Results 91 to 100 of about 58,144 (218)

Digital Image Watermarking Techniques: A Review

open access: yesInformation, 2020
Digital image authentication is an extremely significant concern for the digital revolution, as it is easy to tamper with any image. In the last few decades, it has been an urgent concern for researchers to ensure the authenticity of digital images ...
Mahbuba Begum, Mohammad Shorif Uddin
doaj   +1 more source

Low-Surface-Brightness Galaxies in the Sloan Digital Sky Survey. I. Search Method and Test Sample

open access: yes, 2003
In this paper we present results of a pilot study to use imaging data from the Sloan Digital Sky Survey (SDSS) to search for low-surface-brightness (LSB) galaxies.
Alexander G. Pramskij   +19 more
core   +1 more source

Robust steganographic framework for securing sensitive healthcare data of telemedicine using convolutional neural network

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch   +4 more
wiley   +1 more source

Chromosome‐scale genome assembly of the South American fruit fly, Anastrepha fraterculus sp.1

open access: yesInsect Science, EarlyView.
Anastrepha fraterculus sp. 1 is a major fruit fly pest in Argentina, currently controlled through chemical treatments and traps. This study aims to enhance the genomic understanding of this species to support the development of sterile insect technique as well as the use of innovative technologies.
Máximo Rivarola   +15 more
wiley   +1 more source

Combination and comparison of AES and RC4 cryptography in least significant bit (LSB) method in digital image to improve message security

open access: yesJurnal Informatika, 2018
Message security is something that must be kept secretly. However, to maintain the security and the secret of a message it takes two different methods. To maintain the security of messages, the science that has been widely used is to use cryptography. As
Rahmat Sulaiman
doaj   +1 more source

Spectroscopic and photometric studies of low-metallicity star-forming dwarf galaxies. I. SBS 1129+576

open access: yes, 2003
Spectroscopy and V,I CCD photometry of the dwarf irregular galaxy SBS 1129+576 are presented for the first time. The CCD images reveal a chain of compact H II regions within the elongated low-surface-brightness (LSB) component of the galaxy.
Anders   +50 more
core   +1 more source

Relationship Between Fecal Bile Acid Profile and Intestinal Microbiota in Patients With Chronic Radiation Enteritis

open access: yesJournal of Digestive Diseases, EarlyView.
Patients with chronic radiation enteritis (CRE) demonstrate dysregulated bile acid (BA) metabolism, characterized by an increased proportion of primary BAs and a decreased proportion of secondary BAs. Moreover, the diversity of the intestinal microbiota is significantly reduced in individuals with CRE, and there is a bidirectional interaction between ...
Xin Shen   +9 more
wiley   +1 more source

Management of retinopathy of prematurity in a tertiary referral neonatal intensive care unit: Treatment rates and the impact of outsourcing laser therapy

open access: yesActa Ophthalmologica, EarlyView.
Abstract Purpose To describe the treatment rate for retinopathy of prematurity (ROP) at a tertiary referral neonatal intensive care unit (NICU) in the south‐western region of the Netherlands. In addition, we evaluated the impact of outsourcing laser treatment, implemented in 2018, by comparing treatment characteristics from 3 years prior and 3 years ...
L. A. Derks   +5 more
wiley   +1 more source

A New Digital Watermarking Algorithm Using Combination of Least Significant Bit (LSB) and Inverse Bit

open access: yes, 2011
In this paper, we introduce a new digital watermarking algorithm using least significant bit (LSB). LSB is used because of its little effect on the image.
Bamatraf, Abdullah   +2 more
core  

Using continuous visual stimulus tracking for detecting visual function loss due to acquired brain injury

open access: yesActa Ophthalmologica, EarlyView.
Abstract Purpose Acquired brain injury (ABI) may cause homonymous visual field (VF) defects. Standard automated perimetry (SAP) is the gold standard for VF assessment, but it can be challenging in ABI. Continuous visual stimulus tracking (SONDA; Standardised Oculomotor and Neurological Disorders Assessment) simplifies the perimetric task to following a
A. C. L. Vrijling   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy