Results 71 to 80 of about 1,362,310 (293)
This paper presents an automated helmet detection system leveraging Raspberry Pi and advanced deep learning techniques, specifically the YOLOv9 object detection model that focuses on real-time object detection.
Nikunj Tahilramani +4 more
doaj +1 more source
A Systematic Literature Review of Cyber Security Monitoring in Maritime
In recent years, many cyber incidents have occurred in the maritime sector, targeting the information technology (IT) and operational technology (OT) infrastructure.
Risto Vaarandi +4 more
doaj +1 more source
Light Fields for Face Analysis
The term “plenoptic” comes from the Latin words plenus (“full”) + optic. The plenoptic function is the 7-dimensional function representing the intensity of the light observed from every position and direction in 3-dimensional ...
Chiara Galdi +5 more
doaj +1 more source
Digital and Mobile Security for Mexican Journalists and Bloggers [PDF]
A new survey of 102 journalists and bloggers in 20 Mexican states shows nearly 70 percent have been threatened or have suffered attacks because of their work. In addition, 96 percent say they know of colleagues who have been attacked.
Jorge Luis Sierra
core
Dense Nanofibrillar Collagen–Silica Hybrids with High Strength and ECM‐Mimetic Tissue Integration
Dense nanofibrillar collagen–silica hybrids are engineered by synchronizing collagen fibrillogenesis with silica condensation, producing printable scaffolds that unexpectedly approach native extracellular matrix organization and strength. These cell‐free constructs guide endogenous cell‐infiltration, enable localized matrix remodeling, and integrate ...
Norein Norein +7 more
wiley +1 more source
Imaging of Biphoton States: Fundamentals and Applications
Quantum states of two photons exhibit a rich polarization and spatial structure, which provides a fundamental resource of strongly correlated and entangled states. This review analyzes the physics of these intriguing properties and explores the various techniques and technologies available to measure them, including the state of the art of their ...
Alessio D'Errico, Ebrahim Karimi
wiley +1 more source
Key Prediction Security of Keyed Sponges
The keyed sponge is a well-accepted method for message authentication. It processes data at a certain rate by sequential evaluation of an underlying permutation.
Bart Mennink
doaj +1 more source
Blockchains for Secure Digitized Medicine
Blockchain as an emerging technology has been gaining in popularity, with more possible applications to utilize the technology in the near future. With the offer of a decentralized, distributed environment without the need for a third trusted party (TTP), blockchains are being used to solve issues in systems that are susceptible to cyberattacks.
Shuaib, Khaled +3 more
openaire +2 more sources
Building a truster environment for e-business : a Malaysian perspective [PDF]
Internet identify ‘security’ as a major concern for businesses. In general, the level of security in any network environment is closely linked to the level of trust assigned to a particular individual or organization within that environment.
Din, M.N., Jamaluddin, M.Z.
core
Bio‐Inspired Molecular Events in Poly(Ionic Liquids)
Originating from dipolar and polar inter‐ and intra‐chain interactions of the building blocks, the topologies and morphologies of poly(ionic liquids) (PIL) govern their nano‐ and micro‐processibility. Modulating the interactions of cation‐anion pairs with aliphatic dipolar components enables the tunability of properties, facilitated by “bottom‐up ...
Jiahui Liu, Marek W. Urban
wiley +1 more source

