Secure edge-guided adaptive image steganography using HED-based attention maps and CNN. [PDF]
Alrawashdeh R +4 more
europepmc +1 more source
Embedded Interactions and Selective Disclosure: Network Effects on Conversations aboard Skylab
How do absent others influence our interactions? We argue in this paper that interactions are embedded within networks formed by chains of specific relationships between known third parties. The anticipation of future interactions with external others conditions our interpretation of the current situation and affects our behavior in the interaction. We
Michael Schultz +2 more
wiley +1 more source
Reversible data hiding for electronic patient information security for telemedicine applications. [PDF]
Muhudin A +3 more
europepmc +1 more source
This article introduces the concept of excluded participation to examine how inclusion and exclusion are negotiated in real time within a Danish fifth‐grade classroom. Using a micro‐sociological framework, particularly the work of Erving Goffman, the study focuses on the case of Anders, a student whose participation is symbolically recognized yet ...
Jørn Bjerre
wiley +1 more source
A Two-Phase Embedding Approach for Secure Distributed Steganography. [PDF]
Woźniak K, Ogiela MR, Ogiela L.
europepmc +1 more source
This study describes the work at an emergency and critical care center, focusing on the collaboration of multiple nurses when moving patients from the outpatient department to the ward. This study is an ethnomethodological ethnography based on fieldwork at a hospital and analysis of video data. The patient transport process is temporally organized into
Hiroki Maeda, Yumi Nishimura
wiley +1 more source
Text cryptography and steganography based on RNA sequences generation, true random number generators, and codebook method. [PDF]
Hamad S, Rashid OF, Al-Dabbas HM.
europepmc +1 more source
Assessing Capability Complexity Using Enterprise Architecture Framework
ABSTRACT This study proposes a structured and quantitative methodology to evaluate the holistic complexity of system‐of‐systems (SoSs), employing the Zachman Architecture Framework (ZAF) as its foundational analytical tool. A five‐phase analytical procedure is developed and empirically validated, encompassing: (1) refinement of complexity measures, (2)
Javad Bakhshi, Mahmoud Efatmaneshnik
wiley +1 more source
Multi-Dimensional Acoustic Cascaded Holographic Encryption with Instantaneous Visual Decryption via Particle Manipulation. [PDF]
Lin Q +8 more
europepmc +1 more source
It's Not You, It's the System: Women Professors in TESOL and the Persistence of Gender Bias
Abstract Although progress has been made with respect to the role and position of women in academia, overt and covert discrimination as well as structural and systemic bias persist. In this article, we report on research conducted with 14 women professors from 10 different countries to explore to what extent these issues affect women professors in ...
Sarah Mercer +3 more
wiley +1 more source

