Showing 321 - 340 results of 841 for search 'security in visualization', query time: 0.10s Refine Results
  1. 321

    A/B testing as an effective instrument for adaptation of the user interface at the iterative model of developing applications for mobile devices by Y. G. Pavlovich, I. F. Kirinovich

    Published 2021-02-01
    “…There was also a data security issue in the application, which put users at risk of data loss. …”
    Get full text
    Article
  2. 322
  3. 323

    Localization of the production: international experience and imperatives of russia in the conditions of sanctions regime by T. N. Topoleva

    Published 2022-06-01
    “…We have made a conclusion about the necessity of forming of effective localization strategy, overcoming of declarative character of import substitution in the key spheres of real sector of Russian economy which will help to solve the problems of national security provision and technological independence. …”
    Get full text
    Article
  4. 324

    Imagined pet touch versus non-tactile presence: A within-person experimental study of emotional support during stress by Brian N. Chin, Cat S. Crocker, Noah M. McEachern

    Published 2025-08-01
    “…In a within-person experiment conducted in April 2025, 196 US cat and dog owners imagined receiving support from their pet in two scenarios during a guided visualization task. In both conditions, participants visualized the same stressful life event; one scenario involved imagined pet presence without touch, and the other involved imagined physical contact. …”
    Get full text
    Article
  5. 325

    Social science research in Indonesia (1999–2023): Identifying hotspots and trends through bibliometrics by Prakoso Bhairawa Putera, Amelya Gustina, Reny Nirmala, Azhar Azhar, Nengyanti Nengyanti

    Published 2024-12-01
    “…Significant efforts are needed to enhance the presence and impact of Indonesian social science thought globally.Objectives: To identify hotspots and trends in research from Indonesia in social sciences from 1999 to 2023 and also to identify dominant research clusters, their alignment with the UN Sustainable Development Goals, and prevalent methodologies to serve as a guide to future research and policymaking.Methods: We employed bibliometric analysis and VOSviewer visualization to examine articles by Indonesian authors in the Scopus database, to group the articles into clusters based on their research focus, and to examine their alignment with various SDGs.Results: We identified five dominant research clusters: (1) climate change and environmental governance, (2) Sunda Isles and archaeological evidence, (3) urban development, (4) rural development and economic impact, and (5) empowerment and food security. …”
    Get full text
    Article
  6. 326

    Understanding the Effects of Changing Weather: A Case of Flash Flood in Morogoro on January 11, 2018 by Offoro Neema Kimambo, Hector Chikoore, Jabulani Ray Gumbo

    Published 2019-01-01
    “…Regardless of where, when, and how the event has happened, floods affect social security as well as environmental damages. Understanding floods dynamics, their impacts, and management is thus critical, especially in climate risk assessment. …”
    Get full text
    Article
  7. 327

    Mapping the research landscape of livestock adaptation to climate change: a bibliometric review using Scopus database (1994–2023) by Jabulile Zamokuhle Manyike, Amon Taruvinga, Babatope E. Akinyemi

    Published 2025-05-01
    “…Analytical tools such as Biblioshiny and VOSviewer were used for data processing and visualization. Findings reveal a consistent growth in research output, particularly post-2007, with the United States, China, and France emerging as leading contributors. …”
    Get full text
    Article
  8. 328

    Internet of Things in Medicine: a Bibliometric Review by Meysam Alavi, Motahareh Dehghan

    Published 2024-07-01
    “…The research analyzes 7,205 articles indexed in the Web of Science (WoS) database, covering the period from 2013 to August 2024. Data visualization was conducted using VOSviewer software. …”
    Get full text
    Article
  9. 329
  10. 330

    ESP32-CAM-based Smart Surveillance: Real-time Transmission and Alerts Via Telegram by Fernando Esparza-Segundo, Shany-Lizbeth Enríquez-Arcadio, Juan Carlos Gonzalez-Islas, Alberto Suarez-Navarrete, Ma. de Jesus Gutiérrez-Sanchez

    Published 2025-06-01
    “… Currently, mobile video surveillance systems represent a fundamental role in security and remote monitoring, allowing continuous and real-time access from any location. …”
    Get full text
    Article
  11. 331

    MODEL OF THE PROCESS OF FUNCTIONING OF THE INFORMATION PROTECTION SYSTEM FROM UNAUTHORIZED ACCESS CREATED IN THE SOFTWARE ENVIRONMENT OF IMITATION MODELING "CPN TOOLS" by O. I. Bokova, I. G. Drovnikov, A. D. Popov, E. A. Rogozin

    Published 2019-07-01
    “…The presented im-model model of protecting information from unauthorized access in the software environment “CPN Tools” can be used as a tool in assessing the security of special bodies for the attestation of informatization objects and structural divisions of authorized departments. …”
    Get full text
    Article
  12. 332
  13. 333

    Identifikasi Malicious Host dalam Local Area Network Menggunakan Teknik Graph Clustering dan Filtering by Khafidzun Fadli, Achmad Basuki, Eko Setiawan

    Published 2020-05-01
    “…Abstract Local Area Network (LAN) security is a serious problem to consider. The cause of LAN becomes insecure because firewall technology is not able to protect the host (computer) in LAN from spreading malware. …”
    Get full text
    Article
  14. 334
  15. 335
  16. 336

    A comparative study of deepfake facial manipulation technique using generative adversarial networks by Wasin Al Kishri, Jabar H. Yousif, Mahmood Al Bahri, Muhammad Zakarya, Naveed Khan, Sanad Sulaiman Al Maskari, Ahmet Gurhanli

    Published 2025-06-01
    “…Due to the development of image processing tools and visualization techniques integrating deep learning and artificial intelligence (AI) algorithms (in particular generative adversarial networks–GAN), this can pose serious threats to privacy and security. …”
    Get full text
    Article
  17. 337

    INTERPRETATION OF FINANCIAL ASPECTS OF INTELLECTUAL PROPERTY COMMERCIALIZATION AS AN INNOVATIVE PRODUCT by L. Vasyurenko, I. Kuksa, I. Shtuler, N. Gerasymchuk, I. Podik

    Published 2021-01-01
    “…The process of intellectual property commercialization is modeled, in the form of a generalized visualization of its movement to an innovative product, which involves four successive steps (the path to the market), choosing one of the forms of commercialization typology that provides the maximum possible variability for choosing the optimal strategy. …”
    Get full text
    Article
  18. 338

    Mapping Longitudinal and Transverse Displacements of a Dam Crest Based on the Synergy of High-Precision Remote Sensing by Fabiola D. Yépez-Rincón, Adrián L. Ferriño Fierro, Andrea N. Escobedo Tamez, Víctor H. Guerra Cobián, Olmo E. Pinedo Sandoval, Jorge H. Chávez Gómez, Luis C. Alatorre Cejudo, Saied Pirasteh

    Published 2024-01-01
    “…Reservoirs are highly relevant infrastructure assets, and now, more than ever, they play an essential role in society’s welfare and national security. Their importance is related to regional socioeconomic development due to their capacity to store water for different uses, such as human consumption, agricultural irrigation, flood control, and hydroelectric energy production, among other important services. …”
    Get full text
    Article
  19. 339

    Bioluminescent imaging of an oomycete pathogen empowers chemical selections and rational fungicide applications by Han Chen, Jiana Mao, Yujie Fang, Waqas Raza, Zhi Li, Chongyuan Zhang, Yingguang Zhu, Yuanchao Wang, Suomeng Dong

    Published 2025-05-01
    “…Abstract Fungicides play an indispensable role in ensuring food security. However, rational chemical selection and fungicide precision application guidance remain constrained by the limitations in real-time monitoring of tracking pathogens within plant tissues. …”
    Get full text
    Article
  20. 340

    You Only Attack Once: Single-Step DeepFool Algorithm by Jun Li, Yanwei Xu, Yaocun Hu, Yongyong Ma, Xin Yin

    Published 2024-12-01
    “…Adversarial attacks expose the latent vulnerabilities within artificial intelligence systems, necessitating a reassessment and enhancement of model robustness to ensure the reliability and security of deep learning models against malicious attacks. …”
    Get full text
    Article