نتایج جستجو برای: enhancing values
تعداد نتایج: 601335 فیلتر نتایج به سال:
BACKGROUND AND PURPOSE Magnetization-transfer imaging is a technique that could provide indirect evidence of the characteristics of multiple sclerosis (MS) lesions. The purpose of this work was to study the evolution of MS lesions on T1-weighted MR images over time and to investigate changes in magnetization-transfer ratio (MTR) values of MS lesions with different initial appearances on contras...
Privacy Enhancing Technology (PET) is the technology responsible to hide the identification of Internet users, whereas network forensics is a technology responsible to reveal the identification of Internet users who perform illegal actions through the Internet. The paper identifies the collision of these opposite-goal technologies and describes what happens in case they come across. Can a Netwo...
Instructional techniques based on research in cognitive science and physics education have been used in physics courses to enhance student learning. While dramatic increases in conceptual understanding have been observed, students enrolled in these courses tend to move away from scientistlike views of the discipline and toward novicelike views, as measured by various assessment instruments. It ...
A number of Privacy Enhancing Technologies (PETs) have been proposed in the last three decades offering unconditional communication anonymity to their users. Unconditional anonymity can, however, be a security threat because it allows users to employ a PET in order to act maliciously while hiding their identity. In the last few years, several technologies which revoke the identity of users who ...
This paper describes the “Privacy-Enhancing Technology Users’ Self-Estimation Scale (PET-USES)”, a questionnaire that enables users to evaluate PET user interfaces for their overall usability and to measure six different PET aspects. The PET-USES is intended to be used during usability testing and evaluation of PET user interfaces. The focus of the PET-USES is the subjective experience of the u...
Among the hyphomycetous endoparasites destructive to eelworms that abound in slowly decaying plant materials, as well as in agar plate cultures earlier inoculated with partly decomposed vegetable detritus, Harposporium anguillulae Lohde emend. Zopf (1888) is observed much more frequently than allied forms. In seeking an explanation for this more frequent occurrence it would seem highly signific...
This paper describes a physiologically based toxicokinetic model for 1,3-butadiene uptake, distribution, and metabolic clearance in mice. Model parameters for metabolic activity were estimated from the correspondence between computer simulation studies and experimental results as published in the literature. The parameterized model was validated with independent literature data. With the result...
Several opinion polls have reported that many people claim to be concerned about their privacy, yet that most people in fact do very little to protect their privacy. Are privacy concerns indeed insufficient motivators to adopt privacy protection strategies? What then characterizes the users of these strategies? On the basis of a large scale survey amongst Dutch students, this paper explores the...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید