-
421
A Proposed Text Encryption inside Video Using Harris Corner Detection and Salas20 Encryption Algorithm
Published 2024-07-01“…The goal of this study is to increase the secrecy and security of textual information that is embedded in video content. …”
Get full text
Article -
422
One-step loop-mediated isothermal amplification system for Mycobacterium marinum detection
Published 2025-07-01Get full text
Article -
423
Improved protection for colour images via invertible colour‐to‐grey, image distortion, and visible‐imperceptible watermarking
Published 2024-11-01“…Finally, quantitative results are supported by visual comparisons.…”
Get full text
Article -
424
Enhancing digital resilience through GEN-AI driven video content moderation and copyright protection
Published 2025-04-01“…By combining automation with human intervention, this approach enhances moderation accuracy, copyright enforcement, and compliance with global content standards, fostering a more secure and resilient digital ecosystem. This system enhances digital resilience and security, making it applicable for defense and national security in protecting sensitive content.…”
Get full text
Article -
425
Migración y seguridad fronteriza Colombia – Venezuela: una revisión sistemática
Published 2023-12-01“…This article aims to analyze trends in research on migration and border security, as well as to identify actions to address the various problems generated by this phenomenon on the Colombia-Venezuela border. …”
Get full text
Article -
426
Successful removal of a large intratracheal tumor using the injection-time-controllable manual jet ventilator via translaryngeal approach -a case report-
Published 2025-06-01“…Background Removal of intratracheal tumors is challenging due to the difficulty in securing a patent airway before surgery. We report a case of successful removal using jet ventilation with an injection-time-controllable manual jet ventilator. …”
Get full text
Article -
427
Making a Web-Based Service Request Management System Application at The Financial and Development Supervisory Agency (BPKP)
Published 2025-07-01“…A company can store data quickly and securely using a computerized system rather than a manual one. …”
Get full text
Article -
428
-
429
Class and Data-Incremental Learning Framework for Baggage Threat Segmentation via Knowledge Distillation
Published 2025-01-01“…With air travel growing rapidly worldwide, airports are busier than ever, making efficient security screening a top priority. To meet this growing demand, various advanced X-ray baggage scanners have been deployed at airports worldwide. …”
Get full text
Article -
430
Examining the Impact of Spatial Configuration on Visitor Wayfinding and Building Permeability Through Space Syntax Analysis in Contemporary Natural Science Museum Typology
Published 2025-07-01“…This separation limits visitors’ movement toward the private areas while ensuring users’ security. The clear distinction between public and private spaces allows for efficient space utilization, enhancing visitor experience while maintaining museums’ security and functionality.…”
Get full text
Article -
431
MICROHABITAT USE BY MERRIAM'S TURKEY BROODS IN WESTCENTRAL IDAHO
Published 2000-01-01“…Abstract: We hypothesized that foraging and security requirements narrowly define suitable brood habitat for Merriam's turkey (Meleagris gallopavo merriami). …”
Get full text
Article -
432
-
433
Comparative Analysis of OECD Countries Based on Energy Trilemma Index: A Clustering Approach
Published 2025-03-01“…Countries in the high group have achieved a high level of balance between energy security, energy equity, and environmental sustainability. …”
Get full text
Article -
434
Generation of cancellable locality sampled codes from facial images
Published 2021-05-01“…Since this unimodal feature visually represents the identity of an individual, preserving the security of face‐based authentication models is a prime concern. …”
Get full text
Article -
435
Sustainable food management systems in pesantren
Published 2024-01-01“…A total of 112 documents were analyzed using VOSViewer to visualize publication patterns, authorship, research trends, and collaboration networks. …”
Get full text
Article -
436
Strategies and Tactics of Medical Social Advertising for Prevention and Treatment of Oncological Diseases
Published 2025-05-01“…It has been demonstrated that the primary strategies in this area of advertising include information dissemination, influencing recipients’ behavioral patterns, creating a specific emotional backdrop, and securing financial contributions. The tactical persuasion techniques encompass both directive demands and indirect means of persuasiveness (visualization, metaphorization, paradoxical statements, and playful tactics). …”
Get full text
Article -
437
The Advanced Real-Time Monitoring of New Welding Processes in the Aircraft Industry
Published 2025-03-01“…The data transmission utilized the OPC UA protocol, ensuring secure, reliable real-time data flow to visualization interfaces in safe environments. …”
Get full text
Article -
438
Enhancing diabetic retinopathy detection through federated convolutional neural networks: Exploring different stages of progression
Published 2025-05-01“…Proper identification and treatment are critical for preventing visual loss. This paper presents a comprehensive solution for DR identification utilizing deep learning algorithms. …”
Get full text
Article -
439
Superpixel based robust reversible data hiding scheme exploiting Arnold transform with DCT and CA
Published 2022-07-01“…The emergence of data hiding schemes was to provide multimedia security besides the sharing of information in a confidential manner. …”
Get full text
Article -
440
Personalized system for informing patients about critical levels of air pollution
Published 2025-07-01“…The application is integrated with Firebase to ensure the secure storage of user data and personalized notification settings. …”
Get full text
Article