Showing 301 - 320 results of 841 for search 'security in visualization', query time: 0.49s Refine Results
  1. 301

    A Set of Tools and Data Management Framework for the IoT–Edge–Cloud Continuum by Janis Judvaitis, Eduards Blumbergs, Audris Arzovs, Andris Ivars Mackus, Rihards Balass, Leo Selavo

    Published 2024-12-01
    “…Internet of Things (IoT), Edge, and Cloud components combined with artificial intelligence (AI) in data processing systems must ensure strong security and privacy for data sources. The approach of the IECC Data Management Framework (DMF) introduces a novel combination of multiple easy-to-configure plugin environments using data visualization features. …”
    Get full text
    Article
  2. 302

    ONLINE MEDIA MONITORING AND EVALUATION: COMPARATIVE APPROACHES by Saadat Abdullayeva

    Published 2025-07-01
    “…Such mechanisms are significant for the effective management of information flows, formation of public opinion and safeguarding of national information security. In terms of digital transformation, the rapid dissemination and constant evolution of media content require continuous monitoring and evaluation. …”
    Get full text
    Article
  3. 303

    Research on the Locomotive Data Application System Based on 5G High Speed Network by YAO Quanle, LI Fei, WANG Chao, WANG Chengfu, LIU Qi

    Published 2022-04-01
    “…The system has the functions of vehicle-mounted multi-system data acquisition, high speed dumping of vehicle-ground data, data encryption transmission, continuous transmission of massive data at breakpoints, multi-system linkage analysis, automatic data association, audio and video intelligent analysis, and big data visualization analysis. The on-site application proves that full automatic and encrypted data transmission of the system avoid security risks such as data loss and leakage. …”
    Get full text
    Article
  4. 304

    Transitioning from traditional laboratory records to electronic laboratory records: a modern approach to data management by Gao Mingzhou, Zhou Wanqing, Hu Minghui, Sun Ya, Zhang Jie, Zhang Hao

    Published 2025-07-01
    “…With features like real-time recording, traceability, strong security and confidentiality, easy sharing and collaboration, and data visualization, these digital systems effectively address the shortcomings of traditional practices. …”
    Get full text
    Article
  5. 305

    Mechanisms and effects of the sustainable integration of digital-driven rural cultural tourism from the perspective of symbiosis by Liguo Yang, Wangfen Ning

    Published 2025-12-01
    “…However, problems such as the digital divide, information security, and insufficient talent remain, so the joint efforts of multiple rural actors are needed to achieve innovative, intelligent, and sustainable digital cultural tourism development.…”
    Get full text
    Article
  6. 306

    Design and Implementation of Network and Server Monitoring Using Zabbix at The Financial and Development Supervisory Agency by Denna Irianto, Verdi Yasin, Anton Zulkarnain Sianipar

    Published 2025-07-01
    “…The implementation results show that Zabbix is capable of providing comprehensive data visualization, real-time monitoring, and an effective alert system. …”
    Get full text
    Article
  7. 307

    An Interdisciplinary Approach to Experiential Learning in Cyberbiosecurity and Agriculture Through Workforce Development by Kellie Johnson, Tiffany Drape, Joseph Oakes, Joseph Simpson, Ann Brown, Donna M. Westfall-Rudd, Susan Duncan

    Published 2023-10-01
    “…The objectives of this work were 1) to learn key concepts in cybersecurity, including data security, visualization, and analysis, to name a few, through class activities and engagement with professional partners and 2) to understand what knowledge students gained from participating in the course could transfer over for when they enter the workforce. …”
    Get full text
    Article
  8. 308

    SARRA-Py: A Python-based geospatial simulation framework for agroclimatic modeling by Jérémy Lavarenne, Asse Mbengue

    Published 2025-05-01
    “…Consequently, SARRA-Py fosters reproducible, scenario-based analyses and informs decision-making in vulnerable regions where water deficits, sparse ground observations, and climate variability threatens food security.…”
    Get full text
    Article
  9. 309
  10. 310

    RADAR#: An Ensemble Approach for Radicalization Detection in Arabic Social Media Using Hybrid Deep Learning and Transformer Models by Emad M. Al-Shawakfa, Anas M. R. Alsobeh, Sahar Omari, Amani Shatnawi

    Published 2025-06-01
    “…The recent increase in extremist material on social media platforms makes serious countermeasures to international cybersecurity and national security efforts more difficult. RADAR#, a deep ensemble approach for the detection of radicalization in Arabic tweets, is introduced in this paper. …”
    Get full text
    Article
  11. 311

    Harmonization of Accounting, Auditing and Analysis in a Digital Economy by O. V. Rozhnova

    Published 2018-08-01
    “…Three principles on which the development of the accounting sphere in the conditions of the digital economy should be built: the provision of information security; continuous interaction of the accounting sector with other areas of the economy; visualization of knowledge. …”
    Get full text
    Article
  12. 312

    Addressing global challenges: How does the integration of rural industries in China enhance agricultural resilience? by Xiaoli Zhou, Mingyang Han

    Published 2025-01-01
    “…This study constructs provincial-level panel data for China spanning 2012-2022 and employs a multidimensional, visualization-based, and spatial research paradigm to comprehensively examine the impact effects and mechanisms through which rural industrial integration empowers agricultural resilience in China. …”
    Get full text
    Article
  13. 313

    A Column Encryption-Based Privacy-Preserving Framework for Hadoop Big Data Sets by Hidayath Ali Baig

    Published 2024-05-01
    “…These include, but are not limited to, data storage, exchange, curation, transit, analysis, visualization, security and privacy. In this research, the privacy implications of Big Data analytics are being investigated. …”
    Get full text
    Article
  14. 314

    Emerging Trends in AI-Based Soil Contamination Monitoring and Prevention by Cosmina-Mihaela Rosca, Adrian Stancu

    Published 2025-06-01
    “…Soil health directly impacts food security, so investigating contaminants is a topic of interest for the anticipatory study of the action–effect correlation. …”
    Get full text
    Article
  15. 315

    Digitalization As a Socio-Economic Challenge: Modeling the Impact On the Level of Cybercrime Considering Socio-Economic, Technological and Institutional Factors by Hanna Yarovenko, Olha Horbachova, Roman Bylbas, Dmytro Latysh

    Published 2025-07-01
    “…All stages of data processing, model building and visualization of results were implemented using the Python programming language. …”
    Get full text
    Article
  16. 316

    Wind Power Short-Term Prediction Method Based on Time-Domain Dual-Channel Adaptive Learning Model by Haotian Guo, Keng-Weng Lao, Junkun Hao, Xiaorui Hu

    Published 2025-07-01
    “…The ACON adaptive activation function autonomously learns optimal activation patterns, with fused features visualized through visualization techniques. Validation on two wind farm datasets (A/B) demonstrates that the proposed method reduces RMSE by at least 8.89% compared to the best deep learning baseline, exhibits low sensitivity to time window sizes, and establishes a novel paradigm for forecasting highly volatile renewable energy power.…”
    Get full text
    Article
  17. 317

    Research on grid based fire warning algorithm with YOLOv5s for palace buildings by Zhiming Wang, Jiangnan Peng, Xinzhi Liu, Changan Di, Bo Wang

    Published 2024-01-01
    “…In response to the early warning requirements of fire security technology in the Imperial Palace & large Ming and Qing ancient architectural complexes in China, a grid based fire warning algorithm is proposed by combining neural network YOLOv5s smoke detection technology. …”
    Get full text
    Article
  18. 318

    Blockchain-based privacy-preserving multi-tasks federated learning framework by Yunyan Jia, Ling Xiong, Yu Fan, Wei Liang, Neal Xiong, Fengjun Xiao

    Published 2024-12-01
    “…First, a temporary committee is formed for an FL task to facilitating visualization, organization and management of security aggregation. …”
    Get full text
    Article
  19. 319

    Digital technologies in territorial development: Opportunities and challenges of application in state and municipal administration by Ivan A. Antipin, Natalya Yu. Vlasova, Elena A. Shishkina

    Published 2025-01-01
    “…Synthesis, data analysis, visualization, and ex pert assessment are applied as research methods. …”
    Get full text
    Article
  20. 320