Mr. “X” and Containment
نویسندگان
چکیده
منابع مشابه
MR to X-Ray Projection Image Synthesis
Hybrid imaging promises large potential in medical imaging applications. To fully utilize the possibilities of corresponding information from different modalities, the information must be transferable between the domains. In radiation therapy planning, existing methods make use of reconstructed 3D magnetic resonance imaging data to synthesize corresponding Xray attenuation maps. In contrast, fo...
متن کاملOPTIMAL HYBRID BASE ISOLATION AND MR DAMPER
In this paper, optimal design of hybrid low damping base isolation and magnetorheological (MR) damper has been studied. Optimal hybrid base isolation system has been designed to minimize the maximum base drift of low damping base isolation system where for solving the optimization problem, genetic algorithm (GA) has been used. In design procedure the maximum acceleration of the structure has ...
متن کاملContainment and Inscribed Simplices
Let K and L be compact convex sets in Rn. The following two statements are shown to be equivalent: (i) For every polytope Q ⊆ K having at most n+ 1 vertices, L contains a translate of Q. (ii) L contains a translate of K. Let 1 ≤ d ≤ n − 1. It is also shown that the following two statements are equivalent: (i) For every polytope Q ⊆ K having at most d+ 1 vertices, L contains a translate of Q. (i...
متن کاملObject Ownership and Containment
Object-oriented programming relies on inter-object aliases to implement data structures and other abstractions. Objects have mutable state, but it is when mutable state interacts with aliasing that problems arise. Through aliasing an object’s state can be changed without the object being aware of the changes, potentially violating the object’s invariants. This problem is fundamentally unresolva...
متن کاملIntrusion Detection and Containment in
Today many approaches are used to protect the data as well as the networks from attackers. These are mainly security methods from password protected access up to firewalls which are used as per the needs. Many times these are not enough and the systems and networks are always under the thread. One way to make data more secure is using Intrusion Detection Systems (ISD) on critical systems. The I...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Slavic Review
سال: 1976
ISSN: 0037-6779,2325-7784
DOI: 10.2307/2494817