Showing 761 - 780 results of 841 for search 'security in visualization', query time: 0.12s Refine Results
  1. 761

    Efficacy and safety of stem cells in the treatment of glaucoma: systematic review and meta-analysis based on animal experiments by Danning Wu, Yanjing Liu, Xia Zhang, Ruixuan Zhang, Shaopeng Wang, Hui Lu, Tao Yue

    Published 2025-07-01
    “…While current therapies predominantly focus on lowering intraocular pressure (IOP), neuroprotective strategies to preserve visual function remain an unmet clinical need. Stem cells exhibit high proliferative capacity and multilineage differentiation potential, demonstrating notable efficacy in glaucoma treatment. …”
    Get full text
    Article
  2. 762

    Comparison of three types of scleral fixation of the intraocular lens by Zeeyoon Byun, Sungsoon Hwang, Mingui Kong

    Published 2025-03-01
    “…The four-point fixation method involved a double-armed polypropylene suture and two 26-gauge needles to secure the four IOL haptics at four distinct sites. …”
    Get full text
    Article
  3. 763
  4. 764

    Exploring the nonlinear behavior of solitary wave structure to the integrable Kairat-X equation by Maha Alammari, Mujahid Iqbal, Waqas Ali Faridi, Muhammad Amin S. Murad, Reem Algethamie, Faizah A. H. Alomari, Abdullah S. Alsubaie, Aly R. Seadawy, David Yaro

    Published 2024-11-01
    “…With numerical simulations, the secured soliton solutions visualized in two-dimensional, three-dimensional, and contour graphs represent the physical phenomena of the demonstrated results. …”
    Get full text
    Article
  5. 765

    Higher Dimensional Kadomtsev–Petviashvili Equation: New Collision Phenomena by Hajar F. Ismael, Usman Younas, Tukur Abdulkadir Sulaiman, Muhammad Amin S. Murad, Nehad Ali Shah, Shams Forruque Ahmed

    Published 2024-01-01
    “…A set of results like breather, two-wave, and lump periodic solutions are secured. To visually depict the output, a variety of graphs featuring distinct shapes are produced in response to appropriate parameter values. …”
    Get full text
    Article
  6. 766

    A Low‐Cost Alternative Technique for Eye Protection During Prone Positioning in Spinal Surgery by John Emelifeonwu, Douglas Duncan, Jay J. Park, Andreas K. Demetriades

    Published 2025-04-01
    “…Among these, postoperative visual loss (POVL) is of significant concern. Preventing POVL requires close collaboration between spinal surgeons and anaesthetists. …”
    Get full text
    Article
  7. 767

    Available Capacity Evaluation Method of Electric Vehicle Charging Stations Based on Multi-parametric Programming by Haiqing CAI, Wei DAI, Jingyi ZHAO, Cheng WANG, Zhijie ZHANG, Shuyong LI

    Published 2022-11-01
    “…The proposed method can efficiently and accurately visualize the AC boundaries of EVCSs with full consideration of the implicit coupling effects among multiple EVCSs and assists in the decision-making of distribution network scheduling. …”
    Get full text
    Article
  8. 768

    Hamming Code in JPEG Image Steganography within the Discrete Cosine Transform Domain by Dian Zulfikar, Hermanto Hermanto

    Published 2025-06-01
    “…Compared to conventional techniques such as JSteg and F5, the proposed approach demonstrates improved embedding capacity, better visual quality, and higher resistance to statistical steganalysis, making it suitable for secure and efficient data hiding applications.…”
    Get full text
    Article
  9. 769

    Graph Neural Network Classification in EEG-Based Biometric Identification: Evaluation of Functional Connectivity Methods Using Time-Frequency Metric by Roghaieh Ashenaei, Ali Asghar Beheshti Shirazi

    Published 2025-01-01
    “…Statistical tests and connectivity visualizations validate our methods’ reliability, demonstrating advancements in EEG-based biometrics for secure and practical applications.…”
    Get full text
    Article
  10. 770

    Ajvar in Focus on Branding Based on Consumer Habits by Dragana Đurić, Marko Pavlović, Milena Ilić, Miodrag Simić

    Published 2025-02-01
    “…This strategy contributes to a more secure placement for producers and greater consumer confidence. …”
    Get full text
    Article
  11. 771

    VQ-oriented data hiding based on adjustable error compensation strategy by Chin-Chen Chang, Ji-Hwei Horng, Chia-Shou Shih, Xu Wang

    Published 2021-10-01
    “…For low-quality VQ images, embedding can improve the visual quality of the stego-image at the same time.…”
    Get full text
    Article
  12. 772

    THE USE OF SILICONE KEY AND METER CONVERGENCE ANGLE OF THE TOOTH TO CONTROL THE ACCURACY OF THE TOOTH PREPARATION FOR METAL-CERAMIC CROWNS by He Zhiqiang, Qin Lingfeng

    Published 2018-03-01
    “…Unfortunately, the doctor without the use of a special device, visually, is not able to accurately determine the value of convergence of interproximal tooth stump walls. …”
    Get full text
    Article
  13. 773

    Examining Doctrinal Strategies to Counter the Promotion of Western Lifestyles through Ayatollah Khamenei's Quranic Perspective by Hossein Rezaei

    Published 2024-12-01
    “…The study employs a qualitative approach, incorporating discourse analysis, grounded theory, and content analysis, with its scope covering selected oral (audio-visual) works of the Supreme Leader from 1989 to 2023.…”
    Get full text
    Article
  14. 774

    Więcej niż obraz – metody dokumentacji zabytków architektury z wykorzystaniem HBIM. Przykład siedziby Instytutu Historycznego Uniwersytetu Wrocławskiego by Urszula Kwast-Kotlarek, Agnieszka Seidel-Grzesińska

    Published 2025-04-01
    “…The paper addresses the question of whether it is possible to secure information about a listed architectural object when it is comprehensively renovated with regard to specific functional uses. …”
    Get full text
    Article
  15. 775
  16. 776

    High-capacity separable reversible data-Hiding method in encrypted images based on block-level encryption and Huffman compression coding by Kai-Meng Chen, Chin-Chen Chang

    Published 2021-10-01
    “…The experimental results and comparison proved that the proposed method performs better than previous methods in terms of embedding capacity and visual quality.…”
    Get full text
    Article
  17. 777

    Smart Real-time Attendance System for Nigerian Universities by Mikailu Habila, Faseki N. Francisca, Luwani Ishaya, Muhammed Kabir Ahmed, Umar A. Muhammad, Haruna P. Charles

    Published 2025-01-01
    “…Key development tools included InsightFace, OpenCV, and Streamlit, with Visual Studio Code as the IDE. The system ensures high accuracy, with 94% face detection, 98% face recognition, and 96% overall attendance prediction accuracy. …”
    Get full text
    Article
  18. 778

    Investigation of lump, breather and multi solitonic wave solutions to fractional nonlinear dynamical model with stability analysis by M.A. El-Shorbagy, Sonia Akram, Mati ur Rahman

    Published 2024-12-01
    “…In the current research, the new extended direct algebraic method (NEDAM) and the symbolic computational method, along with different test functions, the Hirota bilinear method, are capitalized to secure soliton and lump solutions to the (2+1)-dimensional fractional telecommunication system. …”
    Get full text
    Article
  19. 779

    Spatial and Temporal Mapping of RF Exposure in an Urban Core Using Exposimeter and GIS by Montaña Rufo-Pérez, Alicia Antolín-Salazar, Jesús M. Paniagua-Sánchez, Antonio Jiménez-Barco, Francisco J. Rodríguez-Hernández

    Published 2025-02-01
    “…Central to this investigation was the use of an exposimeter, strategically positioned on the back of the operator and secured to the hip area via a belt, to ensure comprehensive and accurate field measurements. …”
    Get full text
    Article
  20. 780

    Light Encryption Scheme Using Light-Emitting Diode and Camera Image Sensor by Yang Liu, Kevin Liang, Hung-Yu Chen, Liang-Yu Wei, Chin-Wei Hsu, Chi-Wai Chow, Chien-Hung Yeh

    Published 2016-01-01
    “…Visible light communication (VLC) is regarded as relatively secure communication when compared with other wireless communications using radio frequency (RF). …”
    Get full text
    Article