Results 91 to 100 of about 14,354,866 (342)

Improved RANSAC features image-matching method based on SURF

open access: yesThe Journal of Engineering, 2019
For the speed of traditional SIFT algorithm in the feature extraction and matching is slow, the article proposes an improved RANSAC features image matching method based on speeded up robust features (SURF).
Jinliang Liu, FanLiang Bu, FanLiang Bu
doaj   +1 more source

Audit for Information Systems Security [PDF]

open access: yes
The information and communication technologies advances made available enormous and vast amounts of information. This availability generates also significant risks to computer systems, information and to the critical operations and infrastructures they ...
Ana-Maria SUDUC   +2 more
core  

3D‐Printed Architected Material for the Generation of Foam‐Based Protective Equipment

open access: yesAdvanced Engineering Materials, EarlyView.
This study investigates 3D‐printed architected structures as alternatives to traditional foams in protective gear. It focuses on customizing impact strength and damping through design and manufacturing integration. Testing shows these structures outperform conventional foams, offering enhanced customizability, lower weight, and tunable performance ...
Ali Zolfagharian   +5 more
wiley   +1 more source

Information Security [PDF]

open access: yes, 2009
No abstract ...
Diaz-Rivera, Alexander
core   +1 more source

Large Area, Cost‐Effective, and Ultra‐Fast Fabrication of Mini‐Coils Toward Noninvasive Magnetic Applications

open access: yesAdvanced Engineering Materials, EarlyView.
A simple, cleanroom‐free method produces flexible mini‐coils using automated blade cutting. The process is fast, low‐cost, and supports diverse materials. The coils show strong durability and performance under repeated bending. Demonstrated use in resistor‐inductor filters and magnetic nanoparticle control proves their adaptability.
Changhao Ge   +5 more
wiley   +1 more source

A framework for estimating information security risk assessment method completeness

open access: yesInternational Journal of Information Security, 2017
In general, an information security risk assessment (ISRA) method produces risk estimates, where risk is the product of the probability of occurrence of an event and the associated consequences for the given organization.
G. Wangen   +2 more
semanticscholar   +1 more source

3D Bioprinting of Thick Adipose Tissues with Integrated Vascular Hierarchies

open access: yesAdvanced Functional Materials, Volume 35, Issue 12, March 18, 2025.
An advanced 3D bioprinting technique is used here to create thick adipose tissues with a central, vessel and extensive branching. The construct is made using alginate, gelatin and collagen‐based bioinks. Flow through the complex vessel network is demonstrated as well as its successful integration with a femoral artery following implantation in a rat ...
Idit Goldfracht   +5 more
wiley   +1 more source

Security Games with Information Leakage: Modeling and Computation [PDF]

open access: yes, 2015
Most models of Stackelberg security games assume that the attacker only knows the defender's mixed strategy, but is not able to observe (even partially) the instantiated pure strategy. Such partial observation of the deployed pure strategy -- an issue we
Dughmi, Shaddin   +5 more
core  

Information Security Risk Management

open access: yesThe Practice of Enterprise Modeling, 2017
Aim. The work aimed to study the methods of information security risk management in the context of digital transformation of companies.Objectives. The work discusses existing approaches to the modernization of information systems, including the gradual ...
Salimeh Dashti, P. Giorgini, Elda Paja
semanticscholar   +1 more source

3D Printed Ultra‐Fast Plastic Scintillators Based on Perovskite‐Photocurable Polymer Composite

open access: yesAdvanced Functional Materials, Volume 35, Issue 12, March 18, 2025.
The demand for radiation detection is increasing in a number of fields, including high‐energy physics, medical imaging, and homeland security. This study serves to demonstrate the potential for the fabrication of fast perovskite‐based scintillators with complex shapes via stereolithographic additive manufacturing, representing a new path toward the ...
Antonella Giuri   +16 more
wiley   +1 more source

Home - About - Disclaimer - Privacy