Showing 461 - 480 results of 841 for search 'security in visualization', query time: 0.11s Refine Results
  1. 461

    Heatmaps on Radiological Safety in Minimally Invasive Midfoot Fusion: A Cadaver Study by Bedri Karaismailoglu MD, FEBOT, Matthias Peiffer MD, Fernando Raduan MD, Julian Hollander Bsc, Ashley Knebel MS, John Y. Kwon MD, Lorena Bejarano-Pineda MD, Soheil Ashkani-Esfahani MD, Christopher P. Miller MD

    Published 2024-12-01
    “…Subsequently, flexible wires were positioned and securely placed adjacent to the medial and/or lateral borders of these structures to visualize their trajectories on X-ray imaging. …”
    Get full text
    Article
  2. 462
  3. 463
  4. 464

    AdvFaceGAN: a face dual-identity impersonation attack method based on generative adversarial networks by Hong Huang, Yang Yang, Yunfei Wang

    Published 2025-06-01
    “…This article aims to reveal security vulnerabilities in current commercial facial recognition systems and promote advancements in facial recognition technology security. …”
    Get full text
    Article
  5. 465

    The Concept of a Digital Twin for the Wały Śląskie Hydroelectric Power Plant: A Case Study in Poland by Artur Machalski, Przemysław Szulc, Dominik Błoński, Aneta Nycz, Magdalena Nemś, Janusz Skrzypacz, Przemysław Janik, Zuzanna Satława

    Published 2025-04-01
    “…The digital twin architecture developed to address these issues features modular components, including data acquisition, data processing, visualization, and integration layers, emphasizing scalability, adaptability, and secure interoperability. …”
    Get full text
    Article
  6. 466

    Data hiding method based on color table expansion technique by FEI Ru-chun1, WANG Li-na1, ZHANG Huan-guo1

    Published 2009-01-01
    “…Based on color table expansion technique for indexed images,a data hiding method was proposed,and the se-curity and the hiding capacity were analyzed.The analysis results show that this method has very strong security and very high hiding capacity.Secret data can be hidden in an indexed cover image to generate a stego-image with the same visual effect as the cover image and resumed without distortion from the stego-image if the correct key is used.In addition,the statistical feature of the secret data is completely covered up by using random data,so the stego-image is statistically in-dependent of the secret data.…”
    Get full text
    Article
  7. 467

    A Multicomponent Face Verification and Identification System by Athanasios Douklias, Ioannis Zorzos, Evangelos Maltezos, Vasilis Nousis, Spyridon Nektarios Bolierakis, Lazaros Karagiannidis, Eleftherios Ouzounoglou, Angelos Amditis

    Published 2025-07-01
    “…In this research, the design and implementation of a face verification and identification system of a flexible, modular, secure, and scalable architecture is proposed. The proposed system incorporates several and various types of system components: (i) portable capabilities (mobile application and mixed reality [MR] glasses), (ii) enhanced monitoring and visualization via a user-friendly Web-based user interface (UI), and (iii) information sharing via middleware to other external systems. …”
    Get full text
    Article
  8. 468

    One Health and planetary health research landscapes in the Arab world by Shaher Zyoud, Sa'ed H. Zyoud

    Published 2025-01-01
    “…This analysis assessed the Arab world's contributions to these concepts applying performance analysis and visualization mapping, revealing that One Health outperformed planetary health in terms of productivity and number of contributed countries. …”
    Get full text
    Article
  9. 469
  10. 470
  11. 471

    RiceLeafClassifier‐v1.0: A Quantized Deep Learning Model for Automated Rice Leaf Disease Detection and Edge Deployment by Oluwaseun O. Martins, Christiaan C. Oosthuizen, Dawood A. Desai

    Published 2025-06-01
    “…ABSTRACT Rice diseases critically threaten global food security, necessitating rapid, accurate detection methods. …”
    Get full text
    Article
  12. 472
  13. 473

    AILDP: a research on ship number recognition technology for complex scenarios by Tianjiao Wei, Zhuhua Hu, Yaochi Zhao, Xiyu Fan

    Published 2025-03-01
    “…Abstract With the rapid growth of global maritime trade and the increasingly urgent need for maritime surveillance and security management, fast and accurate identification of vessels has become a crucial aspect. …”
    Get full text
    Article
  14. 474
  15. 475
  16. 476

    Typification of Projects for the Transition to Cloud Services by A. G. Voronova

    Published 2024-09-01
    “…Digital solutions make the operation of the company clearer, reduce staff costs, and provide data security. Various aspects of automation, digitalization and cloud technologies are described in the literature. …”
    Get full text
    Article
  17. 477

    Connectable Internet Address Object Point using the Active Accessibility by Mohammed Hasan, Manar Ahmed

    Published 2007-07-01
    “…This paper focuses on how building application components using Visual Basics that are accessible to people or computer users from client with disabilities. …”
    Get full text
    Article
  18. 478

    Data hiding method based on color table expansion technique by FEI Ru-chun1, WANG Li-na1, ZHANG Huan-guo1

    Published 2009-01-01
    “…Based on color table expansion technique for indexed images,a data hiding method was proposed,and the se-curity and the hiding capacity were analyzed.The analysis results show that this method has very strong security and very high hiding capacity.Secret data can be hidden in an indexed cover image to generate a stego-image with the same visual effect as the cover image and resumed without distortion from the stego-image if the correct key is used.In addition,the statistical feature of the secret data is completely covered up by using random data,so the stego-image is statistically in-dependent of the secret data.…”
    Get full text
    Article
  19. 479

    Asinara e la territorializzazione negata. Ovvero, come un uso improprio del linguaggio può cancellare la memoria by Elena dell'Agnese, Marco Nocente

    Published 2025-07-01
    “…The paper seeks to reframe Asinara by examining the practices of structuring, reification, and denomination through the analysis of archival material, visual material and field research.…”
    Get full text
    Article
  20. 480