investigate the feasibility of adapting a commercial prostate biopsy system for transrectal ultrasound (TRUS)‐guided hybrid gynecological (GYN) high‐dose‐rate (HDR) brachytherapy (BT). Leveraging 3D‐TRUS and MR image fusion, the prototype system aims to improve real‐time needle placement accuracy.
Lindsey H. Bloom   +8 more
wiley   +1 more source

An investigation into the feasibility and efficacy of stereotactic radiosurgery for 1–3 cm single brain lesions on the ring‐mounted Halcyon LINAC

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose An evaluation of the accuracy, safety, and efficiency of the Halcyon ring delivery system (RDS) for stereotactic radiosurgery (SRS) treatment to relatively small (1–3 cm) brain lesions. Methods After completing the extensive in‐house quality assurance checks including Winston–Lutz test and independent dose verification via MD Anderson ...
Kate Hazelwood   +5 more
wiley   +1 more source

Understanding the effects of leakage in superconducting quantum error detection circuits

open access: yes, 2013
The majority of quantum error detection and correction protocols assume that the population in a qubit does not leak outside of its computational subspace.
Fowler, Austin G.   +3 more
core   +1 more source

How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories

open access: yesNetwork and Distributed System Security Symposium, 2019
—GitHub and similar platforms have made public collaborative development of software commonplace. However, a problem arises when this public code must manage authentication secrets, such as API keys or cryptographic secrets.
Michael Meli   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy