-
441
Digital Forensic Analysis of UAV Flight Data Using Static and Dynamic Methods in Coal Mining Area
Published 2025-06-01“…However, unauthorized UAV flights present security risks that necessitate forensic investigation. …”
Get full text
Article -
442
Modelling the Accommodation Preferences of Tourists by Combining Fuzzy-AHP and GIS Methods
Published 2021-01-01“…The adopted criteria are the cost per room, the distance from the center, the level of security, the place rating, and the availability of free cancellation and breakfast. …”
Get full text
Article -
443
Spatial–temporal distribution of farmland occupation and compensation and its impact on ecological service value in China from 1990 to 2021
Published 2025-04-01“…This policy effectively curbed the reduction of farmland, but the compensated land often comes from mountainous and desert areas, leading to fragmentation of farmland and subsequent ecological security issues. The balance between farmland requisition and compensation is closely related to ecological security. …”
Get full text
Article -
444
Investigating Brute Force Attack Patterns in IoT Network
Published 2019-01-01“…An insider/internal attack launched from an internal network endangers more the entire IoT security system. The experiments use the IoT network testbed that mimic the internal attack scenario with three major goals: (i) to provide a topological description on how an insider attack occurs; (ii) to achieve attack pattern extraction from raw sniffed data; and (iii) to establish attack pattern identification as a parameter to visualize real-time attacks. …”
Get full text
Article -
445
-
446
Research on airport baggage anomaly retention detection technology based on machine vision, edge computing, and blockchain
Published 2024-12-01“…Furthermore, blockchain technology greatly enhances system security during operation. A model trained on a sample set of 4600 images achieved a luggage recognition rate of 96.9% and an anomaly detection rate of 95.8% in simulated test videos.…”
Get full text
Article -
447
Analyzing Key Features of Open Source Software Survivability with Random Forest
Published 2025-01-01Get full text
Article -
448
The Power of Social Media: A Narrative Analysis of Rohingya Refugee Rejection on TikTok
Published 2025-04-01“…Ali Hamzah uses a narrative strategy that includes emotional language, persuasive visual techniques, and framing the issue as a national security threat. …”
Get full text
Article -
449
DWT-SVD Based Watermarking for High-Resolution Medical Holographic Images
Published 2022-01-01“…Watermarking is one of the most common techniques used to protect data’s authenticity, integrity, and security. The obfuscation in the frequency domain used in the watermarking method makes the watermarking stronger than the obfuscation in the spatial domain. …”
Get full text
Article -
450
Deepfake Detection Method Integrating Multiple Parameter-Efficient Fine-Tuning Techniques
Published 2024-12-01Get full text
Article -
451
A vision-language model for predicting potential distribution land of soybean double cropping
Published 2025-01-01“…AgriCLIP’s ability to seamlessly integrate visual and contextual information not only advances prediction accuracy but also provides interpretable insights for agricultural planning and climate adaptation strategies, offering a robust and scalable solution for addressing the challenges of food security in the context of global climate change.…”
Get full text
Article -
452
The Impact of Stone Quarrying on Socio Economic Status of Households in Nyakyibigi Ntungamo Municipality.
Published 2023“…The study recommended there should be strengthening of security in quarrying areas in order to protect the quarrying activities which leads to improvement at the quarrying site, there should be carefully pre-planning of the project to ensure that the quarrying process takes place well and in its actual state because when this one is done, then the activity also goes on well to facilitate the desires of the community and there should be fitting of drills with dust collection systems and purchasing additional land surrounding the mine to act as a buffer zone and trees planted in these buffer zones can also minimize the visual impact of quarrying operations on local communities.…”
Get full text
Thesis -
453
-
454
Effective Reduction and Centralization of the Extruded Medial Meniscus With Capsular Advancement
Published 2025-07-01“…Knotless suture anchors are used to secure the meniscus in a centralized position, restoring the meniscus's function and reducing medial compartment pressures. …”
Get full text
Article -
455
Multi-Source Heterogeneous Data-Driven Digital Delivery System for Oil and Gas Surface Engineering
Published 2025-06-01“…The model construction adopts a structured data architecture and dynamic governance strategies, supporting multi-project secure collaboration and full lifecycle data management. …”
Get full text
Article -
456
Transchain: Blockchain-Based Management of Allografts for Enhancing Data Provenance
Published 2025-01-01Get full text
Article -
457
The experience of using magnetic resonance imaging of the uterus and its appendages as an alternative to X-ray hysterosalpingography
Published 2016-11-01“…MRHSG on the apparatus with the induction of the magnetic field of 3 T in diagnosis of obstruction of the fallopian tubes and the visualization of the uterus and appendages diseases can be optimal and safe alternative to the X-ray hysterosalpingography, which accompanied with radiation exposure and is a number of side effects.…”
Get full text
Article -
458
-
459
Using UMAP for Partially Synthetic Healthcare Tabular Data Generation and Validation
Published 2024-12-01“…This study introduces a novel methodology for partially synthetic tabular data generation, designed to reduce the reliance on sensor measurements and ensure secure data exchange. Using the UMAP (Uniform Manifold Approximation and Projection) visualization algorithm to transform the original, high-dimensional reference data set into a reduced-dimensional space, we generate and validate synthetic values for incomplete data sets. …”
Get full text
Article -
460
NONCONVENTIONAL RADIOLOGICAL TECHNOLOGIES AND PROCESSES USED FOR NEUROSURGERY IN CORRELATION WITH INTELLECTUAL PROPERTY PROTECTION WITH DIRECT APPLICATION IN HEALTHCARE ORGANIZATIO...
Published 2025-06-01“…PACS facilitates the efficient management of radiological CT images, providing fast and secure access to patient data. This work considerably simplifies the process of diagnosis and planning of neurosurgical treatment. …”
Get full text
Article