@article{YazdanbakhshSolbachBitz2012, author = {Yazdanbakhsh, Pedram and Solbach, Klaus and Bitz, Andreas}, title = {Variable power combiner for RF mode shimming in 7-T MR imaging}, series = {IEEE Transaction on Biomedical Engineering}, volume = {59}, journal = {IEEE Transaction on Biomedical Engineering}, number = {9}, publisher = {IEEE}, address = {New York}, issn = {1558-2531}, doi = {10.1109/TBME.2012.2205926}, pages = {2549 -- 2557}, year = {2012}, abstract = {This contribution discusses the utilization of RF power in an MRI system with RF mode shimming which enables the superposition of circularly polarized modes of a transmit RF coil array driven by a Butler matrix. Since the required power for the individual modes can vary widely, mode-shimming can result in a significant underutilization of the total available RF power. A variable power combiner (VPC) is proposed to improve the power utilization: it can be realized as a reconfiguration of the MRI transmit system by the inclusion of one additional matrix network which receives the power from all transmit amplifiers at its input ports and provides any desired (combined) power distribution at its output ports by controlling the phase and amplitude of the amplifiers' input signals. The power distribution at the output ports of the VPC is then fed into the "mode" ports of the coil array Butler matrix in order to superimpose the spatial modes at the highest achievable power utilization. The VPC configuration is compared to the standard configuration of the transmit chain of our MRI system with 8 transmit channels and 16 coils. In realistic scenarios, improved power utilization was achieved from 17\% to 60\% and from 14\% to 55\% for an elliptical phantom and a region of interest in the abdomen, respectively, and an increase of the power utilization of 1 dB for a region of interest in the upper leg. In general, it is found that the VPC allows significant improvement in power utilization when the shimming solution demands only a few modes to be energized, while the technique can yield loss in power utilization in cases with many modes required at high power level.}, language = {en} } @article{Wolf2012, author = {Wolf, Martin R.}, title = {Von Security Awareness zum Secure Behaviour}, series = {Hakin9 Extra - IT-Forensik}, volume = {2012}, journal = {Hakin9 Extra - IT-Forensik}, number = {5}, publisher = {Software Wydawnictwo}, address = {Warszawa}, issn = {1733-7186}, pages = {18 -- 19}, year = {2012}, abstract = {Security Awareness ist derzeit ein viel diskutiertes Thema. Es reicht nicht, einfach nur ein paar technische Systeme (z.B. Firewalls) zu installieren, um ein angemessenes Schutzniveau zu erzielen. Neben einer guten Organisation von IT Security ist es auch notwendig, den Mitarbeiter einzubinden. Der vielzitierte "Faktor Mensch" ist derjenige, der die Technik korrekt anwenden muss und der durch falsches Verhalten technische und organisatorische Schutzmaßnahmen aushebeln kann. Deshalb reicht es nicht aus, wenn sich der Mitarbeiter der Gefahren bewusst ("aware") ist, er muss auch dementsprechend "sicher" handeln.}, language = {de} }