-
761
Efficacy and safety of stem cells in the treatment of glaucoma: systematic review and meta-analysis based on animal experiments
Published 2025-07-01“…While current therapies predominantly focus on lowering intraocular pressure (IOP), neuroprotective strategies to preserve visual function remain an unmet clinical need. Stem cells exhibit high proliferative capacity and multilineage differentiation potential, demonstrating notable efficacy in glaucoma treatment. …”
Get full text
Article -
762
Comparison of three types of scleral fixation of the intraocular lens
Published 2025-03-01“…The four-point fixation method involved a double-armed polypropylene suture and two 26-gauge needles to secure the four IOL haptics at four distinct sites. …”
Get full text
Article -
763
Unperceived bronchial bleeding complications during percutaneous dilatational tracheotomy: a case report and 3D simulation
Published 2025-05-01“…In conclusion, 3d printing can help to visualize uncommon complications during intensive care interventions. …”
Get full text
Article -
764
Exploring the nonlinear behavior of solitary wave structure to the integrable Kairat-X equation
Published 2024-11-01“…With numerical simulations, the secured soliton solutions visualized in two-dimensional, three-dimensional, and contour graphs represent the physical phenomena of the demonstrated results. …”
Get full text
Article -
765
Higher Dimensional Kadomtsev–Petviashvili Equation: New Collision Phenomena
Published 2024-01-01“…A set of results like breather, two-wave, and lump periodic solutions are secured. To visually depict the output, a variety of graphs featuring distinct shapes are produced in response to appropriate parameter values. …”
Get full text
Article -
766
A Low‐Cost Alternative Technique for Eye Protection During Prone Positioning in Spinal Surgery
Published 2025-04-01“…Among these, postoperative visual loss (POVL) is of significant concern. Preventing POVL requires close collaboration between spinal surgeons and anaesthetists. …”
Get full text
Article -
767
Available Capacity Evaluation Method of Electric Vehicle Charging Stations Based on Multi-parametric Programming
Published 2022-11-01“…The proposed method can efficiently and accurately visualize the AC boundaries of EVCSs with full consideration of the implicit coupling effects among multiple EVCSs and assists in the decision-making of distribution network scheduling. …”
Get full text
Article -
768
Hamming Code in JPEG Image Steganography within the Discrete Cosine Transform Domain
Published 2025-06-01“…Compared to conventional techniques such as JSteg and F5, the proposed approach demonstrates improved embedding capacity, better visual quality, and higher resistance to statistical steganalysis, making it suitable for secure and efficient data hiding applications.…”
Get full text
Article -
769
Graph Neural Network Classification in EEG-Based Biometric Identification: Evaluation of Functional Connectivity Methods Using Time-Frequency Metric
Published 2025-01-01“…Statistical tests and connectivity visualizations validate our methods’ reliability, demonstrating advancements in EEG-based biometrics for secure and practical applications.…”
Get full text
Article -
770
Ajvar in Focus on Branding Based on Consumer Habits
Published 2025-02-01“…This strategy contributes to a more secure placement for producers and greater consumer confidence. …”
Get full text
Article -
771
VQ-oriented data hiding based on adjustable error compensation strategy
Published 2021-10-01“…For low-quality VQ images, embedding can improve the visual quality of the stego-image at the same time.…”
Get full text
Article -
772
THE USE OF SILICONE KEY AND METER CONVERGENCE ANGLE OF THE TOOTH TO CONTROL THE ACCURACY OF THE TOOTH PREPARATION FOR METAL-CERAMIC CROWNS
Published 2018-03-01“…Unfortunately, the doctor without the use of a special device, visually, is not able to accurately determine the value of convergence of interproximal tooth stump walls. …”
Get full text
Article -
773
Examining Doctrinal Strategies to Counter the Promotion of Western Lifestyles through Ayatollah Khamenei's Quranic Perspective
Published 2024-12-01“…The study employs a qualitative approach, incorporating discourse analysis, grounded theory, and content analysis, with its scope covering selected oral (audio-visual) works of the Supreme Leader from 1989 to 2023.…”
Get full text
Article -
774
Więcej niż obraz – metody dokumentacji zabytków architektury z wykorzystaniem HBIM. Przykład siedziby Instytutu Historycznego Uniwersytetu Wrocławskiego
Published 2025-04-01“…The paper addresses the question of whether it is possible to secure information about a listed architectural object when it is comprehensively renovated with regard to specific functional uses. …”
Get full text
Article -
775
Chassis-based fiber-coupled optical probe design for reproducible quantitative diffuse optical spectroscopy measurements.
Published 2024-01-01“…Of the eight measurements, four were acquired by placing the probe into a secured chassis, and four were visually aligned and manually held. …”
Get full text
Article -
776
High-capacity separable reversible data-Hiding method in encrypted images based on block-level encryption and Huffman compression coding
Published 2021-10-01“…The experimental results and comparison proved that the proposed method performs better than previous methods in terms of embedding capacity and visual quality.…”
Get full text
Article -
777
Smart Real-time Attendance System for Nigerian Universities
Published 2025-01-01“…Key development tools included InsightFace, OpenCV, and Streamlit, with Visual Studio Code as the IDE. The system ensures high accuracy, with 94% face detection, 98% face recognition, and 96% overall attendance prediction accuracy. …”
Get full text
Article -
778
Investigation of lump, breather and multi solitonic wave solutions to fractional nonlinear dynamical model with stability analysis
Published 2024-12-01“…In the current research, the new extended direct algebraic method (NEDAM) and the symbolic computational method, along with different test functions, the Hirota bilinear method, are capitalized to secure soliton and lump solutions to the (2+1)-dimensional fractional telecommunication system. …”
Get full text
Article -
779
Spatial and Temporal Mapping of RF Exposure in an Urban Core Using Exposimeter and GIS
Published 2025-02-01“…Central to this investigation was the use of an exposimeter, strategically positioned on the back of the operator and secured to the hip area via a belt, to ensure comprehensive and accurate field measurements. …”
Get full text
Article -
780
Light Encryption Scheme Using Light-Emitting Diode and Camera Image Sensor
Published 2016-01-01“…Visible light communication (VLC) is regarded as relatively secure communication when compared with other wireless communications using radio frequency (RF). …”
Get full text
Article