Results 91 to 100 of about 24,642,685 (320)
Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding
Video data hiding is still an important research topic due to the design complexities involved. We propose a new video data hiding method that makes use of erasure correction capability of repeat accumulate codes and superiority of forbidden zone data hiding.
Esen, Ersin, Alatan, A. Aydin
openaire +2 more sources
ABSTRACT As global populations age, cancer is increasingly becoming a leading cause of morbidity and mortality among older adults, particularly in low‐ and middle‐income countries (LMICs). Despite accounting for the majority of new cancer cases and deaths, older individuals remain underrepresented in cancer research, clinical guidelines, and health ...
Ibrahim Bidemi Abdullateef +2 more
wiley +1 more source
Dark triad and knowledge hiding in firms: Mediating role of perceived organizational politics
Negative behaviors at the workplace always disturb the management of the firms. This research investigates the link between the dark triad and various types of Knowledge hiding (Evasive hiding, Playing dumb, and Rationalized hiding) in firms. In addition,
Yiyu Wang +3 more
doaj +1 more source
ABSTRACT Background Cognitive impairment is a common non‐motor symptom in Multiple Sclerosis (MS), negatively affecting autonomy and Quality of Life (QoL). Innovative rehabilitation strategies, such as semi‐immersive virtual reality (VR) and computerized cognitive training (CCT), may offer advantages over traditional cognitive rehabilitation (TCR ...
Maria Grazia Maggio +8 more
wiley +1 more source
Objective We developed a novel electronic health record sidecar application to visualize key rheumatoid arthritis (RA) outcomes, including disease activity, physical function, and pain, via a patient‐facing graphical interface designed for use during outpatient visits (“RA PRO dashboard”).
Gabriela Schmajuk +16 more
wiley +1 more source
Corners-based Image Information Hiding Method
The huge explosion of information over World Wide Web forces us to use information security methods to keep it away from intruders. One of these security methods is information hiding method.
Ahmed Talib
doaj +1 more source
In recent years, reversible data hiding technology has been widely used in JPEG images for special purposes such as file management and image authentication.
Ben He +4 more
doaj +1 more source
Introduction Rheumatic and musculoskeletal diseases(RMDs) are leading causes of physical disability, necessitating support with activities of daily living(ADLs). This study describes social care received by patients with RMDs in two disperate regions of England: Salford(urban) and Norfolk(rural).
Mehreen Somro +6 more
wiley +1 more source
What Do Large Language Models Know About Materials?
If large language models (LLMs) are to be used inside the material discovery and engineering process, they must be benchmarked for the accurateness of intrinsic material knowledge. The current work introduces 1) a reasoning process through the processing–structure–property–performance chain and 2) a tool for benchmarking knowledge of LLMs concerning ...
Adrian Ehrenhofer +2 more
wiley +1 more source
Analysis of Information Hiding Techniques in the Texts [PDF]
Nowadays ; information hiding represents one of important sciences , which was found more importance by the researchers . The goal of steganography is to transmit messages to destination in full secrecy .
Abdul Rahma, Abdalla Al - Dhao
doaj +1 more source

