Results 51 to 60 of about 979 (187)
Container Ship Accident Analysis due to Container Stacked on Deck as an Attempt to Improve Maritime Logistic System [PDF]
This paper analyses factors that might cause accidents to the container ships due to containers stacked on deck, and propose applicable actions to minimize these factors.
Priapalla Rahim Gafero, Sunaryo
doaj +1 more source
Book cover inventory (in the latest literature) [PDF]
The change in the context of the functioning of literature since 1989 and the transformations contemporary literary life has been subject to due to various reasons have resulted in the need to add a literary science reflection on the latest or not yet ...
Lachman, Magdalena
core +2 more sources
Trust‐Based Missing Link Prediction in Signed Social Networks with Privacy Preservation
With the development of mobile Internet, more and more individuals and institutions tend to express their views on certain things (such as software and music) on social platforms. In some online social network services, users are allowed to label users with similar interests as “trust” to get the information they want and use “distrust” to label users ...
Huaizhen Kou +7 more
wiley +1 more source
A portable audio/video recorder for longitudinal study of child development [PDF]
Collection and analysis of ultra-dense, longitudinal observational data of child behavior in natural, ecologically valid, non-laboratory settings holds significant promise for advancing the understanding of child development and developmental disorders ...
Goodwin, Matthew +3 more
core +3 more sources
A conceptual integration approach to the property word nagy ‘big’ [PDF]
This paper describes the various readings of the typically size-related Hungarian adjective nagy ‘big’ in combination with the corresponding noun readings in a corpus-based analysis. Adjective-noun combinations have not only attracted the attention of
Papp, Kornélia
core +1 more source
Review on feature-based method performance in text steganography [PDF]
The implementation of steganography in text domain is one the crutial issue that can hide an essential message to avoid the intruder. It is caused every personal information mostly in medium of text, and the steganography itself is expectedly as the ...
Din, Roshidi +4 more
core +3 more sources
STBS-Stega: Coverless text steganography based on state transition-binary sequence
Information-hiding technology has recently developed into an area of significant interest in the field of information security. As one of the primary carriers in steganography, it is difficult to hide information in texts because there is insufficient ...
Ning Wu +6 more
doaj +1 more source
Morphology of seismically slow lower-mantle structures [PDF]
Large low shear velocity provinces (LLSVPs), whose origin and dynamic implication remain enigmatic, dominate the lowermost mantle. For decades, seismologists have created increasingly detailed pictures of the LLSVPs through tomographic models constructed
Cottaar, S, Lekic, V
core +2 more sources
A Coverless Plain Text Steganography Based on Character Features
The coverless text steganography has become a research hotspot in the field of information hiding because no modification to a text carrier will improve the concealment of steganography. However, compared with images, audios, videos, or other carriers, a
Kaixi Wang, Quansheng Gao
doaj +1 more source
Coverless image steganography conceals information without modifying the carrier image, addressing vulnerabilities in traditional methods. However, existing approaches often require transmitting metadata, raising suspicion and security risks. To overcome
Sahar A. El-Rahman +5 more
doaj +1 more source

