نتایج جستجو برای: attacks after radiation therapy smart

تعداد نتایج: 2440113  

2004
Debasis Adhikari Steven I. Hajdu David Levine

We report the occurrence of bilateral angiosarcoma after radiation therapy for breast carcinoma in a 64 yr-old woman. The first angiosarcoma developed 17 yr after radiation therapy to the right breast; the second angiosarcoma developed 1.5 yr after radiation therapy to the left breast. Recognizing angiosarcoma in radiated breast tissue is essential to appropriate therapy. The role of irradiatio...

Journal: :journal of medical signals and sensors 0
keyvan jabbari somayeh senobari mahnaz roayaei masoumeh rostampour

the cancer of oral cavity is related to lesions of mucous membrane of tongue and gum that can be treated with radiation therapy. a lateral photon field can be used to treat this kind of tumor, which has a side‑effect on normal tissue in the opposite side of the oral cavity. in this study the dosimetric effect of the various shields in oral cavity is evaluated. in this study, a special phantom s...

Journal: :journal of biomedical physics and engineering 0
a r farajollahi f bouzarjomehri m kiani

normal 0 false false false en-us x-none fa introduction: in radiation therapy centers across iran, protection of normal tissues is usually accomplished by either cerrobend or lead block shielding. in this study, the influence of these two shielding methods on central axis dose distribution of photon beam a cobalt unit was investigated in clinical conditions. materials and methods: all measureme...

Introduction: The current study aimed to compare the performance of radiobiological models in predicting acute esophagitis (AE) complications after three-dimensional conformal radiation therapy (3D-CRT). Material and Methods: Out of a total of 100 patients, 50 patients with concurrent chemotherapy and 50 patients without such therapy wer...

2014
Thomas Hartmann François Fouquet Jacques Klein Grégory Nain Yves Le Traon

Smart grids leverage modern information and communication technology to offer new perspectives to electricity consumers, producers, and distributors. However, these new possibilities also increase the complexity of the grid and make it more prone to failures. Moreover, new advanced features like remotely disconnecting meters create new vulnerabilities and make smart grids an attractive target f...

2014
Omprakash

Smart grids (SG) represent succeeding step in modernizing this electrical grid. The communications network is combined with the Smart grid so as to collect data that may be used to increase the potency of the grid, reduce power consumption, and improve the reliability of services, among different varied benefits. Smart Grid communication networks are distinctive in their giant scale. . The Wire...

2016
Nicola Atzei Massimo Bartoletti Tiziana Cimoli

Smart contracts are computer programs that can be correctly executed by a network of mutually distrusting nodes, without the need of an external trusted authority. Since smart contracts handle and transfer assets of considerable value, besides their correct execution it is also crucial that their implementation is secure against attacks which aim at stealing or tampering the assets. We study th...

2015
Carlos Lopez Arman Sargolzaei Hugo Santana Carlos Huerta

The smart grid is the next generation of power and distribution systems. The integration of advanced network, communications, and computing techniques allows for the enhancement of efficiency and reliability. The smart grid interconnects the flow of information via the power line, intelligent metering, renewable and distributed energy systems, and a monitoring and controlling infrastructure. Fo...

Journal: :IACR Cryptology ePrint Archive 2012
Ding Wang Chunguang Ma Peng Wu

It is a challenge for password authentication protocols using non-tamper resistant smart cards to achieve user anonymity, forward secrecy, immunity to various attacks and high performance at the same time. In DBSec’11, Li et al. showed that Kim and Chung’s passwordbased remote user authentication scheme is vulnerable to various attacks if the smart card is non-tamper resistant. Consequently, an...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید