Showing 361 - 380 results of 841 for search 'security in visualization', query time: 0.10s Refine Results
  1. 361
  2. 362

    Modeling and Classification of the Behavioral Patterns of Students Participating in Online Examination by B. J. Ferdosi, M. Rahman, A. M. Sakib, T. Helaly

    Published 2023-01-01
    “…Most of them are very resource-intensive; along with a webcam, they require additional hardware such as sensors, microphones, and security cameras. In this work, we propose an automated proctoring solution for paper- and pen-based online exams considering specific requirements of pen-and-paper exams. …”
    Get full text
    Article
  3. 363

    Identification and characterization of linear B-cell epitopes on African swine fever virus H171R protein by Cheng Xin, Zhuting Chen, Jingming Zhou, Yumei Chen, Yankai Liu, Hongliang Liu, Chao Liang, Xifang Zhu, Yanhua Qi, Gaiping Zhang, Aiping Wang

    Published 2024-12-01
    “…Structural modeling and visualization of the H171R protein provided insights into the spatial distribution and accessibility of the epitope regions. …”
    Get full text
    Article
  4. 364

    Silent Revolution in Research for Sustainability by Bruce Alder

    Published 2016-06-01
    “…For example, research on food security can and must go beyond quantifying how many people are hungry or undernourished. …”
    Get full text
    Article
  5. 365

    Arthroscopic All-Inside Posterior Cruciate Ligament Avulsion Fracture Suture Fixation With Double-Tunnel Pullout and High-Strength Suture Tape Augmentation Using Trans-septal Appro... by Marcello Capella, M.D., Davide D’Antonio, M.D., Luca Drocco, M.D., Luca Barberis, M.D., Daniele Vezza, M.D., Fortunato Giustra, M.D., Alessandro Massè, M.D.

    Published 2024-10-01
    “…This technique allows for anatomic reduction and stable fixation of the displaced fracture through optimal trans-septal visualization and the PCL whipstitching technique, further secured by the InternalBrace ligament augmentation, enabling early and intensive rehabilitation.…”
    Get full text
    Article
  6. 366
  7. 367

    Didgital-art цінних паперів by Oleh Kardash, Viktor Chelombitko

    Published 2021-12-01
    “…The purpose of the article is to determine the range of issues, to develop requirements for the decoration of industrial facilities and its place in digital art, its implementation in the design of securities. Methodology. System-comparative analysis of existing areas of digital art and graphic design; hermeneutic analysis; methods of geometric means adapted to graphic visualization; methods of analytical geometry. …”
    Get full text
    Article
  8. 368

    Modern Trends in the Digitalization of Higher Physical Education in China by Chen RUI

    Published 2025-03-01
    “…These technologies are particularly valuable for teaching complex movements and skills that require visualization and practice in a risk-free setting. For example, VR applications used in teaching sports like skiing allow students to experience and understand movements virtually before attempting them physically. …”
    Get full text
    Article
  9. 369

    Development and usability testing of an integrated geriatric care model (SMART system) to promote integrated home-based geriatric care by Rongrong Guo, Huan Fan, Shuqin Xiao, Ziling Zheng, Fangyu Yang, Yanyan Xiao, Xue Yang, Ying Wu

    Published 2025-03-01
    “…Methods The development of our SMART system was guided by the knowledge-based Clinical Decision Support System architecture and the principle of neural reflexes, which included 5 phases: (1) functional design; (2) architecture and database design; (3) security measures design; (4) user interface and visualization design; (5) prototypes development and iteratively testing. …”
    Get full text
    Article
  10. 370
  11. 371
  12. 372
  13. 373
  14. 374
  15. 375

    Legacy ICS Cybersecurity Assessment Using Hybrid Threat Modeling—An Oil and Gas Sector Case Study by Mohamed Badawy, Nada H. Sherief, Ayman A. Abdel-Hamid

    Published 2024-09-01
    “…As security breaches are increasingly widely reported in today’s culture, cybersecurity is gaining attention on a global scale. …”
    Get full text
    Article
  16. 376

    High-resolution RGB image dataset for wheat seed varietal identification and purity assessmentZenodoMendeley Data by Mehreen Nawaz, Sadaf Safder, Shazia Riaz, Saqib Ali

    Published 2025-08-01
    “…Recognizing and identifying seed varieties is still performed manually through direct visual inspection, which is labor-intensive, time-consuming, and prone to errors. …”
    Get full text
    Article
  17. 377

    Hospitals’ financial performance across European countries: a scoping review protocol by Katarzyna Dubas‐Jakóbczyk, Costase Ndayishimiye, Przemysław Szetela, Christoph Sowada

    Published 2024-01-01
    “…Furthermore, reference lists of relevant papers will be visually scanned to identify further studies of interest. …”
    Get full text
    Article
  18. 378
  19. 379
  20. 380