Search Results - Source Code Scanner

Refine Results
  1. 1
  2. 2
  3. 3

    The 3 Big Issues With Open Source Code Scanners by Wang, Brian

    Published: Moffett Field Newstex 01.06.2020
    Published in Next Big Future [BLOG] (01.06.2020)
    Get full text
    Web Resource
  4. 4

    MRI4ALL: A Week‐Long Hackathon for the Development of an Open‐Source Ultra‐Low‐Field MRI System by Block, Kai Tobias, Zhang, Chengtong, Ciancia, Vito, Cooley, Clarissa, Geethanath, Sairam, Stockmann, Jason, Verghese, George, Alon, Leeor

    ISSN: 1053-1807, 1522-2586, 1522-2586
    Published: Hoboken, USA John Wiley & Sons, Inc 01.10.2025
    Published in Journal of magnetic resonance imaging (01.10.2025)
    “…‐field MRI scanner in just one week and to release all created source code and resources as open‐source packages…”
    Get full text
    Journal Article
  5. 5

    Security in In-House Developed Information Systems: The Case of Tanzania by Magreth Mushi, Jabiri Bakari

    ISSN: 1690-4524
    Published: International Institute of Informatics and Cybernetics 01.04.2012
    “…In this 21st century, the world is moving more and more into the information economy; and information held by organization's information systems is among the…”
    Get full text
    Journal Article
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Sources Sought - Barcode Scanners And Preventative Maintenance For Ocao Ihs

    ISSN: 2219-0112
    Published: Camden Disco Digital Media, Inc 13.03.2024
    Published in MENA Report (13.03.2024)
    Get full text
    Newsletter
  14. 14
  15. 15

    An empirical comparison of commercial and open‐source web vulnerability scanners by Amankwah, Richard, Chen, Jinfu, Kudjo, Patrick Kwaku, Towey, Dave

    ISSN: 0038-0644, 1097-024X
    Published: Hoboken, USA John Wiley & Sons, Inc 01.09.2020
    Published in Software, practice & experience (01.09.2020)
    “…Summary Web vulnerability scanners (WVSs) are tools that can detect security vulnerabilities in web services…”
    Get full text
    Journal Article
  16. 16

    Design of a Monte Carlo model based on dual-source computed tomography (DSCT) scanners for dose and image quality assessment using the Monte Carlo N-Particle (MCNP5) code by Chantzi, Stefania, Papanastasiou, Emmanouil, Athanasopoulou, Christina, Molyvda-Athanasopoulou, Elisavet, Bamidis, Panagiotis, Siountas, Anastasios

    ISSN: 1898-0309, 1425-4689, 1898-0309
    Published: Warsaw Sciendo 01.03.2020
    “…) scanner based on the Monte Carlo N-particle radiation transport computer code (MCNP5). The geometry of the Siemens Somatom Definition CT scanner was modeled, taking…”
    Get full text
    Journal Article
  17. 17

    Implementation of a new EGSnrc particle source class for computed tomography: validation and uncertainty quantification by Kuhlmann, Marie-Luise, Pojtinger, Stefan

    ISSN: 1361-6560, 1361-6560
    Published: England IOP Publishing 07.05.2024
    Published in Physics in medicine & biology (07.05.2024)
    “… This work aims to extend the MC framework EGSnrc source code with a new particle source. This, in turn, allows CT-scanner-specific dose and image calculations for any CT scanner…”
    Get full text
    Journal Article
  18. 18

    Patient Misidentifications Caused by Errors in Standard Bar Code Technology by Snyder, Marion L, Carter, Alexis, Jenkins, Karen, Fantz, Corinne R

    ISSN: 0009-9147, 1530-8561, 1530-8561
    Published: Washington, DC American Association for Clinical Chemistry 01.10.2010
    Published in Clinical chemistry (Baltimore, Md.) (01.10.2010)
    “… However, we have found that linear bar code identification methods are not failsafe. In this study, we sought to identify the sources of bar code decoding errors…”
    Get full text
    Journal Article
  19. 19

    Machine Learning-Based Security Pattern Recognition Techniques for Code Developers by Zaharia, Sergiu, Rebedea, Traian, Trausan-Matu, Stefan

    ISSN: 2076-3417, 2076-3417
    Published: Basel MDPI AG 01.12.2022
    Published in Applied sciences (01.12.2022)
    “… We have advanced our research for a security scanner able to use automated learning techniques based on machine learning algorithms to recognize patterns of security weaknesses in source code…”
    Get full text
    Journal Article
  20. 20