نتایج جستجو برای: attacks after radiation therapy smart

تعداد نتایج: 2440113  

Journal: :The Journal of Thoracic and Cardiovascular Surgery 1986

Journal: :iranian journal of medical physics 0
hassan ali nedaie radiotherapy oncology department, cancer research center, cancer institute, tehran university of medical sciences, tehran, iran. nooshin banaee young researchers and elites club, science and research branch, islamic azad university, tehran, iran.

introduction intensity-modulated radiotherapy (imrt) is becoming an increasingly routine treatment method. imrt can be delivered by use of conventional multileaf collimators (mlcs) and/or physical compensators. one of the most important factors in selecting an appropriate imrt technique is integral dose. integral dose is equal to the mean energy deposited in the total irradiated volume of the p...

Journal: :Clinical and experimental thyroidology 2014

Journal: :Diagnostic and Interventional Imaging 2016

Journal: :EAI Endorsed Trans. Indust. Netw. & Intellig. Syst. 2015
Eric McCary Yang Xiao

The term “Smart Grid” has been coined and used for several years to describe the efforts of the current power grid modernization effort. This effort plans to introduce self-healing, energy efficiency, reliability, and security using two-way digital communications and control technology, along with a host of other valuable attributes. As a bi-product of this modernization and newly gained system...

2004
Chuanxiong Guo Helen J. Wang Wenwu Zhu

Internet has been permeating into every corner of the world and every aspect of our lives, empowering us with anywhere, anytime remote access and control over information, personal communications (e.g., through smart-phones), and our environment (e.g., through the use of sensors, actuators, and RFIDs). While enabling interoperation with the Internet brings tremendous opportunities in service cr...

2008
Tommy Persson Anton Nilsson

In this report we discuss several hardware attacks against smart cards. We describe a number of successful attacks against cards such as pay-TV cards and pre-paid phone cards and how these attacks has since been mitigated. We have also looked into a class of attacks called Optical Fault Induction Attacks and described how they work and what a designer can do to prevent them.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید