نتایج جستجو برای: scraping
تعداد نتایج: 2246 فیلتر نتایج به سال:
Scraping a surface with the finger tip is a multimodal event. We obtain information about the texture, i.e. roughness of the surface, at least through three different sensory channels, i.e. auditory, tactile and visual. People are highly skilled in using touch-produced sounds to identify texture properties. Sound pressure level, modulation frequency and pitch of the touch-induced scraping sound...
A 70 days old Large White Yorkshire weaned piglet of piggery unit of Instructional Livestock Farm Complex, Veterinary College and Research Institute, Orathanadu was presented with the history of severe rubbing of the skin against the sides of the pen, hair loss and weakness. The clinical lesion of alopecia, superficial skin fissures and hyperkeratosis were observed around dorsal region, flank r...
Hovey Lake and Ries-Hasting are late prehistoric Caborn-Welborn phase archaeological sites located in southwestern Indiana, along the Ohio River. Hovey Lake is a large village, and RiesHasting is a small hamlet. Both have been investigated with surface survey and small-scale excavations by researchers from Indiana University and other institutions. To understand Caborn-Welborn tool use and prod...
PURPOSE We report a case of herpetic epithelial keratitis that developed after subconjunctival triamcinolone acetonide injection (STI). METHODS A 65-year-old female with anterior uveitis and hypotony in her right eye was given a STI (2 mg/0.5 ml). After the injection, she developed redness and an ocular discharge. A clinical examination was performed and real-time polymerase chain reaction (P...
Retail industry Point of Sale (POS) computer systems are frequently targeted by hackers for credit/debit card data. Faced with increasing security threats, new security standards requiring encryption for card data storage and transmission were introduced making harvesting card data more difficult. Encryption can be circumvented by extracting unencrypted card data from the volatile memory of POS...
There is virtually an unlimited number of possible Tissue Microarray (TMA) applications in basic and clinical research and ultimately in diagnostics. However, to assess the functional importance of novel markers, researchers very often turn to cell line model systems. The appropriate choice of a cell line is often a difficult task, but the use of cell microarray (CMA) technology enables a quick...
Biofilm methods consist of four distinct steps: growing the biofilm in a relevant model, treating mature biofilm, harvesting from surface and disaggregating clumps, analyzing sample. Of steps, disaggregation are least studied but nonetheless critical when considering potential for test bias. This article demonstrates commonly used techniques grown on three different surfaces. The techniques, gl...
Darknet marketplaces in the Tor network are popular places to anonymously buy and sell various kinds of illegal goods. Previous research on ranged from analyses type, availability quality goods methods for identifying users. Although many darknet exist, their lifespan is usually short, especially very that focus law enforcement agencies. We built a data acquisition architecture collect White Ho...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید