Showing 441 - 460 results of 841 for search 'security in visualization', query time: 0.09s Refine Results
  1. 441

    Digital Forensic Analysis of UAV Flight Data Using Static and Dynamic Methods in Coal Mining Area by Muhammad Yusuf Halim, Ahmad Luthfi

    Published 2025-06-01
    “…However, unauthorized UAV flights present security risks that necessitate forensic investigation. …”
    Get full text
    Article
  2. 442

    Modelling the Accommodation Preferences of Tourists by Combining Fuzzy-AHP and GIS Methods by Ali Mahdi, Domokos Esztergár-Kiss

    Published 2021-01-01
    “…The adopted criteria are the cost per room, the distance from the center, the level of security, the place rating, and the availability of free cancellation and breakfast. …”
    Get full text
    Article
  3. 443

    Spatial–temporal distribution of farmland occupation and compensation and its impact on ecological service value in China from 1990 to 2021 by Yuhao Li, Shuhui Shangguan, Wenyu Li, Shuang Liu, Yijin Li, Rui Han, Jingwen Xu

    Published 2025-04-01
    “…This policy effectively curbed the reduction of farmland, but the compensated land often comes from mountainous and desert areas, leading to fragmentation of farmland and subsequent ecological security issues. The balance between farmland requisition and compensation is closely related to ecological security. …”
    Get full text
    Article
  4. 444

    Investigating Brute Force Attack Patterns in IoT Network by Deris Stiawan, Mohd. Yazid Idris, Reza Firsandaya Malik, Siti Nurmaini, Nizar Alsharif, Rahmat Budiarto

    Published 2019-01-01
    “…An insider/internal attack launched from an internal network endangers more the entire IoT security system. The experiments use the IoT network testbed that mimic the internal attack scenario with three major goals: (i) to provide a topological description on how an insider attack occurs; (ii) to achieve attack pattern extraction from raw sniffed data; and (iii) to establish attack pattern identification as a parameter to visualize real-time attacks. …”
    Get full text
    Article
  5. 445
  6. 446

    Research on airport baggage anomaly retention detection technology based on machine vision, edge computing, and blockchain by Yuzhou Chen, Gang Mao, Xue Yang, Mingqian Du, Hongqing Song

    Published 2024-12-01
    “…Furthermore, blockchain technology greatly enhances system security during operation. A model trained on a sample set of 4600 images achieved a luggage recognition rate of 96.9% and an anomaly detection rate of 95.8% in simulated test videos.…”
    Get full text
    Article
  7. 447
  8. 448

    The Power of Social Media: A Narrative Analysis of Rohingya Refugee Rejection on TikTok by Munirah, Rauzatul Jannah, Amalia, Muhammad Nur Farhan Zamziba

    Published 2025-04-01
    “…Ali Hamzah uses a narrative strategy that includes emotional language, persuasive visual techniques, and framing the issue as a national security threat. …”
    Get full text
    Article
  9. 449

    DWT-SVD Based Watermarking for High-Resolution Medical Holographic Images by Fahrettin Horasan, Muhammed Ali Pala, Ali Durdu, Akif Akgül, Ömer Faruk Akmeşe, Mustafa Zahid Yıldız

    Published 2022-01-01
    “…Watermarking is one of the most common techniques used to protect data’s authenticity, integrity, and security. The obfuscation in the frequency domain used in the watermarking method makes the watermarking stronger than the obfuscation in the spatial domain. …”
    Get full text
    Article
  10. 450
  11. 451

    A vision-language model for predicting potential distribution land of soybean double cropping by Bei Gao, Yuefeng Liu, Yanli Li, Hongmei Li, Meirong Li, Wenli He

    Published 2025-01-01
    “…AgriCLIP’s ability to seamlessly integrate visual and contextual information not only advances prediction accuracy but also provides interpretable insights for agricultural planning and climate adaptation strategies, offering a robust and scalable solution for addressing the challenges of food security in the context of global climate change.…”
    Get full text
    Article
  12. 452

    The Impact of Stone Quarrying on Socio Economic Status of Households in Nyakyibigi Ntungamo Municipality. by Natweeta, Elvason

    Published 2023
    “…The study recommended there should be strengthening of security in quarrying areas in order to protect the quarrying activities which leads to improvement at the quarrying site, there should be carefully pre-planning of the project to ensure that the quarrying process takes place well and in its actual state because when this one is done, then the activity also goes on well to facilitate the desires of the community and there should be fitting of drills with dust collection systems and purchasing additional land surrounding the mine to act as a buffer zone and trees planted in these buffer zones can also minimize the visual impact of quarrying operations on local communities.…”
    Get full text
    Thesis
  13. 453
  14. 454

    Effective Reduction and Centralization of the Extruded Medial Meniscus With Capsular Advancement by S. Ali Ghasemi, M.D., Ryan S. Zamanzadeh, M.D., Benjamin C. Murray, D.O., Gene W. Shaffer, M.D., James S. Raphael, M.D., Arthur R. Bartolozzi, M.D.

    Published 2025-07-01
    “…Knotless suture anchors are used to secure the meniscus in a centralized position, restoring the meniscus's function and reducing medial compartment pressures. …”
    Get full text
    Article
  15. 455

    Multi-Source Heterogeneous Data-Driven Digital Delivery System for Oil and Gas Surface Engineering by Wei Zhang, Zhixiang Dai, Taiwu Xia, Gangping Chen, Yihua Zhang, Jun Zhou, Cui Liu

    Published 2025-06-01
    “…The model construction adopts a structured data architecture and dynamic governance strategies, supporting multi-project secure collaboration and full lifecycle data management. …”
    Get full text
    Article
  16. 456
  17. 457

    The experience of using magnetic resonance imaging of the uterus and its appendages as an alternative to X-ray hysterosalpingography by A. F. Akhatov, S. A. Ryzhkin, M. K. Mikhaylov

    Published 2016-11-01
    “…MRHSG on the apparatus with the induction of the magnetic field of 3 T in diagnosis of obstruction of the fallopian tubes and the visualization of the uterus and appendages diseases can be optimal and safe alternative to the X-ray hysterosalpingography, which accompanied with radiation exposure and is a number of side effects.…”
    Get full text
    Article
  18. 458
  19. 459

    Using UMAP for Partially Synthetic Healthcare Tabular Data Generation and Validation by Carla Lázaro, Cecilio Angulo

    Published 2024-12-01
    “…This study introduces a novel methodology for partially synthetic tabular data generation, designed to reduce the reliance on sensor measurements and ensure secure data exchange. Using the UMAP (Uniform Manifold Approximation and Projection) visualization algorithm to transform the original, high-dimensional reference data set into a reduced-dimensional space, we generate and validate synthetic values for incomplete data sets. …”
    Get full text
    Article
  20. 460

    NONCONVENTIONAL RADIOLOGICAL TECHNOLOGIES AND PROCESSES USED FOR NEUROSURGERY IN CORRELATION WITH INTELLECTUAL PROPERTY PROTECTION WITH DIRECT APPLICATION IN HEALTHCARE ORGANIZATIO... by Dan Theodor Andronic, Oana Roxana Chivu, Augustin Semenescu, Dragos Florin Marcu, Mihail Aurel Titu

    Published 2025-06-01
    “…PACS facilitates the efficient management of radiological CT images, providing fast and secure access to patient data. This work considerably simplifies the process of diagnosis and planning of neurosurgical treatment. …”
    Get full text
    Article