Results 1  10
of
264
Electrical Impedance Tomography using EIDORS in a Closed Phantom
"... Electrical Impedance Tomography is an imaging technique which images the resistivity distribution of the body. An alternating current is injected through the contact electrodes placed on the surface and resulting potentials are measured to image the current density distribution which is solved as In ..."
Abstract
 Add to MetaCart
as Inverse Problem. The EIDORS (Electrical Impedance and Diffused Optical Reconstruction Software) is an open source software suite used for the reconstruction of Electrical Impedance Tomography (EIT) and Diffused Optical Tomography (DOT). This paper describes the EIT experiments conducted on a circular box
Coil sensitivity encoding for fast MRI. In:
 Proceedings of the ISMRM 6th Annual Meeting,
, 1998
"... New theoretical and practical concepts are presented for considerably enhancing the performance of magnetic resonance imaging (MRI) by means of arrays of multiple receiver coils. Sensitivity encoding (SENSE) is based on the fact that receiver sensitivity generally has an encoding effect complementa ..."
Abstract

Cited by 193 (3 self)
 Add to MetaCart
functions approximate the desired voxel shapes. Let i (r) denote an orthonormal set of ideal voxel shapes, e.g., box functions. The relation between ideal voxel shapes and encoding functions is described by the n C n K ϫ n V encoding matrix [11] There are many possible ways of approximating ideal voxels
Materials for an exploratory theory of the network society.
 The British Journal of Sociology
, 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, crosscultural investigation. It permeates most societies in the world, in v ..."
Abstract

Cited by 122 (0 self)
 Add to MetaCart
together in the multimedia system, computeroperated by the digitalized settop box that opens up hundreds of channels of interactive communication, reaching from the global from the local. While there is oligopolistic concentration of multimedia groups, there is, at the same time, market segmentation
BlackBox CircularSecure Encryption Beyond Affine Functions
"... We show how to achieve publickey encryption schemes that can securely encrypt nonlinear functions of their own secret key. Specifically, we show that for any constant d ∈ N, there exists a publickey encryption scheme that can securely encrypt any function f of its own secret key, assuming f can be ..."
Abstract

Cited by 5 (0 self)
 Add to MetaCart
We show how to achieve publickey encryption schemes that can securely encrypt nonlinear functions of their own secret key. Specifically, we show that for any constant d ∈ N, there exists a publickey encryption scheme that can securely encrypt any function f of its own secret key, assuming f can be expressed as a polynomial of total degree d. Such a scheme is said to be keydependent message (KDM) secure w.r.t. degreed polynomials. We also show that for any constants c, e, there exists a publickey encryption scheme that is KDM secure w.r.t. all Turing machines with description size c log λ and running time λ e, where λ is the security parameter. The security of such publickey schemes can be based either on the standard decision DiffieHellman (DDH) assumption or on the learning with errors (LWE) assumption (with certain parameters settings). In the case of functions that can be expressed as degreed polynomials, we show that the resulting schemes are also secure with respect to key cycles of any length. Specifically, for any polynomial number n of key pairs, our schemes can securely encrypt a degreed polynomial whose variables are the collection of coordinates of all n secret keys. Prior to this work, it was not known how to achieve this for nonlinear functions. Our key idea is a general transformation that amplifies KDM security. The transformation takes an encryption scheme that is KDM secure w.r.t. some functions even when the secret keys are weak (i.e. chosen from an arbitrary distribution with entropy k), and outputs a scheme that is KDM secure w.r.t. a richer class of functions. The resulting scheme may no longer be secure with weak keys. Thus, in some sense, this transformation converts security with weak keys into amplified KDM security.
Boxicity of Circular Arc Graphs
, 2008
"... A kdimensional box is the cartesian product R1 × R2 × · · · × Rk where each Ri is a closed interval on the real line. The boxicity of a graph G, denoted as box(G), is the minimum integer k such that G can be represented as the intersection graph of a collection of kdimensional boxes: that is t ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
: that is two vertices are adjacent if and only if their corresponding boxes intersect. A circular arc graph is a graph that can be represented as the intersection graph of arcs on a circle. Let G be a circular arc graph with maximum degree ∆. We show that if ∆ < n(α−1)
Analysis of Prestressed HPC Thinwalled Circular and Box Columns
"... ABSTRACT. In order to lighten the prestressed concrete solid members, nowadays, it is possible to make use of the advantage of HPC (fc>60 MPa) as well as replacing the solid section with a PSC thinwalled section for certain members such as circular and box columns. Using the strength theory of A ..."
Abstract
 Add to MetaCart
ABSTRACT. In order to lighten the prestressed concrete solid members, nowadays, it is possible to make use of the advantage of HPC (fc>60 MPa) as well as replacing the solid section with a PSC thinwalled section for certain members such as circular and box columns. Using the strength theory
(ACR) PHANTOM IMAGE USING IMAGE PROCESSING TECHNIQUE BY
"... A phantom image is used to perform quality control in mammographic facilities. The interpretation of the ACR phantom images is depend upon the experience, visual threshold, scoring criteria and state of the observer. This paper summarizes the first step of automating this score using digital image ..."
Abstract
 Add to MetaCart
processing, namely template matching via cross correlation, and suggests a metric for the visibility of the test objects in the images. A set of ACR phantom images was obtained. These images were presented to a medical physicist, who indicated the number of circular test objects visible in each image
A phantom for assessing the performance of EIT systems
"... This paper describes a phantom built from 340 precision resistors on a printed circuit board (PCB) representing a circular homogeneous medium. Compared to other phantoms in the literature, this phantom generates very realistic signals while preserving the ability to produce localized perturbations f ..."
Abstract
 Add to MetaCart
This paper describes a phantom built from 340 precision resistors on a printed circuit board (PCB) representing a circular homogeneous medium. Compared to other phantoms in the literature, this phantom generates very realistic signals while preserving the ability to produce localized perturbations
CIRCULAR ANR685 Commercial
"... Greens grow best on deep, fertile, welldrained loamy soils that are high in organic matter. Add organic matter by applying compost, animal manure, or turning under a cover crop. Plow under organic matter at least a month before planting. Lime And Fertilizer To assure a good response to fertilizers, ..."
Abstract
 Add to MetaCart
, a detailed soil analysis for each field should be conducted. From the soil test results, a fertilizer regime can be planned to satisfy the nutritional requirements of the crop. Contact your county Extension agent for information on procedures to collect soil samples and boxes for use in sample
Results 1  10
of
264