Showing 401 - 420 results of 841 for search 'security in visualization', query time: 0.10s Refine Results
  1. 401

    NeuralSyncTester: A tool for research and teaching in neural synchronization of multilayer tree parity machine networks by Iván Jirón-Araya, Rodrigo Jiménez, Rafael Martínez-Peláez, Miguel A. Solis

    Published 2025-09-01
    “…It features real-time visualization, dynamic progress tracking, and data analysis, including histograms and 3D graphs. …”
    Get full text
    Article
  2. 402
  3. 403

    Evaluation of Subway Emergency Evacuation Based on Combined Theoretical and Simulation Methods by Yang Hui, Shujie Su, Hui Peng

    Published 2024-12-01
    “…Following this, a real-time visualization simulation model was developed, which integrates the dynamic aspects of passenger flow and the transportation capacity of evacuation bottlenecks across various segments. …”
    Get full text
    Article
  4. 404
  5. 405

    Robust zero-watermarking for color images using hybrid deep learning models and encryption by Hager A. Gharib, Noha M. M. Abdelnapi, Khalid M. Hosny

    Published 2025-08-01
    “…In contrast, the average PSNR values of the attacked images reached 34.0692 dB, demonstrating the method’s superior robustness and visual quality. Compared to existing zero-watermarking algorithms, the proposed method shows superior robustness and security, making it highly effective for multimedia copyright protection.…”
    Get full text
    Article
  6. 406

    A hybrid super learner ensemble for phishing detection on mobile devices by Routhu Srinivasa Rao, Cheemaladinne Kondaiah, Alwyn Roshan Pais, Bumshik Lee

    Published 2025-05-01
    “…Abstract In today’s digital age, the rapid increase in online users and massive network traffic has made ensuring security more challenging. Among the various cyber threats, phishing remains one of the most significant. …”
    Get full text
    Article
  7. 407

    Introducing a novel 3D Chen-Rössler map for NTRU-based image encryption with OFDM transmission over a noisy channel by Alain F. Djomo, Lee Mariel H. Yepdia, Yannick P. K. Nkandeu, Yannick A. Abanda, Alain Tiedeu

    Published 2025-07-01
    “…Its efficiency is also confirmed by advanced quality measurements, including PSNR values of 84.2544 dB and 72.1794 dB, illustrating exceptional visual fidelity after decoding. Integrated with an FFT-OFDM transmission system, it clearly outperforms the DCT-OFDM variant in terms of noise robustness and bit error rate reduction, paving the way for secure, high-performance communications.…”
    Get full text
    Article
  8. 408

    An improved searching algorithm for indoor trajectory reconstruction by Min Li, Jingjing Fu, Yanfang Zhang, Zhujun Zhang, Siye Wang, Huafeng Kong, Rui Mao

    Published 2017-11-01
    “…Trajectory reconstruction of mobile targets in large-scale infrastructure enables events in a range of applications, such as regional security, tourism, and healthcare, to be visualized. …”
    Get full text
    Article
  9. 409

    PyWindAM: A Python software for wind field analysis and cloud-based data management by Nanxi Chen, Rujin Ma, Baixue Ge, Haocheng Chang

    Published 2024-12-01
    “…These critical wind parameters are securely stored in the InfluxDB database hosted on the server. …”
    Get full text
    Article
  10. 410

    A longitudinal EEG dataset of event-related potential by Yufeng Zhang, Hongxin Zhang, Yixuan Li, Yijun Wang, Xiaorong Gao, Chen Yang

    Published 2025-06-01
    “…Abstract Electroencephalogram (EEG)-based biometric emerges as a promising authentication method, offering a novel insight into the future security systems. However, its long-term stability and inter-individual variability necessitate further exploration. …”
    Get full text
    Article
  11. 411

    Semiotic Analysis of the Advertisement “iPhone 15 Face ID” Using Peirce’s Theory by Fairuz Khalisha, R. Myrna Nur Sakinah, Andang Saehu

    Published 2025-01-01
    “…Utilizing a constructivist methodology and qualitative research, this study focused on the visual, linguistic, and contextual components of the advertising and used the coding method for data analysis. …”
    Get full text
    Article
  12. 412

    REDUCING THE RISKS OF ILLICIT TRAFFICKING IN INDUSTRIAL PRODUCTS TO ACHIEVE SUSTAINABLE DEVELOPMENT GOALS by A. L. Lisovsky

    Published 2022-08-01
    “…In this regard, it is necessary to analyze the risks of existing mechanisms of protection against counterfeit products and develop measures to reduce them.The object of research in this article is labeling, which is the application of a special DataMatrix code to the packaging and the entry of this unit of goods into the database.The purpose of the article is to develop recommendations on the use of additional visual control tools on the material carriers of the DataMatrix code, protected from forgery, and to assess the probability of the level of risk reduction and the level of possible losses when using them.The novelty of this study was: identification and analysis of risks of possible threats to the security of the mandatory labeling system for various categories of goods; development of a risk register of possible threats to the security of the system with a grouping of qualitatively assessed and quantifiable risks; development and verification of a model for assessing the probability and possible losses for a group of quantifiable risks; assessment of the probability of risks and possible budget losses from non-payment of taxes and excise duties; assessment of the probability of risks and possible losses for a bona fide manufacturer and end user; formation of management measures aimed at reducing the likelihood of risks and reducing the consequences of the potential implementation of risks; assessment of the residual level of probability and exposure to risks when using additional means of visual control on the material carriers of the DataMatrix code; assessment of the residual level of probability and exposure to risks when using additional visual inspection tools on tangible media protected from counterfeiting in similar systems and Track&Trace marking systems implemented in foreign countries.The results obtained can be applied by federal executive authorities in the formation of state policy in the field of increasing the level of security of Russians, significantly reduce the amount of counterfeit and low-quality analogues, effectively combat smuggling, protect legal businesses and consumers, and also allow the state to increase tax collection.…”
    Get full text
    Article
  13. 413

    The Canadian Geospatial Data Infrastructure and health mapping by Sheng Gao, Darka Mioc, Xiaolun Yi, François Anton, Eddie Oldfield, David J. Coleman

    Published 2008-12-01
    “…Within the CGDI framework, this research enabled cross-border health data visualization, integration, sharing, and exploring the spatio-temporal trends of an infectious disease outbreak through thematic maps. …”
    Get full text
    Article
  14. 414

    Intelligent system-powered street lighting in ensuring efficiency and aesthetics of urban space by Sabina Bollano, Klaud Manehasa, Nataliia Melnyk

    Published 2025-04-01
    “…The study employed methods for analysing energy consumption, automatic lighting control, assessing visual aesthetics, monitoring light pollution and air quality, and assessing the impact of smart systems on security and public safety. …”
    Get full text
    Article
  15. 415

    Cloud Platform Selection Model in the Framework of Differential Quality Game With Fuzzy Information by Kaiyrbek Makulov, Arkadii A. Chikrii, Valery Lakhno, Bagdat Yagaliyeva, Volodimir Malyukov, Inna Malyukova, Miroslav Lakhno

    Published 2025-01-01
    “…The performed computational experiments confirmed the effectiveness of the model and allowed us to visualize the results of the interaction based on synthetic data. …”
    Get full text
    Article
  16. 416
  17. 417

    A Robust Cross-Channel Image Watermarking Technique for Tamper Detection and its Precise Localization by Muhammad Ashraf, Adnan Nadeem, Oussama Benrhouma, Muhammad Sarim, Kashif Rizwan, Amir Mehmood

    Published 2025-01-01
    “…Consequently, attackers can present the falsification of visual elements as a non-malicious perturbation. Such a type of attack poses a serious security challenge. …”
    Get full text
    Article
  18. 418
  19. 419

    Investigation of Spatiotemporal Changes and Impact Factors of Trade-Off Intensity in Cultivated Land Multifunctionality in the Min River Basin by Jingling Bao, Liyu Mao, Yufei Liu, Shuisheng Fan

    Published 2024-09-01
    “…In this paper, we take the Min River basin as a case study to construct a multifunctional evaluation system based on “agricultural production, social security, ecological service, and cultural landscape” using multi-source data. …”
    Get full text
    Article
  20. 420

    How did conservation agriculture go to scale? by Ricardo Ramirez, Cynthia Neudoerffer, Michael Salomons

    Published 2022-12-01
    “… Background: The Foodgrains Bank has an established record working in agriculture and food security with resource constrained, marginalized farmers in sub-Saharan Africa. …”
    Get full text
    Article