Showing 561 - 580 results of 841 for search 'security in visualization', query time: 0.10s Refine Results
  1. 561

    Digital Signal Processing for The Development of Deep Learning-Based Speech Recognition Technology by Dita Novita Sari, Danang Kusnadi, Ricco Herdiyan Saputra, Mujeeb Ullah Khan

    Published 2024-06-01
    “…This technology can be used in security systems for safer and more reliable voice authentication, replacing or supplementing passwords and fingerprints. …”
    Get full text
    Article
  2. 562

    Use of End-to-End Tool for the Analysis of the Digital Governance of Ports by Nicoletta González-Cancelas, Alberto Camarero Orive, Alberto Rivas Vilarchao, Javier Vaca-Cabrero

    Published 2024-06-01
    “…In addition, it provides an intuitive and easy-to-use interface to visualize results and make evidence-based decisions. …”
    Get full text
    Article
  3. 563
  4. 564

    Agro-meteorological services in the era of climate change: a bibliometric review of research trends, knowledge gaps, and global collaboration by Salma Khatibu, Edwin Ngowi

    Published 2025-06-01
    “…IntroductionAgro-meteorological services are crucial for mitigating climate variability’s impact on agriculture and enhancing food security. Despite their importance, the global research landscape in this field remains underexplored. …”
    Get full text
    Article
  5. 565

    Blockchain Technology Applications for Decarbonization: A Bibliometric Review by Kalnina Anete, Feofilovs Maksims, Romagnoli Francesco

    Published 2025-01-01
    “…Using R-studio, Web of Science and Scopus data were analysed and visualized. The results of this study indicate growth of the publication count throughout the years. …”
    Get full text
    Article
  6. 566

    Online Face Detection and Recognition in a Video Stream by Maha Hasso Al-Ghurery, Manar Zidan Al-Abaji

    Published 2013-12-01
    “…The System was implemented using graphical interfaces of Visual Studio C# 2010 Language.…”
    Get full text
    Article
  7. 567

    Examining of Interior Design Approaches in Special Education Buildings for People with Autism by Zeynep Yanılmaz

    Published 2024-06-01
    “…The sample group consists of five special education schools located abroad, where the most comprehensive information was accessed in terms of spatial characteristics such as plans, sections, interior visuals, etc. The interior design approaches of these schools have been examined in terms of 8 parameters, namely spatial organization, circulation areas, lighting, acoustics, color, material, equipment/reinforcement and security.Findings: All of the schools determined as the sample group have been arranged in a campus and as a single or two storey. …”
    Get full text
    Article
  8. 568

    Life safety culture: the concept and the problem of its formation in educational organizations by E. A. Panina

    Published 2024-04-01
    “…Its main vector is focused on adequately solving the priority tasks of ensuring personal and national security. In this regard, the scientific problem considered in this article seems to be relevant and in demand in modern educational practice, because the effectiveness of ensuring the safety of the entire world community depends on the level of development of the life safety culture of each person.   …”
    Get full text
    Article
  9. 569

    HDIEA: high dimensional color image encryption architecture using five-dimensional Gauss-logistic and Lorenz system by Bharti Ahuja, Rajesh Doriya, Sharad Salunke, Mohammad Farukh Hashmi, Aditya Gupta, Neeraj Dhanraj Bokde

    Published 2023-12-01
    “…This demonstrates the excellent scrambling effect of the proposed approach, which is capable of greatly improving the color image security performance.…”
    Get full text
    Article
  10. 570

    Modeling of Barriers to the Adoption of Autonomous Vehicles: DEMATEL Method by Karan Ashok Jalwani, Shambo Roy Choudhury

    Published 2023-12-01
    “…There were five issues that needed to be addressed: a lack of infrastructure, funding limitations for manufacturing, low customer acceptance, security breach concerns, and potential employment effects. …”
    Get full text
    Article
  11. 571

    Spatial analysis of vitality indicators with emphasis on urban roads in Mashhad metropolis by Ahmad hajarian

    Published 2024-12-01
    “…Then, the components of comfort and convenience (0.652), visual physical attractiveness and diversity (0.631), physical quality (0.623), safety and security (0.430), and accessibility (0.160) are effective on vitality with an emphasis on urban roads, respectively.…”
    Get full text
    Article
  12. 572

    Vision-Based Drone Detection in Complex Environments: A Survey by Ziyi Liu, Pei An, You Yang, Shaohua Qiu, Qiong Liu, Xinghua Xu

    Published 2024-11-01
    “…The frequent illegal use of drones poses a serious threat to public security and property. Counter-drones are crucial tools. …”
    Get full text
    Article
  13. 573

    A Post-Occupancy Evaluation Framework for Enhancing Resident Satisfaction and Building Performance in Multi-Story Residential Developments in Saudi Arabia by Saleh Baharetha, Mohammad A. Hassanain, Adel Alshibani, Djamel Ouis, Mohammed M. Gomaa, Mohamed Salah Ezz

    Published 2025-01-01
    “…Results indicate that residents generally expressed satisfaction with thermal comfort, visual comfort, and indoor air quality. However, concerns were highlighted in areas such as safety and security, design adequacy, and construction support services. …”
    Get full text
    Article
  14. 574
  15. 575

    A reversible and robust hybrid image steganography framework using radon transform and integer lifting wavelet transform by B. M. El-den, Walid Raslan

    Published 2025-05-01
    “…Compared to existing techniques, the proposed framework demonstrates significant improvements in embedding capacity, robustness, and visual fidelity. This method holds great promise for secure data hiding in applications such as secure communication, medical imaging, and digital watermarking, where data integrity and confidentiality are critical.…”
    Get full text
    Article
  16. 576

    Cross-Modal Data Fusion via Vision-Language Model for Crop Disease Recognition by Wenjie Liu, Guoqing Wu, Han Wang, Fuji Ren

    Published 2025-06-01
    “…Crop diseases pose a significant threat to agricultural productivity and global food security. Timely and accurate disease identification is crucial for improving crop yield and quality. …”
    Get full text
    Article
  17. 577

    Interpretable Learning Method Based on Causal Interactive Attention by Wu Song, Sheng Ren, Bin Hu

    Published 2025-01-01
    “…It enhances the model to dynamically identify the most relevant visual cues, tailored to the granularity of the visual cues. …”
    Get full text
    Article
  18. 578

    State sovereignty index as an indicator of public decision-making by N. Chala, G. Kharlamova, D. Markishev

    Published 2019-10-01
    “…The world community and governments are constantly on the lookout for an effective benchmark for countries: the benchmark for their success or failure, security and vulnerability, quality of life, openness, etc. …”
    Get full text
    Article
  19. 579

    Exploring Attributions in Convolutional Neural Networks for Cow Identification by Dimitar Tanchev, Alexander Marazov, Gergana Balieva, Ivanka Lazarova, Ralitsa Rankova

    Published 2025-03-01
    “…Face recognition and identification is a method that is well established in traffic monitoring, security, human biodata analysis, etc. Regarding the current development and implementation of digitalization in all spheres of public life, new approaches are being sought to use the opportunities of high technology advancements in animal husbandry to enhance the sector’s sustainability. …”
    Get full text
    Article
  20. 580

    Ensemble transfer learning meets explainable AI: A deep learning approach for leaf disease detection by Hetarth Raval, Jyotismita Chaki

    Published 2024-12-01
    “…Global food security is threatened by plant diseases and manual detection methods are often labor-intensive and time-consuming. …”
    Get full text
    Article