Showing 201 - 220 results of 841 for search 'security in visualization', query time: 0.10s Refine Results
  1. 201

    Perspective Solutions in the Field of Personnel Motivation in the Digital Economy by A. S. Artamonov

    Published 2019-07-01
    “…They are little loyal to traditional organizations, which creates problems in securing and motivating staff.The subject of the article is the positioning of technical solutions in the field of material motivation of personnel in the era of digital business transformation. …”
    Get full text
    Article
  2. 202

    Progress and trends on machine learning in proteomics during 1997-2024: a bibliometric analysis by Chao Tan, Hao Liu, Zhen Zhang, Xinyu Liu, Yinquan Ai, Xiumin Wu, Enlin Jian, Yongyan Song, Jin Yang

    Published 2025-08-01
    “…Future efforts should focus on building interpretable models, enhancing cross-disciplinary collaboration, and ensuring secure, standardized data use to advance precision medicine.Systematic review registrationhttps://doi.org/10.17605/OSF.IO/F4WUG.…”
    Get full text
    Article
  3. 203

    Reversible Image Watermarking Using Modified Quadratic Difference Expansion and Hybrid Optimization Technique by H. R. Lakshmi, Surekha Borra

    Published 2025-06-01
    “…This article introduces a Modified Quadratic Difference Expansion (MQDE) and fractal encryption-based reversible watermarking for securing the copyrights of images. First, fractal encryption is applied to watermarks using Tromino's L-shaped theorem to improve security. …”
    Get full text
    Article
  4. 204

    Methodical approach to quantitative assessment of the risks of the implementation of threats unauthorized access to an information resource automated systems of internal affairs bo... by T. V. Meshcheryakova, E. A. Rogozin, A. O. Efimov, V. R. Romanova, S. A. Konovalenko

    Published 2022-11-01
    “…A methodical approach to the quantitative assessment of the risks of the implementation of UA threats to the information resource of the ATS AS is proposed, which makes it possible to assess the level of security of service information.Conclusion. The proposed methodological approach to quantitative assessment of the risks of the implementation of UA threats to the information resource of the ATS AS provides a visual representation in monetary terms of the objects of assessment (damage, costs). …”
    Get full text
    Article
  5. 205
  6. 206

    Privacy-Preserving Detection of Tampered Radio-Frequency Transmissions Utilizing Federated Learning in LoRa Networks by Nurettin Selcuk Senol, Mohamed Baza, Amar Rasheed, Maazen Alsabaan

    Published 2024-11-01
    “…LoRa networks, widely adopted for low-power, long-range communication in IoT applications, face critical security concerns as radio-frequency transmissions are increasingly vulnerable to tampering. …”
    Get full text
    Article
  7. 207
  8. 208

    PROFESSIONAL AND PEDAGOGICAL COMPETENCE OF EDUCATIONAL AND METHODOLOGICAL CENTERS TEACHERS IN THE SPHERE OF CIVIL DEFENSE: STRUCTURE AND CONTENT by Demkiv Anna

    Published 2023-07-01
    “…The aim of the article is to identify the structure and the content of professional and pedagogical competence of educational and methodological centers teachers in the sphere of civil defense based on the analysis of the higher educational standards in the specialty 011 «Education, pedagogical science» for the second (master’s) level of higher education and in the specialty 263 «Civil Security» for the second (master’s) level of higher education and expert survey. …”
    Get full text
    Article
  9. 209

    Automated System for OEE Management in the Industrial Sector by Diego Gomez, Sofia Pantoja, Enoc Acosta, David Arrieta, Sebastián Gutiérrez

    Published 2025-07-01
    “…The platform also supports real-time and historical OEE data visualization, with customizable views for specific days and shifts. …”
    Get full text
    Article
  10. 210

    Attention-Enhanced CNN for High-Performance Deepfake Detection: A Multi-Dataset Study by Subhram Dasgupta, Kushal Badal, Swetha Chittam, Md Tasnim Alam, Kaushik Roy

    Published 2025-01-01
    “…Deepfakes, which emerge from advanced deep learning techniques, present complex ethical and security challenges across media and communication landscapes. …”
    Get full text
    Article
  11. 211
  12. 212
  13. 213

    An analysis of the physical contexts of crime in urban spaces and the provision of preventive design solutions, case study: Enghelab Street in Tehran by Fatemeh Saffarsabzevar

    Published 2025-09-01
    “…One of the most effective approaches to enhancing urban security is crime prevention through environmental design (CPTED), which focuses on the role of urban design in reducing criminal behavior. …”
    Get full text
    Article
  14. 214

    Regulating foreign direct investment to achieve technological sovereignty in the European Union by A. A. Makarova

    Published 2025-03-01
    “…The political agenda of the EU aims to diversify partners, but their range is limited by national security considerations, which is unlikely to contribute to actual diversification. …”
    Get full text
    Article
  15. 215
  16. 216

    Mobile applications for skin cancer detection are vulnerable to physical camera-based adversarial attacks by Junsei Oda, Kazuhiro Takemoto

    Published 2025-05-01
    “…Our study demonstrates the importance of security evaluation in deploying such applications in clinical settings.…”
    Get full text
    Article
  17. 217
  18. 218
  19. 219
  20. 220

    IoT-Based Smart Lock with Real-Time Person Detection Using YOLOv5 and Mobile App Integration by Dick Díaz-Delgado, Sergio Martín Vigil-Ramírez, Luis Jesus Acho-Cachay, Brandom Ricketts Tuanama-Chávez, Luis Angel Rojas-Puerta

    Published 2025-07-01
    “…The system combines three authentication factors: a keypad code, visual detection of authorized individuals, and mobile app verification. …”
    Get full text
    Article