Results 91 to 100 of about 24,642,685 (320)

Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding

open access: yesIEEE Transactions on Circuits and Systems for Video Technology, 2011
Video data hiding is still an important research topic due to the design complexities involved. We propose a new video data hiding method that makes use of erasure correction capability of repeat accumulate codes and superiority of forbidden zone data hiding.
Esen, Ersin, Alatan, A. Aydin
openaire   +2 more sources

Re‐Awakening Public Attention to the Silent Pandemic of Cancer Among Older Adults in Low‐ and Middle‐Income Countries

open access: yesAging and Cancer, EarlyView.
ABSTRACT As global populations age, cancer is increasingly becoming a leading cause of morbidity and mortality among older adults, particularly in low‐ and middle‐income countries (LMICs). Despite accounting for the majority of new cancer cases and deaths, older individuals remain underrepresented in cancer research, clinical guidelines, and health ...
Ibrahim Bidemi Abdullateef   +2 more
wiley   +1 more source

Dark triad and knowledge hiding in firms: Mediating role of perceived organizational politics

open access: yesActa Psychologica
Negative behaviors at the workplace always disturb the management of the firms. This research investigates the link between the dark triad and various types of Knowledge hiding (Evasive hiding, Playing dumb, and Rationalized hiding) in firms. In addition,
Yiyu Wang   +3 more
doaj   +1 more source

Comparing the Effect of Semi‐Immersive Virtual Reality, Computerized Cognitive Training, and Traditional Rehabilitation on Cognitive Function in Multiple Sclerosis: A Randomized Clinical Trial

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Cognitive impairment is a common non‐motor symptom in Multiple Sclerosis (MS), negatively affecting autonomy and Quality of Life (QoL). Innovative rehabilitation strategies, such as semi‐immersive virtual reality (VR) and computerized cognitive training (CCT), may offer advantages over traditional cognitive rehabilitation (TCR ...
Maria Grazia Maggio   +8 more
wiley   +1 more source

Evaluation of a Novel Electric Health Record Sidecar Application to Display Rheumatoid Arthritis Clinical Outcomes During Clinic Visits: Results of a Stepped‐Wedge Cluster Randomized Pragmatic Trial

open access: yesArthritis Care &Research, EarlyView.
Objective We developed a novel electronic health record sidecar application to visualize key rheumatoid arthritis (RA) outcomes, including disease activity, physical function, and pain, via a patient‐facing graphical interface designed for use during outpatient visits (“RA PRO dashboard”).
Gabriela Schmajuk   +16 more
wiley   +1 more source

Corners-based Image Information Hiding Method

open access: yesIraqi Journal for Computers and Informatics, 2017
The huge explosion of information over World Wide Web forces us to use information security methods to keep it away from intruders. One of these security methods is information hiding method.
Ahmed Talib
doaj   +1 more source

A novel two-dimensional reversible data hiding scheme based on high-efficiency histogram shifting for JPEG images

open access: yesInternational Journal of Distributed Sensor Networks, 2022
In recent years, reversible data hiding technology has been widely used in JPEG images for special purposes such as file management and image authentication.
Ben He   +4 more
doaj   +1 more source

Formal and informal social care in people with Rheumatic and Musculoskeletal diseases: a cross‐sectional multicentre survey

open access: yesArthritis Care &Research, Accepted Article.
Introduction Rheumatic and musculoskeletal diseases(RMDs) are leading causes of physical disability, necessitating support with activities of daily living(ADLs). This study describes social care received by patients with RMDs in two disperate regions of England: Salford(urban) and Norfolk(rural).
Mehreen Somro   +6 more
wiley   +1 more source

What Do Large Language Models Know About Materials?

open access: yesAdvanced Engineering Materials, EarlyView.
If large language models (LLMs) are to be used inside the material discovery and engineering process, they must be benchmarked for the accurateness of intrinsic material knowledge. The current work introduces 1) a reasoning process through the processing–structure–property–performance chain and 2) a tool for benchmarking knowledge of LLMs concerning ...
Adrian Ehrenhofer   +2 more
wiley   +1 more source

Analysis of Information Hiding Techniques in the Texts [PDF]

open access: yesEngineering and Technology Journal, 2005
Nowadays ; information hiding represents one of important sciences , which was found more importance by the researchers . The goal of steganography is to transmit messages to destination in full secrecy .
Abdul Rahma, Abdalla Al - Dhao
doaj   +1 more source

Home - About - Disclaimer - Privacy