نتایج جستجو برای: vulnerable scanner

تعداد نتایج: 71901  

Ansari , Amir , Honarvar , F., Mahboobipour , Vahid ,

 The results of ultrasonic tests are usually displayed as A-scan signals. In an A-scan signal, reflections of ultrasonic wave form different reflectors are shown as sharp echoes on a time by amplitude display. Interpretation of these echoes can sometimes be quite difficult and usually requires knowledgeable and experienced specialists. There exist other methods of displaying the ultrasonic test...

Journal: :Giornale italiano di cardiologia 2010
Giulia Magnani Maria Antonietta Demola Cristian Fava Francesco Mantovani Diego Ardissino

Atherosclerotic plaque instability is directly involved in triggering acute coronary syndromes, including unstable angina, acute myocardial infarction, and sudden coronary death. Different and not completely unknown mechanisms are involved in the pathogenesis of the destabilisation of the vulnerable plaque; currently three mechanisms are considered to play a causal role in this process: emboliz...

Journal: :Japanese Journal of Radiological Technology 1982

Journal: :Building Research & Information 2016

Journal: :Texto Digital 2012

Journal: :Journal of the American College of Cardiology 2018

Journal: :European neuropsychopharmacology : the journal of the European College of Neuropsychopharmacology 2011
Ulrike Lueken Markus Muehlhan Hans-Ulrich Wittchen Thilo Kellermann Isabelle Reinhardt Carsten Konrad Thomas Lang André Wittmann Andreas Ströhle Alexander L Gerlach Adrianna Ewert Tilo Kircher

Although functional magnetic resonance imaging (fMRI) has gained increasing importance in investigating neural substrates of anxiety disorders, less is known about the stress eliciting properties of the scanner environment itself. The aim of the study was to investigate feasibility, self-reported distress and anxiety management strategies during an fMRI experiment in a comprehensive sample of p...

2009
Brian DeCann Bozhao Tan Stephanie Schuckers

Biometric scanners have become widely popular in providing security to information technology and entry to otherwise sensitive locations. However, these systems have been proven to be vulnerable to spoofing, or granting entry to an imposter using fake fingers. While matching algorithms are highly successful in identifying the unique fingerprint biometric of an individual, they lack the ability ...

Journal: :Journal of the Japan Society for Precision Engineering 1990

Journal: :BMC Bioinformatics 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید