Showing 641 - 660 results of 841 for search 'security in visualization', query time: 0.09s Refine Results
  1. 641

    Predictors affecting the severity of irrigated maize due to fall armyworm (Spodoptera frugiperda, Smith) and its natural enemies in Bako-Tibe district, central Ethiopia by Abera Aboset Bedasa, Emana Getu Degaga

    Published 2025-03-01
    “…From plants seeded between mid-December and March, green ears of maize were harvested. Visually identified S. frugiperda predators include weaver birds, frogs, and insects belong to order Coleoptera, Dermaptera, Hemiptera and Hymenoptera. …”
    Get full text
    Article
  2. 642

    Edible coatings for fresh produce: exploring chitosan, beeswax, and essential oils in green chillies and pointed gourd by Eshita Vivek Vidyarthi, Mannat Thakur, Ramanveer Kaur Khela, Swarup Roy

    Published 2024-01-01
    “…Weight loss, visible decay, and visual surface colour change was evaluated. The control groups, to which no coating was applied, showed a loss in weight of 7.5% and visible decay starting from day 6. …”
    Get full text
    Article
  3. 643

    A Survey on Video Compression Optimization Techniques for Accuracy Enhancement in Video Analytics Applications (VAPs) by Kholidiyah Masykuroh, Hendrawan, Eueung Mulyana, Farhan Krishna

    Published 2025-01-01
    “…Video analytics is essential in smart city management, traffic monitoring, and security surveillance, where real-time decision-making is critical. …”
    Get full text
    Article
  4. 644

    LWRNPIP: Design of a light weight restrictive non-fungible token based on practically unclonable functions via image signature patterns by Mahesh Kumar Singh, Pushpa Choudhary, Arun Kumar Singh, Pushpendra Singh

    Published 2025-11-01
    “…To overcome this drawback, while maintaining high security, this text proposes a design of a lightweight, restrictive non-fungible token based on Practically Unclonable Functions (PuFs) via image signature patterns. …”
    Get full text
    Article
  5. 645

    The Ethics of the Virtual Educational Environment, New Meanings by G. A. Rozhkov, Yu. V. Taratuhina, L. А. Tsyganova

    Published 2022-12-01
    “…In the future, this issue requires a comprehensive consideration not only from the communication and ethical side, but also from the point of view of legal and information security. It is necessary to form ethical standards for online teaching.…”
    Get full text
    Article
  6. 646

    IoT Based Health Monitoring with Diet, Exercise and Calories recommendation Using Machine Learning by Muhammad Hassaan Naveed, Omar Bin Samin, Muhammad Bilal, Mustehsum Waseem

    Published 2025-04-01
    “…Member data, including BMI, is securely stored, and visualized on personalized profiles through line charts. …”
    Get full text
    Article
  7. 647

    Augmented reality technology as a new source of competitive strengths in engineering products by A. S. Zuev, A. N. Zueva, D. A. Leonov

    Published 2020-03-01
    “…It covers prospects of implementing informational systems that provide the operator with visualized supporting content online through the use of AR technology into the life cycle stages, processes of production, maintenance and operation of products and machinery equipment, as well as specialized applications. …”
    Get full text
    Article
  8. 648

    Implementation challenges of telerobotics in the infectious disease department in Iran: An integrated methodological approach by Farkhondeh Asadi, Mahrokh Anvari, Nahid Ramezan Ghorbani, Azam Sabahi

    Published 2025-07-01
    “…Results: The key challenges in implementing telerobotics in infectious disease departments include technological issues such as inadequate equipment, infrastructure complexity, and data security; organizational barriers like the lack of support from hospital CEOs and the absence of training programs; cultural resistance due to negative past experiences with technology; strategic gaps, including insufficient legal support and incentives; and performance limitations, particularly the inability to establish direct visual contact with patients. …”
    Get full text
    Article
  9. 649

    Age-Related Viability of Patients with Ophthalmopathology Depending on Age Dissociation by O. L. Fabrikantov, A. E. Kopylov, N. M. Agarkov, N. V. Popova, D. R. Shmarova

    Published 2024-12-01
    “…Diabetic retinopathy and senile cataracts cause not only a significant impairment of visual functions, but also can affect the psychological and emotional status of patients and their age-related viability, which has not been practically studied in patients with the abovementioned ophthalmological diseases.The purpose: to study age–related viability in patients with ophthalmopathology depending on age dissociation. …”
    Get full text
    Article
  10. 650

    PortraitEmotion3D: A Novel Dataset and 3D Emotion Estimation Method for Artistic Portraiture Analysis by Shao Liu, Sos Agaian, Artyom Grigoryan

    Published 2024-12-01
    “…This dataset provides a robust foundation for advancing emotion recognition in visual art. Second, we propose an innovative 3D emotion estimation method that leverages three-dimensional labeling to capture the nuanced emotional spectrum depicted in artistic works. …”
    Get full text
    Article
  11. 651

    A lightweight and explainable CNN model for empowering plant disease diagnosis by Chiranjit Pal, Swastik Karmakar, Imon Mukherjee, Partha Pratim Chakrabarti

    Published 2025-08-01
    “…These techniques provide visual insights into the neural regions influencing the predictions. …”
    Get full text
    Article
  12. 652

    Determinants of Adoption of Technology-based Payment Systems among University Students by Faiz Amrullah Ibnu Purwanto, Budi Rustandi Kartawinata, Mahir Pradana

    Published 2025-06-01
    “…The data for the study were analysed quantitatively, and the results were presented in tables and figures for visual illustration.    Results: The study's results show that facilitating conditions, ease of use, and risk perception have a significant effect on the behavioural intention to use QR in payments. …”
    Get full text
    Article
  13. 653

    Risk assessment of land subsidence in Shanghai municipality based on AHP and EWM by Yinshui Zhan, Yichen Zhang, Jiquan Zhang, Jinyuan Xu, Haoxin Chen, Gexu Liu, Ziyang Wan

    Published 2025-03-01
    “…Abstract Urban land subsidence (LS) results in a reduction in ground elevation, compromising infrastructure integrity, disrupting the hydrological cycle, and posing significant risks to economic, demographic, and environmental security. This phenomenon is characterized by a certain degree of latency. …”
    Get full text
    Article
  14. 654

    Road Traffic Accident Data Standardization System Based on Field Map by Wangfang Yuan, Hanjie Lu, Jiatao Zhang

    Published 2024-01-01
    “…Finally, this article develops a road traffic accident data standardization system by programming in the Visual C++ environment using MFC. This allows on-site investigation data and information to be directly applied to the Crashview system for accident simulation and reconstruction.…”
    Get full text
    Article
  15. 655

    CAPABILITIES OF APPLYING VISIBLE LIGHT RAYS IN THE SYSTEMS OF HIDDEN INFORMATION TRANSMITTING by I. V. Pyslar, V. V. Brailovsky, M. G. Rozhdestvenska, M. M. Ivanchuk

    Published 2018-06-01
    “…Security In the paper some aspects of visible light pulses using for hidden information transmitting are considered. …”
    Get full text
    Article
  16. 656

    Contextual information based anomaly detection for multi-scene aerial videos by Girisha S, Ujjwal Verma, Manohara M M. Pai, Radhika M. Pai

    Published 2025-07-01
    “…Abstract Aerial video surveillance using Unmanned Aerial Vehicles (UAV) is gaining much interest worldwide due to its extensive applications in monitoring wildlife, urban planning, disaster management, anomaly detection, campus security, etc. These videos are processed and analyzed for strange/odd/anomalous patterns, which are essential requirements of surveillance. …”
    Get full text
    Article
  17. 657

    How Resilient Are Kolmogorov–Arnold Networks in Classification Tasks? A Robustness Investigation by Ahmed Dawod Mohammed Ibrahum, Zhengyu Shang, Jang-Eui Hong

    Published 2024-11-01
    “…These findings underscore the potential of KAN architectures to improve neural network security and reliability in adversarial settings.…”
    Get full text
    Article
  18. 658

    The Impact of Trade on Architecture During the Seljuk-Ottoman Period: A Study on Caravanserai and Khan Structures in the Southeastern Anatolia Region by Dilan Kakdaş Ateş, Gülin Payaslı Oğuz

    Published 2025-06-01
    “…Comparative analyses were carried out through visuals, tables, and drawings, which were systematically converted into schematic representations and categorized based on their construction periods. …”
    Get full text
    Article
  19. 659

    Multiclass semantic segmentation for prime disease detection with severity level identification in Citrus plant leaves by P. Dinesh, Ramanathan Lakshmanan

    Published 2025-07-01
    “…The proposed work enables farmers to identify and visualize multiple diseases affecting citrus plants. …”
    Get full text
    Article
  20. 660

    The Comparative Bibliometric Analysis of Watershed Ecological Protection and Restoration in the Context of Territorial Spatial Planning: An Overview of Global Research Trends by Hengsong Zhao, Guangyu Wang, Wanlin Wei

    Published 2025-07-01
    “…Research on watershed ecological protection and restoration within the framework of territorial spatial planning serves as a critical approach to ensuring national ecological security and plays a vital role in enhancing ecosystem stability. …”
    Get full text
    Article