Showing 1 - 20 results of 147 for search 'verification modification', query time: 0.07s Refine Results
  1. 1

    Modification and Psychometric Verification of Questionnaire the "Group Reflexivity" by T.A. Nestik by S.V. Tarasov

    Published 2025-03-01
    “… <p style="text-align: justify;"><strong>Objective</strong> of the study is a meaningful modification and test a methodology for assessing the degree of expression reflexivity as a property of a study group, depending on its type (open, semi-closed).…”
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Medical Image Blind Integrity Verification with Krawtchouk Moments by Xu Zhang, Xilin Liu, Yang Chen, Huazhong Shu

    Published 2018-01-01
    “…A new blind integrity verification method for medical image is proposed in this paper. …”
    Get full text
    Article
  7. 7

    History of Economic Crises: Economic-Mathematical Verification of the Main Conclusions by G. A. Shcherbakov

    Published 2018-08-01
    “…A significant part of the work is devoted to verification of the findings of the study through economic and mathematical modeling using the software platform “Infoanalytic”, the intellectual basis of which is the methodology of the regularizing Bayesian approach (modification of the “traditional” Bayesian approach) and Bayesian intelligent measurements designed to generate stable estimates under conditions of significant uncertainty as a priori, and the actual information coming in the current mode as well as. …”
    Get full text
    Article
  8. 8

    Commutative Watermarking-Encryption of Audio Data with Minimum Knowledge Verification by Roland Schmitz, Jan Gruber

    Published 2017-01-01
    “…We present a scheme for commutative watermarking-encryption (CWE) of audio data and demonstrate its robustness against an important class of attacks, Time-Scale Modifications (TSM). In addition, we show how the proposed CWE scheme can be integrated into a cryptographic protocol enabling public verification of the embedded mark without disclosing the mark or the watermarking key used for embedding.…”
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Innovative QR Code System for Tamper-Proof Generation and Fraud-Resistant Verification by Suliman A. Alsuhibany

    Published 2025-06-01
    “…To address these challenges, this paper presents an innovative system for the secure generation and verification of Quick Response (QR) codes using a digital watermarking technique. …”
    Get full text
    Article
  12. 12

    Verification of data integration in an integrated system of databases on the properties of inorganic substances and materials by S. A. Stupnikov

    Published 2025-07-01
    “…However, data integration programs can be very complicated. Thus, formal verification of their correctness has emerged as an important task.In this article, an approach to verify the correctness of data integration in an integrated system of databases on the properties of inorganic substances and materials is considered. …”
    Get full text
    Article
  13. 13

    Model-Based Dynamic Structural Modification of Machine Tools by Mateusz Wąsik, Krzysztof Lis, Krzysztof Lehrich, Łukasz Mucha

    Published 2018-01-01
    “…The methodology can be applied in the case of machine tools in which the loss of stability has been found during its maintenance, what consequently disables the possibility of machining with the required machining parameters from the performance point of view. Modal parameters modification is based on structural dynamic modification techniques and preliminary simulation tests performed by using Finite Element Method (FEM) and verification with experimental research.…”
    Get full text
    Article
  14. 14

    Fuzzy Robust Modification Design of EMU Transmission Gear by Ziqiang Sheng, Yuedong Wang, Xiaoning Bai, Shenxuan Wang

    Published 2021-03-01
    “…Finally, the simulation verification of each modification scheme is carried out. …”
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18

    Automated Correctness Proof of Algorithm Variants in Elliptic Curve Cryptography by M. . Anikeev, F. . Madlener, A. . Schlosser, S. A. Huss, C. . Walther

    Published 2010-12-01
    “…The correctness proof of the projective coordinate system transformation has practically been performed with the help of the an interactive formal verification system XeriFun.…”
    Get full text
    Article
  19. 19

    MODERN VERIFICATION CRITERIA AND BASIC PRINCIPLES OF THE MANAGEMENT OF NON-ALCOHOLIC FATTY LIVER DISEASE IN CHILDREN by O.A. Poda

    Published 2021-04-01
    “…The role of lifestyle modification as the main method of NAFLD treatment according to current international recommendations is described in detail. …”
    Get full text
    Article
  20. 20

    Modification of Neutron Kinetic Code for Plate Type Fuel Nuclear Reactor by Salah Ud-Din Khan, Shahab Ud-Din Khan, Yang Zhifei

    Published 2013-01-01
    “…The research is conducted on the modification of neutron kinetic code for the plate type fuel nuclear reactor. …”
    Get full text
    Article