Search alternatives:
equalization » visualization (Expand Search)
method » methods (Expand Search)
Showing 481 - 500 results of 10,657 for search 'equalization method', query time: 0.20s Refine Results
  1. 481
  2. 482

    Ultrasonic echo method in detection of breast calcifications. Transient analysis by Leszek FILIPCZYŃSKI, Tamara KUJAWSKA, Grażyna ŁYPACEWICZ

    Published 2015-07-01
    “…As the result of the performed analysis and experiments the author concluded that microcalcifications are not detectable by the ultrasonic echo method. The radii of calcifications which can be found at the frequency of 5 MHz are equal to 0.6 mm or 1.6 mm depending on the maximum sampling error assumed for a single measurement of the tissue interference background.…”
    Get full text
    Article
  3. 483

    Music Therapy as a supporting method in the treatment of bipolar disorder by Oliwia, Agnieszka Ewelina Wojciechowska, Marek Jarosław Molenda, Maria Wachowska, Marta Szymura, Mateusz Paniak, Mateusz Romaniuk, Michał Brunon Krawczyk, Paweł Maciej Rycąbel, Wojciech Jan Sowiński

    Published 2025-04-01
    “…However, despite their effectiveness and many benefits, these methods may not always be sufficient—especially in treatment-resistant cases.   …”
    Get full text
    Article
  4. 484

    Capacitance and Conductance Compensation Methods for Efficient Computing‐In‐Memory Designs by Yubiao Luo, Fei Qiao, Zhong Sun

    Published 2024-12-01
    “…Here, the capacitance and conductance compensation methods are reviewed that have been used for CIM designs based on static random‐access memory (SRAM) in combination with capacitors and nonvolatile resistive memory, respectively, and uncover the underlying principles and their application to CIM. …”
    Get full text
    Article
  5. 485

    Application of the calculation method for calculating an economically justified land tax by A. V. Ilin

    Published 2022-07-01
    “…It is concluded that in case of disagreement of an organization or an individual with the amount of tax base, its revision is carried out within the framework of tax relations using the principle of economic feasibility and equality of taxation and calculation method developed by economic science to protect taxpayer’s rights.…”
    Get full text
    Article
  6. 486

    POSSIBILITIES OF USING CRYOSURGICAL METHOD IN TREATMENT OF DEPTH BRAIN TUMORS by A. I. Kholyavin, V. B. Nizkovolos, B. V. Martynov, D. V. Svistov, A. D. Anichkov, N. P. Alekseeva

    Published 2016-02-01
    “…Cryosurgical method is used in treatment of patients with glial tumors which localized in depth and functionally meaningful brain areas. …”
    Get full text
    Article
  7. 487

    First Electrochemical Method of Nitrothal-Isopropyl Determination in Water Samples by Dariusz Guziejewski, Agnieszka Nosal-Wiercińska, Sławomira Skrzypek, Witold Ciesielski, Sylwia Smarzewska

    Published 2016-01-01
    “…The repeatability of the method was determined at a nitrothal-isopropyl concentration level equal to 6.0 × 10−7 mol L−1 and expressed as RSD = 5.5% (n=6). …”
    Get full text
    Article
  8. 488

    Selection of the optimal type of fish pass using the Rembrandt method by Mateusz Hämmerling

    Published 2019-03-01
    “…Results and conclusions Results of calculations using Rembrandt’s multi-criteria decision support method indicated that according to the investor’s priorities the best fish pass was slot pass, for aquatic organisms - bypass channel, and calculations which assumed equal values for second level factors also point to slot pass.…”
    Get full text
    Article
  9. 489

    The cover of randomness: validating implicit methods for the study of sensitive topics by Charles Efferson, Sonja Vogt

    Published 2025-01-01
    “…We review the methods we developed to study female genital cutting in Sudan and sex-selective abortion in Armenia. …”
    Get full text
    Article
  10. 490

    A Comparison of the efficacies of differential item functioning detection methods by Münevver Başman

    Published 2023-03-01
    “…Based on Item Response Theory and Classic Test Theory, there are some methods, with different advantages and limitations to identify items that show DIF. …”
    Get full text
    Article
  11. 491

    Theoretical Study of a Design Method for Underexcavation in Building Rectification by Jun-Hua Xiao, Jian-Ping Sun, Xin Zhang, Zong-Bao Jiang, Dao-Tong Guo

    Published 2023-01-01
    “…For buildings with shallow foundations embedded in natural soil sediments, the underexcavation method is often used to correct building inclination. …”
    Get full text
    Article
  12. 492

    Methods of Payment for Primary Health Care in Russia and Foreign Countries by O. E. Kachkova, T. I. Krishtaleva

    Published 2021-02-01
    “…Researchers in many countries are looking for effective ways to organize payment for primary health care and conclude that the method of per capita financing of clinics with fund-holding has both positive and negative aspects, which necessitates their obligatory consideration when deciding on the use of this payment method. …”
    Get full text
    Article
  13. 493
  14. 494
  15. 495

    Innovative approach and method of conjugate-contour construction for Roots rotor by LI Yulong, LIU Ping, SONG Anran

    Published 2025-05-01
    “…Therefore, an innovative approach and method are proposed which is suitable not only for common known but also for current unknown conjugate-contour curves.MethodsThe concepts of engagement-distance as length and engagement-angle as direction of conjugate-vector from the pitch-point to the engagement-point was proposed, the intrinsic logic relation of engagement-distance and engagement-angle was summarized, and then the innovative approaches and methods of conjugate-contour construction were proposed.ResultsThe results show that different conjugate-vector functions uniquely determine different conjugate-contour shapes; different conjugate-contour shapes directly determine different output performance; the innovation of output performance is equivalent to the innovation of conjugate-contour; the engagement-angle is equal to the arc cosine function of the first derivative of engagement-distance to the rotation-angle of pitch-circle; the innovation of the conjugate-contour is equivalent to the innovation of the engagement-distance function. …”
    Get full text
    Article
  16. 496

    The Effects of Processing Methods on the Quality of Arabica Kintamani Green Beans by I Gede Pasek Mangku, Luh Suriati, Dewa Gede Yudi Ardana, Wayan Widiantara Putra

    Published 2022-10-01
    “…The quality of coffee beans depends on the post-harvest and processing method. Dry processing and wet processing are the most popular methods used and each process produces different quality coffee beans. …”
    Get full text
    Article
  17. 497

    Effect of adhesive application method on repair bond strength of composite by Hee Kyeong Oh, Dong Hoon Shin

    Published 2021-08-01
    “…ObjectivesThis study aimed to evaluate the effect of the application method of universal adhesives on the shear bond strength (SBS) of repaired composites, applied with different thicknesses.Materials and MethodsThe 84 specimens (Filtek Z350 XT) were prepared, stored in distilled water for a week and thermocycled (5,000 cycles, 5°C to 55°C). …”
    Get full text
    Article
  18. 498

    Comparison of bluetongue virus detection and quantitation methods in south India by Subhra Subhadra, Subrat Kumar, Veluvarthy VS Suryanarayana, Daggupati Sreenivasulu

    Published 2014-10-01
    “…Polymerase chain reaction (PCR)-based real-time detection assays may be an ideal method to detect the BTV genome in animal blood at an early stage of infection. …”
    Get full text
    Article
  19. 499

    Encrypted traffic classification method based on convolutional neural network by Rongna XIE, Zhuhong MA, Zongyu LI, Ye TIAN

    Published 2022-12-01
    “…Aiming at the problems of low accuracy, weak generality, and easy privacy violation of traditional encrypted network traffic classification methods, an encrypted traffic classification method based on convolutional neural network was proposed, which avoided relying on original traffic data and prevented overfitting of specific byte structure of the application.According to the data packet size and arrival time information of network traffic, a method to convert the original traffic into a two-dimensional picture was designed.Each cell in the histogram represented the number of packets with corresponding size that arrive at the corresponding time interval, avoiding reliance on packet payloads and privacy violations.The LeNet-5 convolutional neural network model was optimized to improve the classification accuracy.The inception module was embedded for multi-dimensional feature extraction and feature fusion.And the 1*1 convolution was used to control the feature dimension of the output.Besides, the average pooling layer and the convolutional layer were used to replace the fully connected layer to increase the calculation speed and avoid overfitting.The sliding window method was used in the object detection task, and each network unidirectional flow was divided into equal-sized blocks, ensuring that the blocks in the training set and the blocks in the test set in a single session do not overlap and expanding the dataset samples.The classification experiment results on the ISCX dataset show that for the application traffic classification task, the average accuracy rate reaches more than 95%.The comparative experimental results show that the traditional classification method has a significant decrease in accuracy or even fails when the types of training set and test set are different.However, the accuracy rate of the proposed method still reaches 89.2%, which proves that the method is universally suitable for encrypted traffic and non-encrypted traffic.All experiments are based on imbalanced datasets, and the experimental results may be further improved if balanced processing is performed.…”
    Get full text
    Article
  20. 500

    METHODS AND RESULTS OF STUDYING THE STRUCTURE AND TINCTORIAL PROPERTIES OF CATGUT THREAD by O. Maksymenko, V. Hryn

    Published 2023-04-01
    “…The other half of the catgut globules were studied using the method of epoxy plastination with the production of grinds with staining by a 1% solution of methylene blue on a 1% borax and without any staining. …”
    Get full text
    Article