Results 81 to 90 of about 1,216,231 (401)

Secure and efficient DRM watermark algorithm of forensics in mobile internet

open access: yesEURASIP Journal on Image and Video Processing, 2018
With the development of mobile Internet technology, the characteristic of easy editing, transmitting, and forging the digital media bring great challenges in authenticity of multimedia.
Ma Zhaofeng, Jiang Ming
doaj   +1 more source

Beyond digital twins: the role of foundation models in enhancing the interpretability of multiomics modalities in precision medicine

open access: yesFEBS Open Bio, EarlyView.
This review highlights how foundation models enhance predictive healthcare by integrating advanced digital twin modeling with multiomics and biomedical data. This approach supports disease management, risk assessment, and personalized medicine, with the goal of optimizing health outcomes through adaptive, interpretable digital simulations, accessible ...
Sakhaa Alsaedi   +2 more
wiley   +1 more source

Mobile Project Management [PDF]

open access: yesInformatică economică, 2006
Based on the development of new communication and data transfer technologies, the mobile solutions for the management process have been able to provide new ways to conduct management actions.
Catalin BOJA, Marius POPA
doaj  

Autonomy and Morality in DRM and Anti-Circumvention Law

open access: yestripleC: Communication, Capitalism & Critique, 2008
Digital rights management technology, or DRM, provides self-enforcing technical exclusion from pre-determined uses of informational works. Such technical exclusion may supplement or even supplant intellectual property laws. The deployment of DRM has been
Dan L. Burk, Tarleton Gillespie
doaj   +1 more source

Flexible and Extensible Digital Object and Repository Architecture (FEDORA) [PDF]

open access: yesarXiv, 2013
We describe a digital object and respository architecture for storing and disseminating digital library content. The key features of the architecture are: (1) support for heterogeneous data types; (2) accommodation of new types as they emerge; (3) aggregation of mixed, possibly distributed, data into complex objects; (4) the ability to specify multiple
arxiv  

Body contour adaptation for weight‐loss and bolus for head and neck radiotherapy on Ethos version 2.0 and HyperSight: Synthetic CT versus direct calculation

open access: yesJournal of Applied Clinical Medical Physics, Volume 26, Issue 4, April 2025.
Abstract Purpose In radiotherapy, body contour inaccuracies may compromise the delineation of adjacent structures and affect calculated dose. Here, we evaluate the un‐editable body contours auto‐generated by Ethos versions 1.0 (v1) and 2.0 (v2) treatment planning softwares for two simulated cases: weight‐loss and bolus application, particularly ...
Abby Yashayaeva   +2 more
wiley   +1 more source

A Decentralised Digital Identity Architecture [PDF]

open access: yes, 2019
Current architectures to validate, certify, and manage identity are based on centralised, top-down approaches that rely on trusted authorities and third-party operators. We approach the problem of digital identity starting from a human rights perspective, with a primary focus on identity systems in the developed world. We assert that individual persons
arxiv   +1 more source

Calibration and volunteer testing of a prototype contactless respiratory motion detection system based on laser tracking

open access: yesJournal of Applied Clinical Medical Physics, Volume 26, Issue 4, April 2025.
Abstract Purpose The goal of this study was to assess the feasibility of a cost‐effective prototype of a laser‐based respiratory motion detection system utilizing a Leuze LDS for breath monitoring through calibration and volunteer tests. Methods This study was performed using the Anzai AZ‐773 V and computerized imaging reference systems (CIRS) motion ...
Isnaini Nur Islami   +6 more
wiley   +1 more source

Privacy-preserving digital rights management scheme in cloud computing

open access: yesTongxin xuebao, 2014
In order to meet the needs of digital content and user privacy protection in cloud computing environment, a privacy-preserving digital rights management (DRM) scheme in cloud computing was proposed.
Qin-long HUANG   +4 more
doaj   +2 more sources

ISWAR: An Imaging System with Watermarking and Attack Resilience [PDF]

open access: yesarXiv, 2012
With the explosive growth of internet technology, easy transfer of digital multimedia is feasible. However, this kind of convenience with which authorized users can access information, turns out to be a mixed blessing due to information piracy. The emerging field of Digital Rights Management (DRM) systems addresses issues related to the intellectual ...
arxiv  

Home - About - Disclaimer - Privacy