-
741
Designing a Digital Branding Pattern in Healthy Agricultural Products
Published 2024-09-01“…This issue, which is one of the most important and promising parts of the domestic economy, provides not only the food security of the country but also the social welfare of the people. …”
Get full text
Article -
742
Re-use of Building Products in the Netherlands
Published 2019-01-01“…This “map” offers a way to improve the visualization and the understanding of how the trajectories of flows of products are reused as well as the motivations, conditions, and limitations behind them. …”
Get full text
Article -
743
Management of a Traumatic Flap Dislocation Seven Years after LASIK
Published 2011-01-01“…Nine interrupted sutures were used to secure the flap. Three-weeks after surgery with no sutures remaining, the epithelial ingrowth and macrostriae had resolved with a visual acuity of 20/20.…”
Get full text
Article -
744
TAKE THE RISK OR LOSE THE CHANCE! CASE REPORT
Published 2021-06-01“…Patients typically experience variable reductions in visual acuity, image distortion, and increased sensitivity to glare and light. …”
Get full text
Article -
745
Modified conjunctival flap as a primary procedure for nontraumatic acute corneal perforation
Published 2018-01-01“…Five patients with good visual potential underwent further corneal surgeries, including Boston keratoprosthesis and penetrating keratoplasty. …”
Get full text
Article -
746
Representing succession: Tudor royal portraits, 1544–1546: context, production and analysis
Published 2025-12-01“…Evidence suggests that it was Kateryn, who helped achieve for Mary and Elizabeth the dynastic legitimacy that secured their subsequent reigns. In celebration of this achievement, between 1544 and 1546, evidence also suggests that it was the queen who was instrumental in commissioning a campaign of portraits of her stepchildren as a visual affirmation of their enhanced status. …”
Get full text
Article -
747
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
Published 2022-02-01“…In addition, the secret logo becomes more secured using (2 out 2 share) visual cryptography and the second secret share as a private key.…”
Get full text
Article -
748
Translating register, style and tone in dubbing and subtitling
Published 2005-07-01“…The audiovisual translator has to sift through the multiple layers of meaning within the context of the verbal, non-verbal, aural and visual signs of the audiovisual text. Lexical, grammatical and stylistic changes in the subtitled and dubbed versions of three films (Smoke, Blue in the Face and The Piano) will be studied to establish the extent to which coherence is secured in relation to these features.…”
Get full text
Article -
749
Forecasting stock quotations of PJSC NK Lukoil based on polynomial trend models
Published 2024-12-01“…Analysis, synthesis, monographic method, scientific abstraction, visual, centered moving average method, ADF test, KPSS test, economic and mathematical modeling, forecasting, graphical, tabular. …”
Get full text
Article -
750
Unusual Findings With Imaging-Guided Fine Needle Aspiration
Published 2025-01-01“…For deep-seated lesions, fine needle aspiration (FNA) under imaging guidance may be crucial to secure material for definitive diagnosis and further management. …”
Get full text
Article -
751
Femtosecond Laser Assisted Keratoplasty
Published 2014-07-01“…Improved wound designs with the femtosecond laser-mushroom, top-hat, zig-zag, Christmas tree, and dovetail, increase the surface area of apposition and provide more secure incisions. Early visual rehabilitation and suture removal are possible advantages. …”
Get full text
Article -
752
Management of fracture and displacement of a previously successful bilateral transconjunctival ab-externo XEN gel stent: a case report
Published 2025-02-01“…To reduce this risk, employing a transconjunctival ab-externo approach with conjunctival dissection and securing the XGS with sutures was found to decrease complications, indicating a more effective surgical strategy for XGS implantation.…”
Get full text
Article -
753
-
754
An intelligent optimized object detection system for disabled people using advanced deep learning models with optimization algorithm
Published 2025-05-01“…Among other beneficial technologies, object detection (OD) is a computer technology related to image processing and computer vision (CV), which identifies and describes objects like vehicles, animals, and persons from digital videos and images. Visually impaired persons (VIPs) can utilize the OD approach for detecting problems and recognizing services to offer secure and informative navigation. …”
Get full text
Article -
755
Preoperative Ankle Swelling and the Effect On Postoperative Wound Complications Following Ankle Fracture Surgery
Published 2025-07-01“…Delaying surgery until swelling subsides is thought to secure better outcomes, although no guidelines exist to direct surgeons when an appropriate time to intervention is or whether a visual inspection of the swelling is correlated to quantitative measurement. …”
Get full text
Article -
756
Biological constraint in digital data encoding: A DNA based approach for image representation
Published 2025-08-01“…Multiple Sequence Alignment analysis shows that biological constraints successfully preserved the core visual features, allowing accurate clustering. However, this method also faces drawbacks, particularly in the reduction of visual information and sensitivity to changes in image intensity. …”
Get full text
Article -
757
159 Benefits of career development grant coaching groups for early career clinical and translational investigators beyond funding success
Published 2025-04-01“…Funding confidence in securing funding also increased from 40.8 ± 19.1 to 64.0 ± 20.7 (p = 0.003). …”
Get full text
Article -
758
Privacy-Preserving Image Retrieval and Sharing in Social Multimedia Applications
Published 2020-01-01“…First, the users extract visual features from the images, and perform locality-sensitive hashing functions on visual features to generate image profile vectors. …”
Get full text
Article -
759
The Ponte Delle Chianche on the <i>Via Traiana</i> in Buonalbergo (Benevento, Italy): New Data for an Integrated Study
Published 2024-12-01“…The results obtained will be used to implement a comprehensive project for the recovery and securing of the property.…”
Get full text
Article -
760
Mechanism-Based Fire Hazard Chain Risk Assessment for Roll-On/Roll-Off Passenger Vessels Transporting Electric Vehicles: A Fault Tree–Fuzzy Bayesian Network Approach
Published 2025-01-01“…Primary triggers include external heat sources, improper vehicle securing, and vehicle collisions, leading to thermal runaway in lithium batteries. …”
Get full text
Article