-
1
Survey on the visualization technologies of threatening security data in cyber space
Published 2018-02-01“…With the rapid development of the cyber threatening methods,the requirements of network security data analysis become more and more imperative.Data visualization has already evolved as a requisite tool among all kinds of data analysis theory framework and applications,especially in the fields of scientific computation,business intelligence and cyber security.Threatening security data visualization provides various effective interaction means which improve the perception ability for the cyber security specialists to get a distinctive insight into the large amount of complicated cyber security problems.The state-of-art cyber security data visualization technologies were introduced.Some existing problems that were still challenging research topics were investigated.Some directions for future studies were outlined.…”
Get full text
Article -
2
-
3
Risks to Energy Security. Visualization of Scientific Research
Published 2024-06-01“…The results of the study made it possible to identify the main scientific clusters in the field of energy security risks. Visualization of the network map of keywords made it possible to identify 8 clusters that characterize the key areas of research in the field of energy security risks: security, risk, energy, human health, climate change, renewable energy, environment. …”
Get full text
Article -
4
Usefulness of gel immersion endoscopy for endoscopic resection in stomachs with residue
Published 2025-09-01“…In this article, we present 2 cases in which tumors were endoscopically resected by securing the visual field using the gel immersion method in remnant stomachs after proximal gastrectomy with residue. …”
Get full text
Article -
5
Higher Dimensional Kadomtsev–Petviashvili Equation: New Collision Phenomena
Published 2024-01-01“…A set of results like breather, two-wave, and lump periodic solutions are secured. To visually depict the output, a variety of graphs featuring distinct shapes are produced in response to appropriate parameter values. …”
Get full text
Article -
6
The Effectiveness of a Mobile Learning Environment in Improving Psychological Security in Blind Students
Published 2024-01-01“…No significant differences were observed between the postassessment and the follow-up evaluation of the experimental group, with a standard score of 0.471, indicating the continuous effectiveness of the Edmodo mobile learning environment in enhancing the psychological security of visually impaired university students. This efficacy was sustained even one month after the student’s graduation, as evidenced by the follow-up assessment.…”
Get full text
Article -
7
Clinical application of vein visualization apparatus AccuVein®500 in breast cancer surgery: a case report
Published 2025-05-01“…The examiner can, thus, secure detailed visualization of subcutaneous veins in the breasts. …”
Get full text
Article