Showing 581 - 600 results of 841 for search 'security in visualization', query time: 0.09s Refine Results
  1. 581

    Point Cloud Adversarial Perturbation Generation for Adversarial Attacks by Fengmei He, Yihuai Chen, Ruidong Chen, Weizhi Nie

    Published 2023-01-01
    “…However, the irregularity and disorder of the point cloud also cause its vulnerability to environmental impact, which may bring security risks to safety-critical 3D applications such as self-driving tasks. …”
    Get full text
    Article
  2. 582

    Privacy-preserving inpainting for outsourced image by Fang Cao, Jiayi Sun, Xiangyang Luo, Chuan Qin, Ching-Chun Chang

    Published 2021-11-01
    “…Experimental results show that our privacy-preserving inpainting framework can be effectively applied in secure cloud computing, and the proposed encrypted-image inpainting scheme achieves comparable visual quality of inpainted results with some typical inpainting schemes in plaintext domain.…”
    Get full text
    Article
  3. 583

    Key Technology of Communication Equipment Fingerprint Recognition Based on Intelligent Feature Extraction Algorithm by Meizhen Gao, Yunquan Li, Yetong Gao

    Published 2022-01-01
    “…The technology is of great significance in electronic countermeasures, wireless network security, and other fields and has been widely studied in recent years. …”
    Get full text
    Article
  4. 584

    Cosmetic crimes in dromedary camels: a critical overview on these illegal manipulations and its hidden consequences by Mohamed Tharwat

    Published 2025-07-01
    “…Detection of tampering is increasingly challenging due to evolving methods and requires experienced personnel. Visual assessment remains the primary diagnostic step, followed by imaging techniques (e.g., ultrasonography, radiography, thermography) and hormonal assays. …”
    Get full text
    Article
  5. 585
  6. 586

    Emotion Detection and Student Engagement in Distance Learning During Containment Due to the COVID-19 by Benyoussef Abdellaoui, Ahmed Remaida, Zineb Sabri, Younes EL BOUZEKRI EL IDRISSI, Aniss Moumen

    Published 2024-04-01
    “…This technology can be applied in other scenes, such as self-driving and security, with a minor adjustment. …”
    Get full text
    Article
  7. 587

    Mechanism of Influence of Spatial Perception on Residents’ Emotion in Child-Friendly Urban Streets of Fuzhou City by Shaofeng CHEN, Zhengyan CHEN, Yuhan XU, Zheng DING

    Published 2025-05-01
    “…However, poorly maintained security facilities reduce emotional benefits, despite high design scores. …”
    Get full text
    Article
  8. 588

    Remote Sensing Based Crop Health Classification Using NDVI and Fully Connected Neural Networks by J. Judith, R. Tamilselvi, M. P. Beham, S. S. Pandiya Lakshmi, A. Panthakkan, S. Al Mansoori, H. Al Ahmad

    Published 2025-07-01
    “…Traditional approaches often rely on visual inspection or simple NDVI measurements, which, though useful, fall short in detecting nuanced variations in crop stress and disease conditions. …”
    Get full text
    Article
  9. 589

    Aeration system optimization for a deep bed dryer for paddy grain using computational fluid analysis and the AHP-TOPSIS method by Diswandi NURBA, Sutrisno S. MARDJAN, Dyah WULANDANI, Leopold O. NELWAN, I Dewa Made SUBRATA

    Published 2025-06-01
    “…In the context of food security, drying is a crucial postharvest process for paddy grain because it significantly impacts the quality of both paddy and rice. …”
    Get full text
    Article
  10. 590
  11. 591

    Multimodal scene recognition using semantic segmentation and deep learning integration by Aysha Naseer, Mohammed Alnusayri, Haifa F. Alhasson, Mohammed Alatiyyah, Dina Abdulaziz AlHammadi, Ahmad Jalal, Jeongmin Park

    Published 2025-05-01
    “…The gap between high-level scene interpretation and low-level visual features increases the complexity of scene recognition. …”
    Get full text
    Article
  12. 592

    The Prevalence and Evaluation of Electronics Incorporated Into the Educational and Recreational Activity of Schoolchildren of 7–8 Classes by V. R. Kuchma, I. K. Rapoport, S. B. Sokolova, I. E. Aleksandrova, A. Yu. Makarova, K. Sh. Mustafaeva, L. A. Dorina, Yu. A. Sharafutdinova

    Published 2015-09-01
    “…The widespread use of new information technologies in education leads to ad hoc use of modern electronic devices, to the problem of health security in the use of information technology. Visual impairment in children are among the most important medical and social problems of modern society. …”
    Get full text
    Article
  13. 593

    Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects’ Information by Peng Foong Ho, Yvonne Hwei-Syn Kam, Mee Chin Wee, Yu Nam Chong, Lip Yee Por

    Published 2014-01-01
    “…Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed by others. …”
    Get full text
    Article
  14. 594
  15. 595

    An Explainable Deep Learning Framework for Sorghum Weed Classification Using Multi-Scale Feature Enhanced DenseNet by Armaano Ajay, S. Sandosh, Aryan Saji, Harsh Agarwal

    Published 2025-01-01
    “…Sorghum is a vital crop known for its resilience in harsh environmental conditions, playing a key role in food security and bioenergy production across the globe. …”
    Get full text
    Article
  16. 596

    Insights into the effects of geographical sourcing area on nutrient composition and sensory attributes of nine edible insects by Jackson Ishara, Rehema Matendo, Jeremiah Ng’ang’a, Saliou Niassy, Karume Katcho, John Kinyuru

    Published 2025-04-01
    “…Abstract With the rapidly growing world population, climate change uncertainties and depletion of our natural resources, edible insects are seen as sustainable and viable bioresources for food and feed to tackle global food and nutritional security issues, for their nutritional value, taste, and environmental sustainability. …”
    Get full text
    Article
  17. 597

    A global view of shifting cultivation: Recent, current, and future extent. by Andreas Heinimann, Ole Mertz, Steve Frolking, Andreas Egelund Christensen, Kaspar Hurni, Fernando Sedano, Louise Parsons Chini, Ritvik Sahajpal, Matthew Hansen, George Hurtt

    Published 2017-01-01
    “…This study combines existing global Landsat-based deforestation data covering the years 2000 to 2014 with very high-resolution satellite imagery to visually detect the specific spatio-temporal pattern of shifting cultivation at a one-degree cell resolution worldwide. …”
    Get full text
    Article
  18. 598

    Locally rendered high-resolution Land Use/Land Cover Bitmaps from OpenStreetMap Data for geospecific 3D Simulation by D. Frommholz

    Published 2025-07-01
    “…Results for scenes around the world are visually analyzed, and a comparison to validated LULC data is conducted. …”
    Get full text
    Article
  19. 599

    The impact of daily lifestyle on the emergence of new spaces in housing by Maede Pashaei, Hamed Beyti

    Published 2025-03-01
    “…Based on the results, the most important sub-components of the environmental, physical, socio-cultural, individual, and economic dimensions are related to environmental health, construction patterns, security, goals, and income levels, respectively. The proposed contemporary spaces in this research include a central water purification system, a central laundry, individual unit laundry facilities, waste chutes, mechanical car washes, a filter for the restroom entrance, a designed guard station for monitoring entries and exits, ensuring visibility to children's play areas, creating visual and physical connections between public and semi-public courtyards, designing health pathways, a gymnasium, and a swimming pool.…”
    Get full text
    Article
  20. 600

    Drone Detection Using YOLOv5 With GhostNet Backbone and Adaptive Fourier Neural Operator (AFNO 2D) by K. Kavin Akash, Uma Kuppusamy

    Published 2025-01-01
    “…The growing presence of autonomous aerial vehicles (AAVs) in civilian, commercial, and military sectors has raised urgent and widespread security concerns. Real-time and reliable AAV detection remains a formidable challenge owing to the small size, rapid movement, and visual similarity of AAVs to birds and other airborne objects in dynamic environments. …”
    Get full text
    Article