28   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Benny Budiawan Tjandrasa     Pág. 199 - 206
The purpose of this paper is to prove the influence of the secure image on the interest of customers in selecting certain banks, and to explore the role of the secure image in net interest margin in Indonesia. This research uses a triangular approach whi... ver más
Revista: Journal of Economics, Business & Accountancy    Formato: Electrónico

 
en línea
Mamoon Riaz, Hammad Dilpazir, Sundus Naseer, Hasan Mahmood, Asim Anwar, Junaid Khan, Ian B. Benitez and Tanveer Ahmad    
In the past few decades, the transmission of data over an unsecure channel has resulted in an increased rate of hacking. The requirement to make multimedia data more secure is increasing day by day. Numerous algorithms have been developed to improve effi... ver más
Revista: Information    Formato: Electrónico

 
en línea
Aiiad Albeshri    
Mobile ad hoc networks (MANETs) play a highly significant role in the Internet of Things (IoT) for managing node mobility. MANET opens the pathway for different IoT-based communication systems with effective abilities for a variety of applications in sev... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Benny Budiawan Tjandrasa     Pág. 188 - 196
Consumer tastes have changed, technology is increasingly sophisticated and communication is no longer constrained by distance and time. Ease and speed of this transaction also support the development of online stores in Indonesia. On the one hand, the pr... ver más
Revista: Integrated Journal of Business and Economics    Formato: Electrónico

 
en línea
Jiafu Liu, Zhiyuan Yao, Shirui Guo, Hongjun Xie and Genke Yang    
Image classification is widely used in industrial defect detection, medical diagnosis, social welfare, and other fields, in which privacy and security of models and data must be involved. For example, in diamond synthesis, the diamond substrate image ann... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Zhengmao Ye, Hang Yin and Yongmao Ye    
This article presents an advanced dual chaotic watermarking scheme to improve information security. To ensure confidentiality in digital image transmission, a secure dual watermarking scheme is proposed by applying the chaotic logistic system and hyper-c... ver más
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Dani Elias Mfungo, Xianping Fu, Xingyuan Wang and Yongjin Xian    
In today?s digital age, it is crucial to secure the flow of information to protect data and information from being hacked during transmission or storage. To address this need, we present a new image encryption technique that combines the Kronecker xor pr... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Arun Kumar Rai, Hari Om, Satish Chand and Chia-Chen Lin    
In today?s digital age, ensuring the secure transmission of confidential data through various means of communication is crucial. Protecting the data from malicious attacks during transmission poses a significant challenge. To achieve this, reversible dat... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Fatma S. Alrayes, Saud S. Alotaibi, Khalid A. Alissa, Mashael Maashi, Areej Alhogail, Najm Alotaibi, Heba Mohsen and Abdelwahed Motwakel    
Unmanned Aerial Vehicles (UAVs), or drones, provided with camera sensors enable improved situational awareness of several emergency responses and disaster management applications, as they can function from remote and complex accessing regions. The UAVs c... ver más
Revista: Drones    Formato: Electrónico

 
en línea
Yuqiang Dou and Ming Li    
Security of image communication is more and more important in many applications such as the transmission of military and medical images. To meet the requirement, a new color image encryption algorithm using a new one-dimension (1D) chaotic map was propos... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mahbuba Begum and Mohammad Shorif Uddin    
Digital image authentication is an extremely significant concern for the digital revolution, as it is easy to tamper with any image. In the last few decades, it has been an urgent concern for researchers to ensure the authenticity of digital images. Base... ver más
Revista: Information    Formato: Electrónico

 
en línea
Dandan Liu, Jian Shen, Zhihua Xia and Xingming Sun    
Content-based image retrieval (CBIR) has been widely used in many applications. Large storage and computation overheads have made the outsourcing of CBIR services attractive. However, the privacy issues brought by outsourcing have become a big problem. I... ver más
Revista: Information    Formato: Electrónico

 
en línea
Elnora Stuart,Darrell Parker     Pág. 222 - 230
Cities negatively impacted by de-industrialization are turning to marketing in order to ensure a financially secure future. As part of an economic development program for Spartanburg South Carolina, the Johnson College of Business of the University of So... ver más
Revista: Advances in Business Research    Formato: Electrónico

 
en línea
Elnora Stuart,Darrell Parker     Pág. 222 - 230
Cities negatively impacted by de-industrialization are turning to marketing in order to ensure a financially secure future. As part of an economic development program for Spartanburg South Carolina, the Johnson College of Business of the University of So... ver más
Revista: Advances in Business Research    Formato: Electrónico

 
en línea
Li Wang, Xiaosong Yang and Jianjun Zhang    
For video style transfer, naively applying still image techniques to process a video frame-by-frame independently often causes flickering artefacts. Some works adopt optical flow into the design of temporal constraint loss to secure temporal consistency.... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Sandra L. Gomez-Coronel, Ernesto Moya-Albor, Jorge Brieva and Andrés Romero-Arellano    
Currently, algorithms to embed watermarks into digital images are increasing exponentially, for example in image copyright protection. However, when a watermarking algorithm is applied, the preservation of the image?s quality is of utmost importance, for... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Moatsum Alawida, Je Sen Teh and Wafa? Hamdan Alshoura    
Drone-based surveillance has become widespread due to its flexibility and ability to access hazardous areas, particularly in industrial complexes. As digital camera capabilities improve, more visual information can be stored in high-resolution images, re... ver más
Revista: Drones    Formato: Electrónico

 
en línea
Ibrahim Abunadi, Hanan Abdullah Mengash, Saud S. Alotaibi, Mashael M. Asiri, Manar Ahmed Hamza, Abu Sarwar Zamani, Abdelwahed Motwakel and Ishfaq Yaseen    
Recent developments of semiconductor and communication technologies have resulted in the interconnection of numerous devices in offering seamless communication and services, which is termed as Internet of Everything (IoE). It is a subset of Internet of T... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Rina Komatsu and Tad Gonsalves    
In CycleGAN, an image-to-image translation architecture was established without the use of paired datasets by employing both adversarial and cycle consistency loss. The success of CycleGAN was followed by numerous studies that proposed new translation mo... ver más
Revista: AI    Formato: Electrónico

 
en línea
Tony Gwyn, Kaushik Roy and Mustafa Atay    
In the realm of computer security, the username/password standard is becoming increasingly antiquated. Usage of the same username and password across various accounts can leave a user open to potential vulnerabilities. Authentication methods of the futur... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »