Showing 741 - 760 results of 841 for search 'security in visualization', query time: 0.10s Refine Results
  1. 741

    Designing a Digital Branding Pattern in Healthy Agricultural Products by Abolghasem Mohammadnezhad Ali Zamini, Arezo Ahmadi danyali, Mahmoud Ahmadi Sharif

    Published 2024-09-01
    “…This issue, which is one of the most important and promising parts of the domestic economy, provides not only the food security of the country but also the social welfare of the people. …”
    Get full text
    Article
  2. 742

    Re-use of Building Products in the Netherlands by Loriane Icibaci

    Published 2019-01-01
    “…This “map” offers a way to improve the visualization and the understanding of how the trajectories of flows of products are reused as well as the motivations, conditions, and limitations behind them. …”
    Get full text
    Article
  3. 743

    Management of a Traumatic Flap Dislocation Seven Years after LASIK by Majid Moshirfar, Erik Anderson, Nathan Taylor, Maylon Hsu

    Published 2011-01-01
    “…Nine interrupted sutures were used to secure the flap. Three-weeks after surgery with no sutures remaining, the epithelial ingrowth and macrostriae had resolved with a visual acuity of 20/20.…”
    Get full text
    Article
  4. 744

    TAKE THE RISK OR LOSE THE CHANCE! CASE REPORT by G. Tsvetkova, Y. Zdravkov, A. Oscar

    Published 2021-06-01
    “…Patients typically experience variable reductions in visual acuity, image distortion, and increased sensitivity to glare and light. …”
    Get full text
    Article
  5. 745

    Modified conjunctival flap as a primary procedure for nontraumatic acute corneal perforation by Yi-Chen Sun, Jason P Kam, Tueng T Shen

    Published 2018-01-01
    “…Five patients with good visual potential underwent further corneal surgeries, including Boston keratoprosthesis and penetrating keratoplasty. …”
    Get full text
    Article
  6. 746

    Representing succession: Tudor royal portraits, 1544–1546: context, production and analysis by Susan E. James

    Published 2025-12-01
    “…Evidence suggests that it was Kateryn, who helped achieve for Mary and Elizabeth the dynastic legitimacy that secured their subsequent reigns. In celebration of this achievement, between 1544 and 1546, evidence also suggests that it was the queen who was instrumental in commissioning a campaign of portraits of her stepchildren as a visual affirmation of their enhanced status. …”
    Get full text
    Article
  7. 747

    An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing by Yasir Ahmed Hamza, Nada Elya Tewfiq, Mohammed Qasim Ahmed

    Published 2022-02-01
    “…In addition, the secret logo becomes more secured using (2 out 2 share) visual cryptography and the second secret share as a private key.…”
    Get full text
    Article
  8. 748

    Translating register, style and tone in dubbing and subtitling by Zoë Pettit

    Published 2005-07-01
    “…The audiovisual translator has to sift through the multiple layers of meaning within the context of the verbal, non-verbal, aural and visual signs of the audiovisual text. Lexical, grammatical and stylistic changes in the subtitled and dubbed versions of three films (Smoke, Blue in the Face and The Piano) will be studied to establish the extent to which coherence is secured in relation to these features.…”
    Get full text
    Article
  9. 749

    Forecasting stock quotations of PJSC NK Lukoil based on polynomial trend models by L.I. Tenkovskaya

    Published 2024-12-01
    “…Analysis, synthesis, monographic method, scientific abstraction, visual, centered moving average method, ADF test, KPSS test, economic and mathematical modeling, forecasting, graphical, tabular. …”
    Get full text
    Article
  10. 750

    Unusual Findings With Imaging-Guided Fine Needle Aspiration by Robert Pei, Shane M. Woods, Brant G. Wang

    Published 2025-01-01
    “…For deep-seated lesions, fine needle aspiration (FNA) under imaging guidance may be crucial to secure material for definitive diagnosis and further management. …”
    Get full text
    Article
  11. 751

    Femtosecond Laser Assisted Keratoplasty by Devesh Sharma, Umang Mathur

    Published 2014-07-01
    “…Improved wound designs with the femtosecond laser-mushroom, top-hat, zig-zag, Christmas tree, and dovetail, increase the surface area of apposition and provide more secure incisions. Early visual rehabilitation and suture removal are possible advantages. …”
    Get full text
    Article
  12. 752

    Management of fracture and displacement of a previously successful bilateral transconjunctival ab-externo XEN gel stent: a case report by Qi Zhang, Chengshou Zhang, Xin Liu, Min Chen, Kaijun Wang

    Published 2025-02-01
    “…To reduce this risk, employing a transconjunctival ab-externo approach with conjunctival dissection and securing the XGS with sutures was found to decrease complications, indicating a more effective surgical strategy for XGS implantation.…”
    Get full text
    Article
  13. 753
  14. 754

    An intelligent optimized object detection system for disabled people using advanced deep learning models with optimization algorithm by Marwa Obayya, Fahd N. Al-Wesabi, Menwa Alshammeri, Huda G. Iskandar

    Published 2025-05-01
    “…Among other beneficial technologies, object detection (OD) is a computer technology related to image processing and computer vision (CV), which identifies and describes objects like vehicles, animals, and persons from digital videos and images. Visually impaired persons (VIPs) can utilize the OD approach for detecting problems and recognizing services to offer secure and informative navigation. …”
    Get full text
    Article
  15. 755

    Preoperative Ankle Swelling and the Effect On Postoperative Wound Complications Following Ankle Fracture Surgery by Anthony M. Silva MBBS, MSc, FRACS(Orth), FAOrthA, Helena Franco MD, MMSc, MSurg, Tom P. Walsh BPod MHSc(Pod), PhD, Albert Hohuynh MBBS, Simon Platt MB, ChB, FRCS, FRCS(Tr&Orth)

    Published 2025-07-01
    “…Delaying surgery until swelling subsides is thought to secure better outcomes, although no guidelines exist to direct surgeons when an appropriate time to intervention is or whether a visual inspection of the swelling is correlated to quantitative measurement. …”
    Get full text
    Article
  16. 756

    Biological constraint in digital data encoding: A DNA based approach for image representation by Muhammad Rafi Muttaqin, Yeni Herdiyeni, Agus Buono, Karlisa Priandana, Iskandar Zulkarnaen Siregar, Wisnu Ananta Kusuma

    Published 2025-08-01
    “…Multiple Sequence Alignment analysis shows that biological constraints successfully preserved the core visual features, allowing accurate clustering. However, this method also faces drawbacks, particularly in the reduction of visual information and sensitivity to changes in image intensity. …”
    Get full text
    Article
  17. 757

    159 Benefits of career development grant coaching groups for early career clinical and translational investigators beyond funding success by Sudeshna De, Kharma Foucher

    Published 2025-04-01
    “…Funding confidence in securing funding also increased from 40.8 ± 19.1 to 64.0 ± 20.7 (p  =  0.003). …”
    Get full text
    Article
  18. 758

    Privacy-Preserving Image Retrieval and Sharing in Social Multimedia Applications by Zongye Zhang, Fucai Zhou, Shiyue Qin, Qiang Jia, Zifeng Xu

    Published 2020-01-01
    “…First, the users extract visual features from the images, and perform locality-sensitive hashing functions on visual features to generate image profile vectors. …”
    Get full text
    Article
  19. 759

    The Ponte Delle Chianche on the <i>Via Traiana</i> in Buonalbergo (Benevento, Italy): New Data for an Integrated Study by Ivan Ferrari

    Published 2024-12-01
    “…The results obtained will be used to implement a comprehensive project for the recovery and securing of the property.…”
    Get full text
    Article
  20. 760

    Mechanism-Based Fire Hazard Chain Risk Assessment for Roll-On/Roll-Off Passenger Vessels Transporting Electric Vehicles: A Fault Tree–Fuzzy Bayesian Network Approach by Xiaodan Jiang, Wei Ren, Haibin Xu, Shiyuan Zheng, Shijie Wu

    Published 2025-01-01
    “…Primary triggers include external heat sources, improper vehicle securing, and vehicle collisions, leading to thermal runaway in lithium batteries. …”
    Get full text
    Article