Results 21 to 30 of about 1,798,077 (286)
Informal complaints on health services: hidden patterns, hidden potentials [PDF]
To examine the prevalence of informal complaints on health services among clients of Health Maintenance Organizations, and explore demographic correlates. Such complaints are a potentially important source of information regarding quality of healthcare.Primary data were collected by a phone survey from a nationwide random sample of 1500 persons aged 21+
Iddo, Gal, Israel, Doron
openaire +2 more sources
A video coverless information hiding algorithm based on semantic segmentation
Due to the fact that coverless information hiding can effectively resist the detection of steganalysis tools, it has attracted more attention in the field of information hiding.
Nan Pan +4 more
doaj +1 more source
Extraction of Hidden Authentication Factors from Possessive Information
Smartphones have emerged as a ubiquitous personal gadget that serve as a repository for individuals’ significant personal data. Consequently, both physiological and behavioral traits, which are classified as biometric technologies, are used in ...
Nilobon Nanglae +2 more
doaj +1 more source
Hidden Context Influence on Pattern Recognition
The influence of hidden additional information concerning the circumstances of input data acquisition on the quality of decisions based on the data is considered. An analogue to the intuition influencing natural decision making is indicated. The problem
Juliusz L. Kulikowski
doaj +1 more source
Audio Information Camouflage Detection for Social Networks
Sending camouflaged audio information for fraud in social networks has become a new means of social networks attack. The hidden acoustic events in the audio scene play an important role in the detection of camouflaged audio information.
Jiu Lou +4 more
doaj +1 more source
Information Flows of Diverse Autoencoders
Deep learning methods have had outstanding performances in various fields. A fundamental query is why they are so effective. Information theory provides a potential answer by interpreting the learning process as the information transmission and ...
Sungyeop Lee, Junghyo Jo
doaj +1 more source
Diverse Visualization Techniques and Methods of Moving-Object-Trajectory Data: A Review
Trajectory big data have significant applications in many areas, such as traffic management, urban planning and military reconnaissance. Traditional visualization methods, which are represented by contour maps, shading maps and hypsometric maps, are ...
Jing He +4 more
doaj +1 more source
Selection entropy: The information hidden within neuronal patterns
This article is part of the Physical Review Research collection titled Physics of Neuroscience. Boltzmann entropy is a measure of the hidden information contained within a system.
Erik D. Fagerholm +5 more
doaj +1 more source
Comprehensive on Exploring Advanced Ciphering for Enhanced Data Protection: Review
Stage cipher. data protection; encryption; Cyber security ; open encryption; hidden communications; saving information; Encryption algorithms. Hidden Markov models; convolutional neural networks; e-learning; hide pictures; acoustic masking; Video data ...
sajaa g.mohammed
doaj +1 more source
Extract Hidden Information in Digital Images [PDF]
One of the Problems of image processing is that there is plenty of hidden information among the gray levels of these images. In this research the histogram technique is widely used for image enhancement to extract that information.
doaj +1 more source

