Results 91 to 100 of about 14,354,866 (342)
Improved RANSAC features image-matching method based on SURF
For the speed of traditional SIFT algorithm in the feature extraction and matching is slow, the article proposes an improved RANSAC features image matching method based on speeded up robust features (SURF).
Jinliang Liu, FanLiang Bu, FanLiang Bu
doaj +1 more source
Audit for Information Systems Security [PDF]
The information and communication technologies advances made available enormous and vast amounts of information. This availability generates also significant risks to computer systems, information and to the critical operations and infrastructures they ...
Ana-Maria SUDUC +2 more
core
3D‐Printed Architected Material for the Generation of Foam‐Based Protective Equipment
This study investigates 3D‐printed architected structures as alternatives to traditional foams in protective gear. It focuses on customizing impact strength and damping through design and manufacturing integration. Testing shows these structures outperform conventional foams, offering enhanced customizability, lower weight, and tunable performance ...
Ali Zolfagharian +5 more
wiley +1 more source
A simple, cleanroom‐free method produces flexible mini‐coils using automated blade cutting. The process is fast, low‐cost, and supports diverse materials. The coils show strong durability and performance under repeated bending. Demonstrated use in resistor‐inductor filters and magnetic nanoparticle control proves their adaptability.
Changhao Ge +5 more
wiley +1 more source
A framework for estimating information security risk assessment method completeness
In general, an information security risk assessment (ISRA) method produces risk estimates, where risk is the product of the probability of occurrence of an event and the associated consequences for the given organization.
G. Wangen +2 more
semanticscholar +1 more source
3D Bioprinting of Thick Adipose Tissues with Integrated Vascular Hierarchies
An advanced 3D bioprinting technique is used here to create thick adipose tissues with a central, vessel and extensive branching. The construct is made using alginate, gelatin and collagen‐based bioinks. Flow through the complex vessel network is demonstrated as well as its successful integration with a femoral artery following implantation in a rat ...
Idit Goldfracht +5 more
wiley +1 more source
Security Games with Information Leakage: Modeling and Computation [PDF]
Most models of Stackelberg security games assume that the attacker only knows the defender's mixed strategy, but is not able to observe (even partially) the instantiated pure strategy. Such partial observation of the deployed pure strategy -- an issue we
Dughmi, Shaddin +5 more
core
Information Security Risk Management
Aim. The work aimed to study the methods of information security risk management in the context of digital transformation of companies.Objectives. The work discusses existing approaches to the modernization of information systems, including the gradual ...
Salimeh Dashti, P. Giorgini, Elda Paja
semanticscholar +1 more source
3D Printed Ultra‐Fast Plastic Scintillators Based on Perovskite‐Photocurable Polymer Composite
The demand for radiation detection is increasing in a number of fields, including high‐energy physics, medical imaging, and homeland security. This study serves to demonstrate the potential for the fabrication of fast perovskite‐based scintillators with complex shapes via stereolithographic additive manufacturing, representing a new path toward the ...
Antonella Giuri +16 more
wiley +1 more source

