-
181
Implementation of the Advanced Encryption Standard (AES) Algorithm and Bit Plane Complexity Segmentation (BPCS) Steganography Technique for Enhancing Text File Security
Published 2025-03-01“…In today's digital era, data security has become a crucial aspect due to the vast amount of information being transmitted and stored electronically. …”
Get full text
Article -
182
Examining the role of night spaces in the crime of cities by modeling Prometheus (the case of Abadan City)
Published 2023-05-01“…Nowadays, in the main centers of the city, the security index has been given a lot of attention as an effective factor in vitality and nightlife; But some urban spaces with tourism potential have received less attention. …”
Get full text
Article -
183
<tt>HJ-BIPLOT</tt>: A Theoretical and Empirical Systematic Review of Its 38 Years of History, Using Text Mining and LLMs
Published 2025-06-01“…The HJ-Biplot, introduced by Galindo in 1986, is a multivariate analysis technique that enables the simultaneous representation of rows and columns with high-quality visualization. This systematic review synthesizes findings from 121 studies on the HJ-Biplot, spanning from 1986 to December 2024. …”
Get full text
Article -
184
Nathan Meyer-Rothschild’s Reproduction of Business Masculinity in the Portrait A View from the Royal Exchange. A Historical, Bourdieusian and Visual Semiotic Exploration
Published 2023-07-01“…To secure his trajectory, Rothschild needed to align his identity with Business Masculinity and thus Englishness – and disassociate himself from Jewish masculinity – in a culture of antisemitism, as well as deal with the repercussions arising from his alleged manipulation of information about the Battle of Waterloo (1815). …”
Get full text
Article -
185
Security systems’ status with the use of technical means of video recording and video surveillance: international experience, perspectives for implementation in the activities of t...
Published 2020-06-01“…Based on the review of the experience of introduction and use of video surveillance systems in Ukraine and analysis of their development in developed countries, the authors have suggested the ways to modernize and further develop security systems in Ukraine by using CCTV cameras.…”
Get full text
Article -
186
-
187
Creating a collaborative system for physical protection simulation in nuclear facility with virtual
Published 2024-04-01“…In this sense, this article aimed to develop a tool that allow the visualization and planning of action strategies in a virtual environment, aiming to improve security. …”
Get full text
Article -
188
-
189
Community Development in the Rural Areas through Traditional Indigenous Knowledge
Published 2019Get full text
Article -
190
Geographic information system and information visualization capacity building: Successful polio eradication and current and future challenges in the COVID-19 era for the World Heal...
Published 2024-01-01“…The AFRO GIS comprises a set of mobile device or cloud-based tools for geospatial data collection, analysis, and visualization. Using tools such as Auto-Visual Acute Flaccid Paralysis Detection and Reporting, electronic surveillance, and Integrated Supportive Supervision, GIS personnel collect polio case numbers and locations, track field worker activities, follow the movements of nomadic populations vulnerable to polio and other diseases, and determine needs for further healthcare deployments. …”
Get full text
Article -
191
Instrumentation System for Monitoring of Soil Variables in Precision Agriculture Applications
Published 2025-01-01“…The present work proposes a system to measure and visualize temperature, moisture, pH, Nitrate, and positive Potassium ions. …”
Get full text
Article -
192
Comparison of the effect of guided visualization technique and cryotherapy on pain intensity during needle insertion into arterial–venous vessels of hemodialysis undergoing patient...
Published 2025-02-01“…CONCLUSION: Guided visualization can be used as a safe and secure method to reduce pain when the needle enters the arteriovenous fistula in patients undergoing hemodialysis. …”
Get full text
Article -
193
Ease of Securing Airway Using Bougie Preloaded ProSeal Laryngeal Mask Airway versus Railroading ProSeal Laryngeal Mask Airway Over Bougie
Published 2025-01-01“…After successful placement of PLMA, glottic structures were visualized and scored with a flexible bronchoscope passed through PLMA. …”
Get full text
Article -
194
Development of a Solar-Powered Edge Processing Perimeter Alert System with AI and LoRa/LoRaWAN Integration for Drone Detection and Enhanced Security
Published 2025-01-01“…This technique is particularly relevant for security applications where there is a need to reduce the probability of intrusion or data breaches and to decentralize alert systems. …”
Get full text
Article -
195
Future Path Presentation to Passengers of an Autonomous Wheelchair Using Vibrotactile Feedback
Published 2025-03-01Get full text
Article -
196
Inteligência Territorial e sua interface com as políticas públicas: o Painel de Segurança Hídrica (PSH)
Published 2023-10-01“…This project aims to build Territorial Intelligence strategies to better analyze, demonstrate, visualize and evaluate data on water security in Brazil. …”
Get full text
Article -
197
IoT Management of Human Tasks at the Level of Smart Homes
Published 2025-01-01“…This paper presents a prototype to help manage tasks in smart homes by connecting to the IoT network that allows the interconnection and communication between devices, robots, and objects inside the house to facilitate the activity carried out by the inhabitants and to emphasize the automation of processes, the secure use of at a distance and their achievement. …”
Get full text
Article -
198
What Is the Best Solution for Smart Buildings? A Case Study of Fog, Edge Computing and Smart IoT Devices
Published 2025-03-01Get full text
Article -
199
Construction and Application for Operation-BusinessOriented Mobile GIS Service Platform
Published 2015-06-01“…The platform uses the mobile GIS spatial data security encryption technology,power navigation map engine technology,navigation path analysis techniques. …”
Get full text
Article -
200
Construction and Application for Operation-BusinessOriented Mobile GIS Service Platform
Published 2015-06-01“…The platform uses the mobile GIS spatial data security encryption technology,power navigation map engine technology,navigation path analysis techniques. …”
Get full text
Article