Showing 521 - 540 results of 841 for search 'security in visualization', query time: 0.09s Refine Results
  1. 521

    Home Automation Management with WLAN (802.11g) and RF Remote Control by Mahmood Majeed, Abdulsattar Khidhir, Firas Yosif

    Published 2009-03-01
    “…The software consists of Assembly Language for programming microcontroller (AT89C51and AT89C2051) and Visual Basic Language that use to communicate between PC and two boards, also it use to design Graphical User Interface (GUI) which involving all devices needed to display in Home PC screen . …”
    Get full text
    Article
  2. 522

    Accidents in railway transportation: Lessons learned from Thailand and France by Sripathomswat Kanokporn, Promkamol Lattapon, Romruen Worachon, Arthaud Quentin, Drouin Alban

    Published 2025-01-01
    “…In a complementary part of the study, French railway incident data are analysed. Security incidents, sourced from the open data of SNCF France and provided by the Établissement Public de Sécurité Ferroviaire (EPSF), are visualized. …”
    Get full text
    Article
  3. 523

    Assessing hotels website technical and aesthetic elements: A benchmark study for Algerian hotels websites by Kheddache Fares

    Published 2025-01-01
    “…Practical advice includes simplifying navigation, optimizing visual hierarchies, and adopting SEO tools to boost digital competitiveness while retaining authenticity.…”
    Get full text
    Article
  4. 524

    Adaptive Monitoring Relevance in Camera Networks for Critical Surveillance Applications by Daniel G. Costa, Luiz Affonso Guedes, Francisco Vasques, Paulo Portugal

    Published 2013-11-01
    “…Camera networks have been considered for a large set of visual monitoring applications. For some of them, cameras may be continuously monitoring scenes or groups of targets, but some events may trigger a critical level of visual monitoring, as in public security, industrial automation, and response to natural disasters. …”
    Get full text
    Article
  5. 525

    Encryption & Hiding Information in Internet Files HTML & XML by Dujan Taha, Ahmed Nori, Najla Ibraheem

    Published 2010-06-01
    “…Experimental results demonstrated that the proposed algorithms are secure and efficient. The image carrying the secret information is identical (by Human Visual System HVS) to the original image as well as the ability to embed a lot of information inside the files. …”
    Get full text
    Article
  6. 526
  7. 527

    Provide Simple Protection for Bluetooth Connection in Wireless Personal Area Network by Mohammed Hasan

    Published 2009-03-01
    “…This paper presents security system for indoor location between two devices the mobile device and computer based (Laptop Computer) on Bluetooth technology. …”
    Get full text
    Article
  8. 528

    Blood, Monstrosity and Violent Imagery: Grand-Guignol, the French Theatre of Horror as a Form of Violent Entertainment by Tanja Jurković

    Published 2013-12-01
    “…In this paper, the author is trying to focus the attention on the theatre of Grand-Guignol as a form of violent entertainment and the way the representations of violence and horror enacted on its stage affected the audience, through Goldstein’s theory of the importance of visual imagery in different media today. Furthermore, through comparison of violent acts presented on the stage of the Grand-Guignol and the atmosphere they create in the viewer’s mind with some of the aspects of Artaud’s vision of his theatre of cruelty, the author attempts to show how this form of violent entertainment in the theatrical media influences the vision of that same violence within the audience, with the sense of security as the main idea in which the viewers feel safe to enjoy, envision and in a way become the participants in the performances enacted on the small stage of the Grand-Guignol.…”
    Get full text
    Article
  9. 529

    Design of the Field Protection and Signal Priority at Intersection System for Autonomous-rail Rapid Transit by SHI Yangyang, LIU Guangyong, WU Jinyong

    Published 2022-06-01
    “…In the area where autonomous-rail rapid tram run in both directions, and in the virtual turnout area where multiple lines meet, it is usually based on a reasonable plan and driver manual visual driving to avoid crash, rear-end collision and other accidents. …”
    Get full text
    Article
  10. 530

    Featuring Software Defined Radio in Airports for Finding Automatic Descendants Surveillance by Ardian Arief Epti Nur Putra, Wahyu Pamungkas, Agung Wicaksono

    Published 2025-06-01
    “…As air traffic becomes more complicated, more effective monitoring systems are required to assure aviation safety and security. Automatic Dependent Surveillance-Broadcast (ADS-B) technology has become the international standard for real-time airplane tracking, however typical ADS-B receivers used in airports are expensive and frequently unavailable. …”
    Get full text
    Article
  11. 531

    Biomechanics of Parkinson’s Disease with Systems Based on Expert Knowledge and Machine Learning: A Scoping Review by Luis Pastor Sánchez-Fernández

    Published 2024-11-01
    “…However, motor clinical assessment depends on visual observations, which are mostly qualitative, with subtle differences not recognized. …”
    Get full text
    Article
  12. 532

    Assessment of grain production levels and analysis of obstacle factors in China: a sustainable, stable and green perspective by Caixia Shangguan, Ruijundi Ma, Yan Lu, Hui Zhang, Mingjin Tian, Yongzhong Teng, Li Jing, Xia Zhang, Hongbin Liu, Ke Li, Xingxing Mei

    Published 2025-07-01
    “…IntroductionGrain production is an essential component in food security and plays a key role in environmental sustainability. …”
    Get full text
    Article
  13. 533

    Exploring Youth Perspectives on Digital Mental Health Platforms: Qualitative Descriptive Study by Sarah Daniel, Lauren Volcko, Emilie Bassi, Julia Hews-Girard, Katherine Bright, Marianne Barker, Lia Norman, Karina Pintson, Geneca Henry, Sumaya Soufi, Chukwudumbiri Efrem Omorotionmwan, Melanie Fersovitch, Leanne Stamp, Karen Moskovic, David W Johnson, Gina Dimitropoulos

    Published 2025-05-01
    “…Progress tracking features, such as symptom trend visualizations and diaries, were identified by 65% (25/39) of participants as critical for sustaining engagement. …”
    Get full text
    Article
  14. 534

    Predicting geriatric environmental safety perception assessment using LightGBM and SHAP framework by Shengzhen Wu, Sichao Wu, Jingru Chen, Chen Pan

    Published 2025-07-01
    “…This study’s empirical analysis elucidates the influence of visual elements in pocket parks on elderly environmental safety perceptions, offering practical guidance for park planners to design more inclusive and secure green spaces for the elderly, with broad application potential.…”
    Get full text
    Article
  15. 535
  16. 536

    Bivalve Shell Utilization by Juvenile Octopus vulgaris in Sandy Substrates by Jorge Hernández‐Urcera, Samuel E. Soule, Miguel Cabanellas‐Reboredo, Ángel F. González

    Published 2025-05-01
    “…They manipulated the shells for security and positioned themselves strategically for optimal visual surveillance. …”
    Get full text
    Article
  17. 537

    Conceptualizing the Irish and UK food systems by Alice Gilmour, John Ingram, John Ingram, John Ingram, Monika Zurek

    Published 2025-06-01
    “…The conceptual framework conveys the components (activities, drivers, outcomes, feedbacks) encompassed in the Irish and UK food system. Visually representing the food system pan-Ireland and the UK will help stakeholders comprehend the multidimensionality of the food system as well as any trade-offs and synergies. …”
    Get full text
    Article
  18. 538

    Vision-Language Model-Based Local Interpretable Model-Agnostic Explanations Analysis for Explainable In-Vehicle Controller Area Network Intrusion Detection by Jaeseung Lee, Jehyeok Rew

    Published 2025-05-01
    “…This integration mitigates the challenges of visual-only explanations in traditional XAI and enhances the intuitiveness of IDS outputs. …”
    Get full text
    Article
  19. 539

    GFADE: generalized feature adaptation and discrimination enhancement for deepfake detection by ZhiYong Tian, Junkai Yi

    Published 2025-05-01
    “…Additionally, the MixStyle technique introduces diverse visual styles during training, further improving the model’s generalization across different datasets and manipulation scenarios. …”
    Get full text
    Article
  20. 540