Results 51 to 60 of about 979 (187)

Container Ship Accident Analysis due to Container Stacked on Deck as an Attempt to Improve Maritime Logistic System [PDF]

open access: yesE3S Web of Conferences, 2019
This paper analyses factors that might cause accidents to the container ships due to containers stacked on deck, and propose applicable actions to minimize these factors.
Priapalla Rahim Gafero, Sunaryo
doaj   +1 more source

Book cover inventory (in the latest literature) [PDF]

open access: yes, 2017
The change in the context of the functioning of literature since 1989 and the transformations contemporary literary life has been subject to due to various reasons have resulted in the need to add a literary science reflection on the latest or not yet ...
Lachman, Magdalena
core   +2 more sources

Trust‐Based Missing Link Prediction in Signed Social Networks with Privacy Preservation

open access: yesWireless Communications and Mobile Computing, Volume 2020, Issue 1, 2020., 2020
With the development of mobile Internet, more and more individuals and institutions tend to express their views on certain things (such as software and music) on social platforms. In some online social network services, users are allowed to label users with similar interests as “trust” to get the information they want and use “distrust” to label users ...
Huaizhen Kou   +7 more
wiley   +1 more source

A portable audio/video recorder for longitudinal study of child development [PDF]

open access: yes, 2012
Collection and analysis of ultra-dense, longitudinal observational data of child behavior in natural, ecologically valid, non-laboratory settings holds significant promise for advancing the understanding of child development and developmental disorders ...
Goodwin, Matthew   +3 more
core   +3 more sources

A conceptual integration approach to the property word nagy ‘big’ [PDF]

open access: yes, 2010
This paper describes the various readings of the typically size-related Hungarian adjective nagy ‘big’ in combination with the corresponding noun readings in a corpus-based analysis. Adjective-noun combinations have not only attracted the attention of
Papp, Kornélia
core   +1 more source

Review on feature-based method performance in text steganography [PDF]

open access: yes, 2021
The implementation of steganography in text domain is one the crutial issue that can hide an essential message to avoid the intruder. It is caused every personal information mostly in medium of text, and the steganography itself is expectedly as the ...
Din, Roshidi   +4 more
core   +3 more sources

STBS-Stega: Coverless text steganography based on state transition-binary sequence

open access: yesInternational Journal of Distributed Sensor Networks, 2020
Information-hiding technology has recently developed into an area of significant interest in the field of information security. As one of the primary carriers in steganography, it is difficult to hide information in texts because there is insufficient ...
Ning Wu   +6 more
doaj   +1 more source

Morphology of seismically slow lower-mantle structures [PDF]

open access: yes, 2016
Large low shear velocity provinces (LLSVPs), whose origin and dynamic implication remain enigmatic, dominate the lowermost mantle. For decades, seismologists have created increasingly detailed pictures of the LLSVPs through tomographic models constructed
Cottaar, S, Lekic, V
core   +2 more sources

A Coverless Plain Text Steganography Based on Character Features

open access: yesIEEE Access, 2019
The coverless text steganography has become a research hotspot in the field of information hiding because no modification to a text carrier will improve the concealment of steganography. However, compared with images, audios, videos, or other carriers, a
Kaixi Wang, Quansheng Gao
doaj   +1 more source

C-HIDE: A Steganographic Framework for Robust Data Hiding and Advanced Security Using Coverless Hybrid Image Encryption With AES and ECC

open access: yesIEEE Access
Coverless image steganography conceals information without modifying the carrier image, addressing vulnerabilities in traditional methods. However, existing approaches often require transmitting metadata, raising suspicion and security risks. To overcome
Sahar A. El-Rahman   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy