Showing 421 - 440 results of 841 for search 'security in visualization', query time: 0.08s Refine Results
  1. 421

    A Proposed Text Encryption inside Video Using Harris Corner Detection and Salas20 Encryption Algorithm by Fadhil Abbas Fadhil, Farah Tawfiq Abdul Hussien, Teba Walaa Aldeen Khairi, Nikolai Safiullin

    Published 2024-07-01
    “…The goal of this study is to increase the secrecy and security of textual information that is embedded in video content. …”
    Get full text
    Article
  2. 422
  3. 423
  4. 424

    Enhancing digital resilience through GEN-AI driven video content moderation and copyright protection by Muthumanickam K, Kathirvel T, Harish Vishnu K, Mukesh Rajan N

    Published 2025-04-01
    “…By combining automation with human intervention, this approach enhances moderation accuracy, copyright enforcement, and compliance with global content standards, fostering a more secure and resilient digital ecosystem. This system enhances digital resilience and security, making it applicable for defense and national security in protecting sensitive content.…”
    Get full text
    Article
  5. 425

    Migración y seguridad fronteriza Colombia – Venezuela: una revisión sistemática by Genny Torcoroma Navarro Claro, Carlos Alberto Pacheco Sánchez

    Published 2023-12-01
    “…This article aims to analyze trends in research on migration and border security, as well as to identify actions to address the various problems generated by this phenomenon on the Colombia-Venezuela border. …”
    Get full text
    Article
  6. 426

    Successful removal of a large intratracheal tumor using the injection-time-controllable manual jet ventilator via translaryngeal approach -a case report- by Darhae Eum, Hyun Joo Kim, Wyun Kon Park

    Published 2025-06-01
    “…Background Removal of intratracheal tumors is challenging due to the difficulty in securing a patent airway before surgery. We report a case of successful removal using jet ventilation with an injection-time-controllable manual jet ventilator. …”
    Get full text
    Article
  7. 427

    Making a Web-Based Service Request Management System Application at The Financial and Development Supervisory Agency (BPKP) by Mohamad Cholid Sefulloh, Ifan Junaedi, Anton Zulkarnain Sianipar

    Published 2025-07-01
    “…A company can store data quickly and securely using a computerized system rather than a manual one. …”
    Get full text
    Article
  8. 428
  9. 429

    Class and Data-Incremental Learning Framework for Baggage Threat Segmentation via Knowledge Distillation by Ammara Nasim, Saad Mazhar Khan, Anum Abdul Salam, Arslan Shaukat, Taimur Hassan, Adeel M. Syed, Muhammad Usman Akram

    Published 2025-01-01
    “…With air travel growing rapidly worldwide, airports are busier than ever, making efficient security screening a top priority. To meet this growing demand, various advanced X-ray baggage scanners have been deployed at airports worldwide. …”
    Get full text
    Article
  10. 430

    Examining the Impact of Spatial Configuration on Visitor Wayfinding and Building Permeability Through Space Syntax Analysis in Contemporary Natural Science Museum Typology by YUE Ho Bei, NASIR Muhammad Hafeez ABDUL, HASSAN Ahmad Sanusi, NORDIN Jestin

    Published 2025-07-01
    “…This separation limits visitors’ movement toward the private areas while ensuring users’ security. The clear distinction between public and private spaces allows for efficient space utilization, enhancing visitor experience while maintaining museums’ security and functionality.…”
    Get full text
    Article
  11. 431

    MICROHABITAT USE BY MERRIAM'S TURKEY BROODS IN WESTCENTRAL IDAHO by Frank B. Edelmann, Kerry P. Reese, Pete Zager

    Published 2000-01-01
    “…Abstract: We hypothesized that foraging and security requirements narrowly define suitable brood habitat for Merriam's turkey (Meleagris gallopavo merriami). …”
    Get full text
    Article
  12. 432
  13. 433

    Comparative Analysis of OECD Countries Based on Energy Trilemma Index: A Clustering Approach by Emre Akusta

    Published 2025-03-01
    “…Countries in the high group have achieved a high level of balance between energy security, energy equity, and environmental sustainability. …”
    Get full text
    Article
  14. 434

    Generation of cancellable locality sampled codes from facial images by Debanjan Sadhya, Utkarsh Utsav, Zahid Akhtar

    Published 2021-05-01
    “…Since this unimodal feature visually represents the identity of an individual, preserving the security of face‐based authentication models is a prime concern. …”
    Get full text
    Article
  15. 435

    Sustainable food management systems in pesantren by Nuryana Zalik, Haryadi Hari, Rahman Arif, Ichsan Yazida, Saifuddin Much Fuad, Aziz Muhammad Thariq, Herdian

    Published 2024-01-01
    “…A total of 112 documents were analyzed using VOSViewer to visualize publication patterns, authorship, research trends, and collaboration networks. …”
    Get full text
    Article
  16. 436

    Strategies and Tactics of Medical Social Advertising for Prevention and Treatment of Oncological Diseases by Yu. V. Donskova, A. D. Kurilova, Yu Zhang

    Published 2025-05-01
    “…It has been demonstrated that the primary strategies in this area of advertising include information dissemination, influencing recipients’ behavioral patterns, creating a specific emotional backdrop, and securing financial contributions. The tactical persuasion techniques encompass both directive demands and indirect means of persuasiveness (visualization, metaphorization, paradoxical statements, and playful tactics). …”
    Get full text
    Article
  17. 437

    The Advanced Real-Time Monitoring of New Welding Processes in the Aircraft Industry by David Castro, Julio Illade, Noelia Gonzalez, Soralla Pintos, Massimiliano Russello

    Published 2025-03-01
    “…The data transmission utilized the OPC UA protocol, ensuring secure, reliable real-time data flow to visualization interfaces in safe environments. …”
    Get full text
    Article
  18. 438

    Enhancing diabetic retinopathy detection through federated convolutional neural networks: Exploring different stages of progression by Saad Alanazi, Rayan Alanazi

    Published 2025-05-01
    “…Proper identification and treatment are critical for preventing visual loss. This paper presents a comprehensive solution for DR identification utilizing deep learning algorithms. …”
    Get full text
    Article
  19. 439

    Superpixel based robust reversible data hiding scheme exploiting Arnold transform with DCT and CA by Prabhash Kumar Singh, Biswapati Jana, Kakali Datta

    Published 2022-07-01
    “…The emergence of data hiding schemes was to provide multimedia security besides the sharing of information in a confidential manner. …”
    Get full text
    Article
  20. 440

    Personalized system for informing patients about critical levels of air pollution by D.S. Chuiko, Yu.A. Tarnavski

    Published 2025-07-01
    “…The application is integrated with Firebase to ensure the secure storage of user data and personalized notification settings. …”
    Get full text
    Article