Search alternatives:
method » methods (Expand Search)
Showing 3,601 - 3,620 results of 32,195 for search '(equalization OR visualization) method', query time: 0.20s Refine Results
  1. 3601
  2. 3602

    Dentine method: Aging white‐tailed deer by tooth measurements by Susan M. Cooper, Shane S. Sieckenius, Andrea L. Silva

    Published 2013-06-01
    “…Thus, using tooth measurements to age deer provided more accurate age estimation than visual tooth‐wear methods. The dentine method is particularly useful for deer ≥3.5 years old. …”
    Get full text
    Article
  3. 3603

    POSSIBILITIES OF USING CRYOSURGICAL METHOD IN TREATMENT OF DEPTH BRAIN TUMORS by A. I. Kholyavin, V. B. Nizkovolos, B. V. Martynov, D. V. Svistov, A. D. Anichkov, N. P. Alekseeva

    Published 2016-02-01
    “…Cryosurgical method is used in treatment of patients with glial tumors which localized in depth and functionally meaningful brain areas. …”
    Get full text
    Article
  4. 3604

    First Electrochemical Method of Nitrothal-Isopropyl Determination in Water Samples by Dariusz Guziejewski, Agnieszka Nosal-Wiercińska, Sławomira Skrzypek, Witold Ciesielski, Sylwia Smarzewska

    Published 2016-01-01
    “…The repeatability of the method was determined at a nitrothal-isopropyl concentration level equal to 6.0 × 10−7 mol L−1 and expressed as RSD = 5.5% (n=6). …”
    Get full text
    Article
  5. 3605

    Selection of the optimal type of fish pass using the Rembrandt method by Mateusz Hämmerling

    Published 2019-03-01
    “…Results and conclusions Results of calculations using Rembrandt’s multi-criteria decision support method indicated that according to the investor’s priorities the best fish pass was slot pass, for aquatic organisms - bypass channel, and calculations which assumed equal values for second level factors also point to slot pass.…”
    Get full text
    Article
  6. 3606

    The cover of randomness: validating implicit methods for the study of sensitive topics by Charles Efferson, Sonja Vogt

    Published 2025-01-01
    “…We review the methods we developed to study female genital cutting in Sudan and sex-selective abortion in Armenia. …”
    Get full text
    Article
  7. 3607

    A Comparison of the efficacies of differential item functioning detection methods by Münevver Başman

    Published 2023-03-01
    “…Based on Item Response Theory and Classic Test Theory, there are some methods, with different advantages and limitations to identify items that show DIF. …”
    Get full text
    Article
  8. 3608

    Data hiding method based on color table expansion technique by FEI Ru-chun1, WANG Li-na1, ZHANG Huan-guo1

    Published 2009-01-01
    “…Based on color table expansion technique for indexed images,a data hiding method was proposed,and the se-curity and the hiding capacity were analyzed.The analysis results show that this method has very strong security and very high hiding capacity.Secret data can be hidden in an indexed cover image to generate a stego-image with the same visual effect as the cover image and resumed without distortion from the stego-image if the correct key is used.In addition,the statistical feature of the secret data is completely covered up by using random data,so the stego-image is statistically in-dependent of the secret data.…”
    Get full text
    Article
  9. 3609

    Data hiding method based on color table expansion technique by FEI Ru-chun1, WANG Li-na1, ZHANG Huan-guo1

    Published 2009-01-01
    “…Based on color table expansion technique for indexed images,a data hiding method was proposed,and the se-curity and the hiding capacity were analyzed.The analysis results show that this method has very strong security and very high hiding capacity.Secret data can be hidden in an indexed cover image to generate a stego-image with the same visual effect as the cover image and resumed without distortion from the stego-image if the correct key is used.In addition,the statistical feature of the secret data is completely covered up by using random data,so the stego-image is statistically in-dependent of the secret data.…”
    Get full text
    Article
  10. 3610

    A Novel Printable Watermarking Method in Dithering Halftone Images by Hui-Lung Lee, Ling-Hwei Chen

    Published 2016-01-01
    “…In addition, comparing to Guo et al.’s method, the experimental results show that the proposed method provides higher robustness for the above-mentioned attacks and better visual quality in the high-frequency regions of halftone images.…”
    Get full text
    Article
  11. 3611

    Theoretical Study of a Design Method for Underexcavation in Building Rectification by Jun-Hua Xiao, Jian-Ping Sun, Xin Zhang, Zong-Bao Jiang, Dao-Tong Guo

    Published 2023-01-01
    “…For buildings with shallow foundations embedded in natural soil sediments, the underexcavation method is often used to correct building inclination. …”
    Get full text
    Article
  12. 3612

    Methods of Payment for Primary Health Care in Russia and Foreign Countries by O. E. Kachkova, T. I. Krishtaleva

    Published 2021-02-01
    “…Researchers in many countries are looking for effective ways to organize payment for primary health care and conclude that the method of per capita financing of clinics with fund-holding has both positive and negative aspects, which necessitates their obligatory consideration when deciding on the use of this payment method. …”
    Get full text
    Article
  13. 3613
  14. 3614
  15. 3615

    Innovative approach and method of conjugate-contour construction for Roots rotor by LI Yulong, LIU Ping, SONG Anran

    Published 2025-05-01
    “…Therefore, an innovative approach and method are proposed which is suitable not only for common known but also for current unknown conjugate-contour curves.MethodsThe concepts of engagement-distance as length and engagement-angle as direction of conjugate-vector from the pitch-point to the engagement-point was proposed, the intrinsic logic relation of engagement-distance and engagement-angle was summarized, and then the innovative approaches and methods of conjugate-contour construction were proposed.ResultsThe results show that different conjugate-vector functions uniquely determine different conjugate-contour shapes; different conjugate-contour shapes directly determine different output performance; the innovation of output performance is equivalent to the innovation of conjugate-contour; the engagement-angle is equal to the arc cosine function of the first derivative of engagement-distance to the rotation-angle of pitch-circle; the innovation of the conjugate-contour is equivalent to the innovation of the engagement-distance function. …”
    Get full text
    Article
  16. 3616
  17. 3617

    The Effects of Processing Methods on the Quality of Arabica Kintamani Green Beans by I Gede Pasek Mangku, Luh Suriati, Dewa Gede Yudi Ardana, Wayan Widiantara Putra

    Published 2022-10-01
    “…The quality of coffee beans depends on the post-harvest and processing method. Dry processing and wet processing are the most popular methods used and each process produces different quality coffee beans. …”
    Get full text
    Article
  18. 3618

    Research and prospect of reversible data hiding method with contrast enhancement by Yang YANG, Wei-ming ZHANG, ong-dong HOUD, Hui WANG, Neng-hai YU

    Published 2016-04-01
    “…Reversible data hiding methods can recover the cover image losslessly after extracting the secret message from the marked image.Such technology can be used in the certification or the label of military,justice and medical images,which are sensitive and slight modification are not allowed.Especially for the medical images,RDH tech-nology can be used in protecting the privacy of the patient.A series of RDH methods with contrast enhancement ef-fect were introduced and classified into pixel-based histogram methods and prediction-error-based histogram meth-ods according to the type of carrier in RDH scheme.The main purpose of such algorithms was to improve the sub-jective visual quality of marked images and to embed secret data into cover image reversibly meanwhile.These se-ries of algorithms were suitable for the research of privacy protection of medical image.Finally,future development in this direction is prospected through analyzing the advantages and disadvantages of the existing work.…”
    Get full text
    Article
  19. 3619

    CAD AND CAE METHODS IN COMPUTER ASSISTED DESIGN OF WORM MESHES by Henryk SABINIAK, Robert CICHOWICZ

    Published 2014-03-01
    “…Modelling of worm meshes with the use of CAD (Computer Aided Design) and CAE (Computer Aided Engineering) methods enables tracking the design process from the very beginning, i.e. from the concept or specific assumptions, until the final stage only by using appropriate software, thereby lowering the costs and eliminating common errors. …”
    Get full text
    Article
  20. 3620

    METHOD OF DETECTION OF RESIDUAL TISSUES IN RECURRENT OPERATIONS ON THE THYROID GLAND by A. V. Gostimskiy, A. F. Romanchishen, I. V. Zaitseva, Yu. V. Kuznetsova

    Published 2018-01-01
    “…The residual tissues of the thyroid gland accurately visualized during the following operation. Described method gives the possibility to detect all regions of residual tissues which should be removed and at the same time it shortens a revision and surgery trauma.…”
    Get full text
    Article