Suggested Topics within your search.
Suggested Topics within your search.
- Visual communication 2
- ART / Digital 1
- Bildanalyse 1
- Bildwissenschaft 1
- Computer animation 1
- Criminal investigation 1
- Digital cinematography 1
- Equality -- Economic aspects -- Econometric models 1
- Fraud investigation 1
- Investigations 1
- Moral and ethical aspects 1
- Photography 1
- Poverty -- Statistical methods 1
- Semiotik 1
- Textanalyse 1
- Visual literacy 1
- Visuelle Kommunikation 1
- Visuelle Medien 1
- Visuelle Wahrnehmung 1
-
3601
Bruxism: methods of application and results of treatment with botulinum neuroprotein (Relatox)
Published 2019-07-01Get full text
Article -
3602
Dentine method: Aging white‐tailed deer by tooth measurements
Published 2013-06-01“…Thus, using tooth measurements to age deer provided more accurate age estimation than visual tooth‐wear methods. The dentine method is particularly useful for deer ≥3.5 years old. …”
Get full text
Article -
3603
POSSIBILITIES OF USING CRYOSURGICAL METHOD IN TREATMENT OF DEPTH BRAIN TUMORS
Published 2016-02-01“…Cryosurgical method is used in treatment of patients with glial tumors which localized in depth and functionally meaningful brain areas. …”
Get full text
Article -
3604
First Electrochemical Method of Nitrothal-Isopropyl Determination in Water Samples
Published 2016-01-01“…The repeatability of the method was determined at a nitrothal-isopropyl concentration level equal to 6.0 × 10−7 mol L−1 and expressed as RSD = 5.5% (n=6). …”
Get full text
Article -
3605
Selection of the optimal type of fish pass using the Rembrandt method
Published 2019-03-01“…Results and conclusions Results of calculations using Rembrandt’s multi-criteria decision support method indicated that according to the investor’s priorities the best fish pass was slot pass, for aquatic organisms - bypass channel, and calculations which assumed equal values for second level factors also point to slot pass.…”
Get full text
Article -
3606
The cover of randomness: validating implicit methods for the study of sensitive topics
Published 2025-01-01“…We review the methods we developed to study female genital cutting in Sudan and sex-selective abortion in Armenia. …”
Get full text
Article -
3607
A Comparison of the efficacies of differential item functioning detection methods
Published 2023-03-01“…Based on Item Response Theory and Classic Test Theory, there are some methods, with different advantages and limitations to identify items that show DIF. …”
Get full text
Article -
3608
Data hiding method based on color table expansion technique
Published 2009-01-01“…Based on color table expansion technique for indexed images,a data hiding method was proposed,and the se-curity and the hiding capacity were analyzed.The analysis results show that this method has very strong security and very high hiding capacity.Secret data can be hidden in an indexed cover image to generate a stego-image with the same visual effect as the cover image and resumed without distortion from the stego-image if the correct key is used.In addition,the statistical feature of the secret data is completely covered up by using random data,so the stego-image is statistically in-dependent of the secret data.…”
Get full text
Article -
3609
Data hiding method based on color table expansion technique
Published 2009-01-01“…Based on color table expansion technique for indexed images,a data hiding method was proposed,and the se-curity and the hiding capacity were analyzed.The analysis results show that this method has very strong security and very high hiding capacity.Secret data can be hidden in an indexed cover image to generate a stego-image with the same visual effect as the cover image and resumed without distortion from the stego-image if the correct key is used.In addition,the statistical feature of the secret data is completely covered up by using random data,so the stego-image is statistically in-dependent of the secret data.…”
Get full text
Article -
3610
A Novel Printable Watermarking Method in Dithering Halftone Images
Published 2016-01-01“…In addition, comparing to Guo et al.’s method, the experimental results show that the proposed method provides higher robustness for the above-mentioned attacks and better visual quality in the high-frequency regions of halftone images.…”
Get full text
Article -
3611
Theoretical Study of a Design Method for Underexcavation in Building Rectification
Published 2023-01-01“…For buildings with shallow foundations embedded in natural soil sediments, the underexcavation method is often used to correct building inclination. …”
Get full text
Article -
3612
Methods of Payment for Primary Health Care in Russia and Foreign Countries
Published 2021-02-01“…Researchers in many countries are looking for effective ways to organize payment for primary health care and conclude that the method of per capita financing of clinics with fund-holding has both positive and negative aspects, which necessitates their obligatory consideration when deciding on the use of this payment method. …”
Get full text
Article -
3613
Development of a personalized diet using the structural optimization method
Published 2023-04-01Get full text
Article -
3614
LAW ENFORCEMENT AS A METHOD OF PROVISION FOR NATIONAL TAX SECURITY
Published 2017-03-01Get full text
Article -
3615
Innovative approach and method of conjugate-contour construction for Roots rotor
Published 2025-05-01“…Therefore, an innovative approach and method are proposed which is suitable not only for common known but also for current unknown conjugate-contour curves.MethodsThe concepts of engagement-distance as length and engagement-angle as direction of conjugate-vector from the pitch-point to the engagement-point was proposed, the intrinsic logic relation of engagement-distance and engagement-angle was summarized, and then the innovative approaches and methods of conjugate-contour construction were proposed.ResultsThe results show that different conjugate-vector functions uniquely determine different conjugate-contour shapes; different conjugate-contour shapes directly determine different output performance; the innovation of output performance is equivalent to the innovation of conjugate-contour; the engagement-angle is equal to the arc cosine function of the first derivative of engagement-distance to the rotation-angle of pitch-circle; the innovation of the conjugate-contour is equivalent to the innovation of the engagement-distance function. …”
Get full text
Article -
3616
Method for Extracellular Electrochemical Impedance Spectroscopy on Epithelial Cell Monolayers
Published 2025-06-01Get full text
Article -
3617
The Effects of Processing Methods on the Quality of Arabica Kintamani Green Beans
Published 2022-10-01“…The quality of coffee beans depends on the post-harvest and processing method. Dry processing and wet processing are the most popular methods used and each process produces different quality coffee beans. …”
Get full text
Article -
3618
Research and prospect of reversible data hiding method with contrast enhancement
Published 2016-04-01“…Reversible data hiding methods can recover the cover image losslessly after extracting the secret message from the marked image.Such technology can be used in the certification or the label of military,justice and medical images,which are sensitive and slight modification are not allowed.Especially for the medical images,RDH tech-nology can be used in protecting the privacy of the patient.A series of RDH methods with contrast enhancement ef-fect were introduced and classified into pixel-based histogram methods and prediction-error-based histogram meth-ods according to the type of carrier in RDH scheme.The main purpose of such algorithms was to improve the sub-jective visual quality of marked images and to embed secret data into cover image reversibly meanwhile.These se-ries of algorithms were suitable for the research of privacy protection of medical image.Finally,future development in this direction is prospected through analyzing the advantages and disadvantages of the existing work.…”
Get full text
Article -
3619
CAD AND CAE METHODS IN COMPUTER ASSISTED DESIGN OF WORM MESHES
Published 2014-03-01“…Modelling of worm meshes with the use of CAD (Computer Aided Design) and CAE (Computer Aided Engineering) methods enables tracking the design process from the very beginning, i.e. from the concept or specific assumptions, until the final stage only by using appropriate software, thereby lowering the costs and eliminating common errors. …”
Get full text
Article -
3620
METHOD OF DETECTION OF RESIDUAL TISSUES IN RECURRENT OPERATIONS ON THE THYROID GLAND
Published 2018-01-01“…The residual tissues of the thyroid gland accurately visualized during the following operation. Described method gives the possibility to detect all regions of residual tissues which should be removed and at the same time it shortens a revision and surgery trauma.…”
Get full text
Article