Showing 261 - 280 results of 841 for search 'security in visualization', query time: 0.09s Refine Results
  1. 261
  2. 262
  3. 263

    Obtaining testimony via video conference calls from classified persons during criminal proceedings by E. A. Artamonova

    Published 2024-02-01
    “…The author presents his own vision of solving the problem of obtaining testimony in the courtroom from a witness against whom security measures were applied during the preliminary investigation. …”
    Get full text
    Article
  4. 264

    Mitigating Transmission Errors: A Forward Error Correction-Based Framework for Enhancing Objective Video Quality by Muhammad Babar Imtiaz, Rabia Kamran

    Published 2025-06-01
    “…In video transmission, maintaining high visual quality under variable network conditions, including bandwidth and efficiency, is essential for optimal viewer experience. …”
    Get full text
    Article
  5. 265

    Resilient Multimedia Embedding in DICOM Images: A Robustness Evaluation Under Multiple Attacks by Ramyashree, P. S. Venugopala, S. Raghavendra, Vijay S. Kubihal, B. Ashwini

    Published 2025-01-01
    “…The proposed framework uniquely enables the embedding of diverse multimedia content into DICOM images, addressing a critical gap in existing medical watermarking studies that focus mainly on text or visual data. This multi-format capability supports hospital systems in securing comprehensive patient records such as diagnostic notes, doctor-patient consultations, and procedural videos. …”
    Get full text
    Article
  6. 266

    The role of personalization in influencing digital trust and impulse buying in e-commerce by David R. Hayrapetyan, Syuzi H. Darbinyan

    Published 2025-06-01
    “…Statistical data processing included cluster analysis, Pearson’s Chi-Square test, and graphical visualizations to identify trends. Results. The data analysis allowed to reveal three consumer segments in the sample under study which are characterized by a specific consumer behavior: 1) Security-Conscious Consumers value trusted brands and transparent personalization, 2) Price-Sensitive Consumers respond well to discount-driven personalization but exhibit lower impulse tendencies, and 3) Impulse Buyers are highly influenced by AI-driven recommendations and urgency-based marketing. …”
    Get full text
    Article
  7. 267

    Advancement of the DRPE Encryption Algorithm for Phase CGHs by Random Pixel Shuffling by Alfonso Blesa, Francisco J. Serón

    Published 2025-04-01
    “…The dimension of the CGHs determines the size of the keys based on the random generation of values by cryptographically secure algorithms, so the use of arithmetic encryption is proposed for data compression. …”
    Get full text
    Article
  8. 268

    The Relationship Between Artificial Intelligence and Critical Infrastructure Development: Bibliometric Analysis by Nataliia Trushkina

    Published 2025-04-01
    “…Bibliometric analysis and visualization of its results were carried out using the VOSviewer software product. …”
    Get full text
    Article
  9. 269
  10. 270
  11. 271

    Patch is enough: naturalistic adversarial patch against vision-language pre-training models by Dehong Kong, Siyuan Liang, Xiaopeng Zhu, Yuansheng Zhong, Wenqi Ren

    Published 2024-12-01
    “…Abstract Visual language pre-training (VLP) models have demonstrated significant success in various domains, but they remain vulnerable to adversarial attacks. …”
    Get full text
    Article
  12. 272

    SHIELD: an evaluation benchmark for face spoofing and forgery detection with multimodal large language models by Yichen Shi, Yuhao Gao, Yingxin Lai, Hongyang Wang, Jun Feng, Lei He, Jun Wan, Changsheng Chen, Zitong Yu, Xiaochun Cao

    Published 2025-06-01
    “…However, their ability to detect subtle visual spoofing and forgery clues in face attack detection tasks remains underexplored. …”
    Get full text
    Article
  13. 273

    Adverse reactions associated with meningococcal group B vaccine (4CMenB) in adults in special situations by María Fernández-Prada, Carmen Martínez-Ortega, Lara Hidalgo-Peña, Clara Álvarez-Vázquez, Rodrigo Aguirre-del Pino, Ismael Huerta-González

    Published 2018-09-01
    “…Objective: To know the safety profile of the 4CMenB vaccine in adults in special situations. Method: Security prospective study of phase IV. Inclusion criteria and some vaccination conditions were applied. …”
    Get full text
    Article
  14. 274
  15. 275
  16. 276
  17. 277
  18. 278
  19. 279
  20. 280

    A geotecnologia Smart Geo Layers (SGeoL) e sua aplicação para as políticas públicas: o caso do Painel de Segurança Hídrica (PSH) by Jorge Pereira da Silva, Frederico Araújo da Silva Lopes, Nélio Alessandro Azevedo Cacho, Alison Hedigliranes da Silva, George Ravelly da Silva Ribeiro

    Published 2023-10-01
    “…The SGeoL platform provides support for data integration, data visualization and data overlay. The platform also supports geographic processing, time series management, etc. …”
    Get full text
    Article