Results 31 to 40 of about 5,769,734 (343)

Standardized cardiovascular magnetic resonance imaging (CMR) protocols: 2020 update

open access: yesJournal of Cardiovascular Magnetic Resonance, 2020
This document is an update to the 2013 publication of the Society for Cardiovascular Magnetic Resonance (SCMR) Board of Trustees Task Force on Standardized Protocols.
C. Kramer   +5 more
semanticscholar   +1 more source

Interpolation of recurrence and hashing entanglement distillation protocols [PDF]

open access: yes, 2004
We construct new entanglement distillation protocols by interpolating between the recurrence and hashing protocols. This leads to asymptotic two-way distillation protocols, resulting in an improvement of the distillation rate for all mixed Bell diagonal ...
Verstraete, Frank   +1 more
core   +3 more sources

APTE: An Algorithm for Proving Trace Equivalence [PDF]

open access: yes, 2014
This paper presents APTE, a new tool for automatically proving the security of cryptographic protocols. It focuses on proving trace equivalence between processes, which is crucial for specifying privacy type properties such as anonymity and unlinkability.
B. Blanchet   +5 more
core   +1 more source

De les feixes als xalets. L’ús social i polític de l’aigua en la destrucció d’una comunitat agrària. Matadepera (Vallès Occidental), 1931-1983

open access: yesEstudis d'Història Agraria, 2012
El present estudi mostra com la creació de la Matadeperaresidencial d’avui és el resultat d’intenses lluites polítiques i de poder que tingueren com a eix principal el control de l’ús social de l’aigua. La transformació d’un petit poble rural en una zona
Vicenç Ruiz   +3 more
doaj   +1 more source

A Survey of Distributed Consensus Protocols for Blockchain Networks [PDF]

open access: yesIEEE Communications Surveys and Tutorials, 2019
Since the inception of Bitcoin, cryptocurrencies and the underlying blockchain technology have attracted an increasing interest from both academia and industry.
Yang Xiao   +3 more
semanticscholar   +1 more source

International Laboratory Comparison of Influenza Microneutralization Assays for A(H1N1) pdm09, A(H3N2), and A(H5N1) Influenza Viruses by CONSISE [PDF]

open access: yes, 2015
The microneutralization assay is commonly used to detect antibodies to influenza virus, and multiple protocols are used worldwide. These protocols differ in the incubation time of the assay as well as in the order of specific steps, and even within ...
Engelhardt, OG   +9 more
core   +1 more source

Relaying Protocols for Wireless Energy Harvesting and Information Processing [PDF]

open access: yesIEEE Transactions on Wireless Communications, 2012
An emerging solution for prolonging the lifetime of energy constrained relay nodes in wireless networks is to avail the ambient radio-frequency (RF) signal and to simultaneously harvest energy and process information.
A. Nasir   +3 more
semanticscholar   +1 more source

A comparative study of protocols for secure quantum communication under noisy environment: single-qubit-based protocols versus entangled-state-based protocols

open access: yes, 2016
The effect of noise on various protocols of secure quantum communication has been studied. Specifically, we have investigated the effect of amplitude damping, phase damping, squeezed generalized amplitude damping, Pauli type as well as various collective
Banerjee, Subhashish   +3 more
core   +1 more source

Real-life performance of protocol combinations for wireless sensor networks [PDF]

open access: yes, 2010
Wireless sensor networks today are used for many and diverse applications like nature monitoring, or process and wireless building automation. However, due to the limited access to large testbeds and the lack of benchmarking standards, the real-life ...
De Poorter, Eli   +4 more
core   +2 more sources

Analysis of breast region segmentation in thermal images using U-Net deep neural network variants

open access: yesFrontiers in Bioinformatics
IntroductionBreast cancer detection using thermal imaging relies on accurate segmentation of the breast region from adjacent body areas. Reliable segmentation is essential to improve the effectiveness of computer-aided diagnosis systems.MethodsThis study
Rafhanah Shazwani Rosli   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy