Showing 20,561 - 20,580 results of 22,124 for search 'stOrk~', query time: 1.74s Refine Results
  1. 20561

    Assessment of surface roughness and compressive strength of resin-based composite using different types of bleaching protocols. by Hemn Muhssin Suleman

    Published 2023-12-01
    “…Every forty samples were divided into four groups; Group 1 (n = 10) The samples were stored in deionized water at 37°C for two weeks as control, group 2 (n =10) The samples were subjected to bleaching with 22% Carbamide Peroxide (CP) Home bleaching, group 3 (n =10) The samples were subjected to bleaching with 14% Hydrogen Peroxide (HP) Home bleaching and group 4 (n =10) The samples were subjected to bleaching with 25% Hydrogen Peroxide (HP in-Office) in a dental clinic. …”
    Get full text
    Article
  2. 20562

    Transtelephonic Electrocardiographic Transmission in the Preparticipation Screening of Athletes by Theodoros Samaras, Savvato Karavasiliadou, Evangelia Kouidi, John N. Sahalos, Asterios Deligiannis

    Published 2008-01-01
    “…The mean total time for recording, storing, and transmitting the ECG was four minutes per subject. …”
    Get full text
    Article
  3. 20563

    Contemporary issues in ensuring biological safety during disposal of biological wastes of animal origin by incineration in the Russian Federation by A. V. Belchikhina, M. A. Shibayev, A. M. Selyanin, A. K. Karaulov

    Published 2022-03-01
    “…Most of these units are stationary and they belong to establishments involved in farm animal keeping, animal product processing, production and storing. Such equipment is mostly serviced by non-qualified staff ignorant of the technical characteristics and operating principles of this equipment. …”
    Get full text
    Article
  4. 20564

    Reversible data hiding algorithm in encrypted images based on prediction error and bitplane coding by Haiyong WANG, Mengning JI

    Published 2023-12-01
    “…With the increasing use of cloud backup methods for storing important files, the demand for privacy protection has also grown.Reversible data hiding in encrypted images (RDHEI) is an important technology in the field of information security that allows embedding secret information in encrypted images while ensuring error-free extraction of the secret information and lossless recovery of the original plaintext image.This technology not only enhances image security but also enables efficient transmission of sensitive information over networks.Its application in cloud environments for user privacy protection has attracted significant attention from researchers.A reversible data hiding method in encrypted images based on prediction error and bitplane coding was proposed to improve the embedding rate of existing RDHEI algorithms.Different encoding methods were employed by the algorithm depending on the distribution of the bitplanes, resulting in the creation of additional space in the image.The image was rearranged to allocate the freed-up space to the lower-order planes.Following this, a random matrix was generated using a key to encrypt the image, ensuring image security.Finally, the information was embedded into the reserved space.The information can be extracted and the image recovered by the receiver using different keys.The proposed algorithm achieves a higher embedding rate compared to five state-of-the-art RDHEI algorithms.The average embedding rates on BOWS-2, BOSSBase, and UCID datasets are 3.769 bit/pixel, 3.874 bit/pixel, and 3.148 bit/pixel respectively, which represent an improvement of 12.5%, 6.9% and 8.6% compared to the best-performing algorithms in the same category.Experimental results demonstrate that the proposed algorithm effectively utilizes the redundancy of images and significantly improves the embedding rate.…”
    Get full text
    Article
  5. 20565

    Erosive Effect of Long-Term Liquid Oral Pediatric Medicines on Permanent Tooth Enamel by Fábio Gomes dos Santos, Ana Maria Barros Chaves Pereira, Isabela Albuquerque Passos Farias, Tibério Andrade dos Passos, Andressa Feitosa Bezerra de Oliveira

    Published 2025-02-01
    “…Specimens were immersed in 5 ml of medicine solution for 5 min, 2x/ day for 12 days, and stored in artificial saliva at 37°C between immersions. …”
    Get full text
    Article
  6. 20566

    Impact of COBIT5 Framework Application in the Efficiency and Effectiveness of Information Technology. “An Applied Analytical study of a sample of Iraqi Private Shareholding Banks”... by Abdul Ridha S. AL-Basri, Adnan Mohammmed

    Published 2020-06-01
    “… The success of the banking sector in the modern era depends on the effective and innovative use of information technology and information is one of the main resources of all institutions, and from the moment of creation of information to the moment of disposal technology plays an important role, so it requires investment and harmonization of investment in information technology and business, recently considered IT is a strategic tool for managing enterprise resources that connects stakeholders, customers, and suppliers, and promotes the conduct of various processes as quickly and efficiently as possible, and is a tool for storing and retrieving business-related information. …”
    Get full text
    Article
  7. 20567

    Narrative approach to understanding compassion: a mixed methods study in a Polish sample by Mariusz Zieba, Mateusz P. Zatorski, Natalia E. Wójcik

    Published 2025-02-01
    “…The narrative identity of a highly compassionate person includes more content related to seeing oneself as sensitive to suffering and actively working to reduce or prevent it.ConclusionsThis study highlights how individuals with varying levels of compassion construct narratives about significant life events. …”
    Get full text
    Article
  8. 20568

    Improving The Performance of Big Data Databases by Nzar Abdulqadir Ali, Dashne Raouf Arif

    Published 2019-12-01
    “…A relational database management system (RDBMS) stores data in a structured format using rows and columns. …”
    Get full text
    Article
  9. 20569

    Quantum secure patient login credential system using blockchain for electronic health record sharing framework by M. Natarajan, A. Bharathi, C. Sai Varun, Shitharth Selvarajan

    Published 2025-02-01
    “…Moreover, each block is linked with its nearby blocks, leading to a network controlled by patients responsible for storing and sharing the information. In healthcare, BCT can help with mobile health apps, monitoring equipment, sharing and keeping of clinical trial data, electronic medical records, and insurance information storage. …”
    Get full text
    Article
  10. 20570

    Explanation of the Ideal administrative system model from the perspective of Islam by Halimi Ali, Vatheq Qadir Ali

    Published 2023-01-01
    “…By studying a number of Quranic stories and verses related to the life of divine prophets, thirteen Nahj al-Balaghah letters, verses and traditions related to the Age of Advent, and by using the inferential-interpretive method, present research explains the model of the ideal administrative system from the perspective of Islam, and from this channel in solving administrative system problems in Islamic countries. …”
    Get full text
    Article
  11. 20571

    Novel Considerations in the ML/AI Modeling of Large-Scale Learning Loss by Mirna Elizondo, June Yu, Daniel Payan, LI Feng, Jelena Tesic

    Published 2025-01-01
    “…For the pandemic school closure period, the mode of instruction and prior score emerged as the primary resilience factors in the learning recovery intervention method. …”
    Get full text
    Article
  12. 20572

    Effect of 17α-methyl testosterone on sex reversal and growth performance of Nile tilapia,Oreochromis niloticus by Belete Berhanu, Kassaye BalkewWorkagegn, Natarajan Pavanasam

    Published 2023-12-01
    “…Three days old Niletilapia fry were stocked in plastic jars with 5 L capacity installed in four fiber glass tanks. …”
    Get full text
    Article
  13. 20573

    Nutrition literacy among women participating in a community kitchen program in Antioquia, Colombia: A cross-sectional study by Sherer Erin L., Conroy Stephen, Bateson Charlotte, Storts Adam, Gonzalez Paola

    Published 2024-12-01
    “…Results from the assessment are divided into three categories: the likelihood of poor nutrition literacy (NLit-S score ≤ 28), the possibility of poor nutrition literacy (NLit-S score 29–38), and the likelihood of good nutrition literacy (NLit-S score ≥ 39). …”
    Get full text
    Article
  14. 20574

    Federal Deep Learning Approach of Intrusion Detection System for In-Vehicle Communication Network Security by In-Seop Na, Anandakumar Haldorai, Nithesh Naik

    Published 2025-01-01
    “…Additionally, it is capable of arresting temporal dependencies over time in the information. This work implements a zero-trust security approach for storing information in local device edges and only sharing the weights that were learned with the centralised federal network. …”
    Get full text
    Article
  15. 20575
  16. 20576

    Transmission line trip faults under extreme snow and ice conditions: a case study by Guojun Zhang

    Published 2025-01-01
    “…Abstract Extreme weather events, particularly snow and ice storms, present significant threats to the stability and reliability of high-voltage transmission lines, leading to substantial disruptions in power supply. …”
    Get full text
    Article
  17. 20577

    Evaluation of Polymerization Shrinkage and Depth of Cure of Silorane Based Composite Resin and Methacrylate Based Composite Resin (Comparative Study) by Diyar kh Bakr

    Published 2018-12-01
    “…After that specimens were stored in deionized water for one week. Subsequently, the marginal gaps were observed and measured by using a light microscope with a reticular measuring ocular. …”
    Get full text
    Article
  18. 20578

    The eradication of Asian longhorned beetle at Paddock Wood, UK by Dominic Eyre, Jane Barbrook

    Published 2021-03-01
    “…The epicentre of the outbreak was adjacent to a site that a company had used for storing imported stone in wood packaging. An eradication campaign was initiated involving the agencies responsible for plant health and forestry in England and Wales. …”
    Get full text
    Article
  19. 20579

    Digitalization of business increases the costs of information security by O M. Makhalina, V. N. Makhalin

    Published 2020-04-01
    “…One of the main reasons is the ever-increasing amount of information that needs to be stored and analysed. According to IDC forecasts, by 2025 the volume of data worldwide will increase by 10 times compared to 2017. …”
    Get full text
    Article
  20. 20580

    Peer-review Blinded Assay Test (P-BAT): a framework for trustless laboratory quality assurance for state-regulated cannabis markets by Stuart Procter, Grayson L. Baird, Jason Iannuccilli

    Published 2025-01-01
    “…While the primary objective of this process is to focus on laboratory performance, it will also highlight other common problems in the industry such as product adulteration by distributors and poor storge practices. Data from P-BAT should be publicly available so consumers can make informed decisions about their purchases based on the quality data derived from P-BAT. …”
    Get full text
    Article