-
461
Heatmaps on Radiological Safety in Minimally Invasive Midfoot Fusion: A Cadaver Study
Published 2024-12-01“…Subsequently, flexible wires were positioned and securely placed adjacent to the medial and/or lateral borders of these structures to visualize their trajectories on X-ray imaging. …”
Get full text
Article -
462
-
463
-
464
AdvFaceGAN: a face dual-identity impersonation attack method based on generative adversarial networks
Published 2025-06-01“…This article aims to reveal security vulnerabilities in current commercial facial recognition systems and promote advancements in facial recognition technology security. …”
Get full text
Article -
465
The Concept of a Digital Twin for the Wały Śląskie Hydroelectric Power Plant: A Case Study in Poland
Published 2025-04-01“…The digital twin architecture developed to address these issues features modular components, including data acquisition, data processing, visualization, and integration layers, emphasizing scalability, adaptability, and secure interoperability. …”
Get full text
Article -
466
Data hiding method based on color table expansion technique
Published 2009-01-01“…Based on color table expansion technique for indexed images,a data hiding method was proposed,and the se-curity and the hiding capacity were analyzed.The analysis results show that this method has very strong security and very high hiding capacity.Secret data can be hidden in an indexed cover image to generate a stego-image with the same visual effect as the cover image and resumed without distortion from the stego-image if the correct key is used.In addition,the statistical feature of the secret data is completely covered up by using random data,so the stego-image is statistically in-dependent of the secret data.…”
Get full text
Article -
467
A Multicomponent Face Verification and Identification System
Published 2025-07-01“…In this research, the design and implementation of a face verification and identification system of a flexible, modular, secure, and scalable architecture is proposed. The proposed system incorporates several and various types of system components: (i) portable capabilities (mobile application and mixed reality [MR] glasses), (ii) enhanced monitoring and visualization via a user-friendly Web-based user interface (UI), and (iii) information sharing via middleware to other external systems. …”
Get full text
Article -
468
One Health and planetary health research landscapes in the Arab world
Published 2025-01-01“…This analysis assessed the Arab world's contributions to these concepts applying performance analysis and visualization mapping, revealing that One Health outperformed planetary health in terms of productivity and number of contributed countries. …”
Get full text
Article -
469
-
470
Participatory modelling across Kenyan villages facilitates insights into the complexity of human–elephant interactions
Published 2025-01-01“…Farmers created group visual models with variables related to conflict with elephants. …”
Get full text
Article -
471
RiceLeafClassifier‐v1.0: A Quantized Deep Learning Model for Automated Rice Leaf Disease Detection and Edge Deployment
Published 2025-06-01“…ABSTRACT Rice diseases critically threaten global food security, necessitating rapid, accurate detection methods. …”
Get full text
Article -
472
DCSLK: Combined large kernel shared convolutional model with dynamic channel Sampling
Published 2025-07-01Get full text
Article -
473
AILDP: a research on ship number recognition technology for complex scenarios
Published 2025-03-01“…Abstract With the rapid growth of global maritime trade and the increasingly urgent need for maritime surveillance and security management, fast and accurate identification of vessels has become a crucial aspect. …”
Get full text
Article -
474
-
475
Impact of influenza-like illnesses on health state utility value among Japanese children and adults
Published 2025-07-01Get full text
Article -
476
Typification of Projects for the Transition to Cloud Services
Published 2024-09-01“…Digital solutions make the operation of the company clearer, reduce staff costs, and provide data security. Various aspects of automation, digitalization and cloud technologies are described in the literature. …”
Get full text
Article -
477
Connectable Internet Address Object Point using the Active Accessibility
Published 2007-07-01“…This paper focuses on how building application components using Visual Basics that are accessible to people or computer users from client with disabilities. …”
Get full text
Article -
478
Data hiding method based on color table expansion technique
Published 2009-01-01“…Based on color table expansion technique for indexed images,a data hiding method was proposed,and the se-curity and the hiding capacity were analyzed.The analysis results show that this method has very strong security and very high hiding capacity.Secret data can be hidden in an indexed cover image to generate a stego-image with the same visual effect as the cover image and resumed without distortion from the stego-image if the correct key is used.In addition,the statistical feature of the secret data is completely covered up by using random data,so the stego-image is statistically in-dependent of the secret data.…”
Get full text
Article -
479
Asinara e la territorializzazione negata. Ovvero, come un uso improprio del linguaggio può cancellare la memoria
Published 2025-07-01“…The paper seeks to reframe Asinara by examining the practices of structuring, reification, and denomination through the analysis of archival material, visual material and field research.…”
Get full text
Article -
480
Machine Learning in Maritime Safety for Autonomous Shipping: A Bibliometric Review and Future Trends
Published 2025-04-01Get full text
Article