نتایج جستجو برای: attacks after radiation therapy smart
تعداد نتایج: 2440113 فیلتر نتایج به سال:
In the past, the easiest way to attack the electrical grid would have been to physically access and destroy components. However, with the introduction of the smart grid and its increased dependence on information and communication technologies (ICT), the future grid may be vulnerable to pernicious cyber attacks performed remotely. In CRISALIS and SysSec, we are studying the properties of the en...
introduction magnetic fields are capable of altering the trajectory of electron beams andcan be used in radiation therapy.theaim of this study was to produce regions with dose enhancement and reduction in the medium. materials and methods the ndfeb permanent magnets were arranged on the electron applicator in several configurations. then, after the passage of the electron beams (9 and 15 mev va...
background: association between helicobacter pylori (hp) infection and migraine and the effect of hp eradication on relief of migraine headache have been studied but the results are controversial. objectives: to evaluate the effect of hp eradication in treatment of patients affected by migraine. materials and methods: eighty consecutive hp infected patients affected by migraine without aura wer...
The paper analyzes observations using a logic-based numerical methodology in Python. Logical Analysis of Data (LAD) specializes selecting minimal number features and finding unique patterns within it to distinguish ‘positive’ from ‘negative’ observations. Python implementation the classification model is further improved by introducing adaptations pattern generation techniques. Finally, case st...
A smart grid requires the implementation of ICT technologies in order to incorporate new functions into electricity grid monitoring and control. Wide Area Monitoring Systems (WAMSs) are used to measure synchrophasor data at different locations and give operators a near-real-time picture of what is happening in the system. The measurement data is periodically collected via communication channels...
Advanced metering infrastructure (AMI), one of the prime components of the smart grid, has many benefits like demand response and load management. Electricity theft, a key concern in AMI security since smart meters used in AMI are vulnerable to cyber attacks, causes millions of dollar in financial losses to utilities every year. In light of this problem, the authors propose an entropy-based ele...
NIST has considered the performance of AES candidates on smart-cards as an important selection criterion and many submitters have highlighted the compactness and e ciency of their submission on low end smart cards. However, in light of recently discovered power based attacks, we strongly argue that evaluating smart-card suitability of AES candidates requires a very cautious approach. We demonst...
NIST has considered the performance of AES candidates on smart-cards as an important selection criterion and many submitters have highlighted the compactness and eeciency of their submission on low end smart cards. However, in light of recently discovered power based attacks, we strongly argue that evaluating smart-card suitability of AES candidates requires a very cautious approach. We demonst...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید