Journal articles on the topic 'Teeth Identification Computer programs'

To see the other types of publications on this topic, follow the link: Teeth Identification Computer programs.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Teeth Identification Computer programs.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Santo, Augusto H., Celso E. Pinheiro, and Eliana M. Rodrigues. "Comparative evaluation of underlying causes of death processed by the Automated Classification of Medical Entities and the Underlying Cause of Death Selection Systems." Revista de Saúde Pública 32, no. 1 (February 1998): 1–6. http://dx.doi.org/10.1590/s0034-89101998000100001.

Full text
Abstract:
INTRODUCTION: The correct identification of the underlying cause of death and its precise assignment to a code from the International Classification of Diseases are important issues to achieve accurate and universally comparable mortality statistics These factors, among other ones, led to the development of computer software programs in order to automatically identify the underlying cause of death. OBJECTIVE: This work was conceived to compare the underlying causes of death processed respectively by the Automated Classification of Medical Entities (ACME) and the "Sistema de Seleção de Causa Básica de Morte" (SCB) programs. MATERIAL AND METHOD: The comparative evaluation of the underlying causes of death processed respectively by ACME and SCB systems was performed using the input data file for the ACME system that included deaths which occurred in the State of S. Paulo from June to December 1993, totalling 129,104 records of the corresponding death certificates. The differences between underlying causes selected by ACME and SCB systems verified in the month of June, when considered as SCB errors, were used to correct and improve SCB processing logic and its decision tables. RESULTS: The processing of the underlying causes of death by the ACME and SCB systems resulted in 3,278 differences, that were analysed and ascribed to lack of answer to dialogue boxes during processing, to deaths due to human immunodeficiency virus [HIV] disease for which there was no specific provision in any of the systems, to coding and/or keying errors and to actual problems. The detailed analysis of these latter disclosed that the majority of the underlying causes of death processed by the SCB system were correct and that different interpretations were given to the mortality coding rules by each system, that some particular problems could not be explained with the available documentation and that a smaller proportion of problems were identified as SCB errors. CONCLUSION: These results, disclosing a very low and insignificant number of actual problems, guarantees the use of the version of the SCB system for the Ninth Revision of the International Classification of Diseases and assures the continuity of the work which is being undertaken for the Tenth Revision version.
APA, Harvard, Vancouver, ISO, and other styles
2

Bodzás, Sándor. "Computer aided designing and modelling of spur gear pairs having normal and modified straight teeth." International Review of Applied Sciences and Engineering 10, no. 2 (December 2019): 157–63. http://dx.doi.org/10.1556/1848.2019.0019.

Full text
Abstract:
The aim of this publication is to show the process of computer aided designing of the spur gear pairs having normal and modified straight teeth. For designing, the determination of the geometrical parameters is needed. Computer programs have been developed with which gear pairs having normal and modified teeth, with any arbitrary parameters can be analysed, designed and modelled. With these programs gear pairs having concrete geometry have been designed and CAD models have also been drawn to have further meshing, geometrical and TCA (Tooth Contact Analysis).
APA, Harvard, Vancouver, ISO, and other styles
3

Fetvaci, Cuneyt, and C. Erdem Imrak. "Computer Modeling and Simulation of Spur Involute Gears by Generating Method." Key Engineering Materials 450 (November 2010): 103–6. http://dx.doi.org/10.4028/www.scientific.net/kem.450.103.

Full text
Abstract:
This study analyzes the forming principle of spur gears with asymmetric teeth profile by rack-type and pinion-type cutters. Mathematical models of generating and generated surfaces manufactured by generating-type cutters are given. Asymmetric gear tooth is also considered. A computer program is developed to display computer graphs of the spur gears with asymmetric involute teeth. The simulated motion path of the generating cutter is illustrated. The developed computer programs are very helpful in the design of involute gears.
APA, Harvard, Vancouver, ISO, and other styles
4

Upadhyaya, Gautam, Samuel P. Midkiff, and Vijay S. Pai. "Automatic atomic region identification in shared memory SPMD programs." ACM SIGPLAN Notices 45, no. 10 (October 17, 2010): 652–70. http://dx.doi.org/10.1145/1932682.1869513.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

ITO, Kunio. "Personal computer programs to assist identification of electron diffraction network pattern." Journal of Japan Institute of Light Metals 40, no. 12 (1990): 930–35. http://dx.doi.org/10.2464/jilm.40.930.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

JAIN, SANJAY. "AN INFINITE CLASS OF FUNCTIONS IDENTIFIABLE USING MINIMAL PROGRAMS IN ALL KOLMOGOROV NUMBERINGS." International Journal of Foundations of Computer Science 06, no. 01 (March 1995): 89–94. http://dx.doi.org/10.1142/s012905419500007x.

Full text
Abstract:
Identification of programs for computable functions from their graphs by algorithmic devices is a well studied problem in learning theory. Freivalds and Chen consider identification of ‘minimal’ and ‘nearly minimal’ programs for functions from their graphs. Freivalds showed that there exists a Gödel numbering in which only finite classes of functions can be identified using minimal programs. To address such problems, Freivalds later considered minimal identification in Kolmogorov Numberings. Kolmogorov numberings are in some sense optimal numberings and have some nice properties. Freivalds showed that for every Kolmogorov numbering there exists an infinite class of functions which can be identified using minimal programs. Note that these infinite classes of functions may depend on the Kolmogorov numbering. It was left open as to whether there exists an infinite class of functions, C, such that C can be identified using minimal programs in every Kolmogorov numbering. We show the existence of such a class.
APA, Harvard, Vancouver, ISO, and other styles
7

John, James Rufus, Breena Daniel, Dakshaini Paneerselvam, and Ganesh Rajendran. "Prevalence of Dental Caries, Oral Hygiene Knowledge, Status, and Practices among Visually Impaired Individuals in Chennai, Tamil Nadu." International Journal of Dentistry 2017 (2017): 1–6. http://dx.doi.org/10.1155/2017/9419648.

Full text
Abstract:
Aim. To assess the prevalence of dental caries, oral hygiene knowledge, status, and practices among visually impaired individuals in Chennai, Tamil Nadu.Materials and Methods. A cross-sectional study was conducted among 404 visually impaired individuals in Chennai city, Tamil Nadu. Four schools were randomly selected for conducting the study. The oral hygiene status, prevalence of caries, and knowledge and attitude towards oral care among visually impaired individuals were collected and analysed.Results. In the present study, whilst 42% of individuals had fair oral hygiene status, 33% had good hygiene followed by 25% having poor oral hygiene. The overall mean number of DMFT was estimated to be4.5±2.7. The mean number of decayed teeth was3.1±2.2, mean number of missing teeth was0.8±1.4, and mean number of filled teeth was0.5±1.3.Conclusion. Whilst oral hygiene status was found to be relatively fair, there was a high rate of dental caries among the sample population. This shows that there is lack of knowledge regarding oral health maintenance. Therefore, early identification of caries coupled with effective oral health promotion programs providing practical knowledge to visually impaired students would prove beneficial.
APA, Harvard, Vancouver, ISO, and other styles
8

Litvin, F. L., C. L. Hsiao, J. C. Wang, and X. Zhou. "Computerized Simulation of Generation of Internal Involute Gears and Their Assembly." Journal of Mechanical Design 116, no. 3 (September 1, 1994): 683–89. http://dx.doi.org/10.1115/1.2919436.

Full text
Abstract:
The contents of the paper cover the determination of conditions: (i) of nonundercutting by axial and axial-radial generation of internal gears by shapers, and (ii) avoidance of interference by axial and axial-radial assembly. The authors have developed computer programs for simulation of undercutting and interference, design charts and a table that allow to determine the limiting number of teeth of the cutter and pinion considering the tooth number of internal gear as known. The details of developed algorithms are given in the Appendices. The paper is illustrated with computer graphics and numerical examples.
APA, Harvard, Vancouver, ISO, and other styles
9

Ichioka, Hiroaki, Risa Bandou, Nozomi Idota, Kaori Shintani-Ishida, and Hiroshi Ikegaya. "Current Issues in Dental Identification in Severely Burned Bodies from a Studio Arson Attack in Japan." Applied Sciences 13, no. 1 (December 29, 2022): 461. http://dx.doi.org/10.3390/app13010461.

Full text
Abstract:
A studio arson attack in Japan caused 36 deaths. Dentists obtained dental findings from 33 unidentified bodies immediately after the attack and autopsy. The dental findings before autopsy were obtained on the day of the incident and the next day. Dental findings after autopsy were obtained at 1 week from the day after the incident. We examined issues associated with collecting these dental findings. Other findings recorded were CT images, autopsy findings, and various blood and pathological examinations. Among the 33 unidentified bodies, for 30 bodies, the number of teeth from which the dental findings were obtained was significantly higher after autopsy than before autopsy. The dental findings of the remaining three bodies were not obtained before or after the autopsy. Five percent of anterior teeth and 28.7% of molars had differing pre-autopsy and post-autopsy findings. This discrepancy can be attributed to various factors. One of the major influencing factors was the carbonization of the facial surface muscles and skin along with limited mouth opening due to thermocoagulation. For the scientific identification of an individual based on dental findings, it is mandatory to examine the teeth in all quadrants. The collection of dental findings solely from anterior teeth may not be adequate to establish identity. The present article describes the challenges faced by the dentists while identifying charred bodies in an arson attack.
APA, Harvard, Vancouver, ISO, and other styles
10

Smith, Alan D. "Exploring national identification programs among web‐enabled professionals." Industrial Management & Data Systems 108, no. 4 (April 25, 2008): 455–77. http://dx.doi.org/10.1108/02635570810868335.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

VĪKSNA, JURIS. "INDUCTIVE INFERENCE OF LIMITING PROGRAMS WITH BOUNDED NUMBER OF MIND CHANGES." International Journal of Foundations of Computer Science 07, no. 03 (September 1996): 187–208. http://dx.doi.org/10.1142/s0129054196000154.

Full text
Abstract:
We consider inductive inference of total recursive functions in the case, when produced hypotheses are allowed some finite number of times to change “their mind” about each value of identifiable function. Such type of identification, which we call inductive inference of limiting programs with bounded number of mind changes, by its power lies somewhere between the traditional criteria of inductive inference and recently introduced inference of limiting programs. We consider such model of inductive inference for EX and BC types of identification, and we study • tradeoffs between the number of allowed mind changes and the number of anomalies, and • relations between classes of functions identifiable with different probabilities. For the case of probabilistic identification we establish probabilistic hierarchies which are quite unusual for EX and BC types of inference.
APA, Harvard, Vancouver, ISO, and other styles
12

Soni, Sumit, and Pravesh Kumar. "Compiler Construction for a Network Identification." Journal of Advance Research in Electrical & Electronics Engineering (ISSN: 2208-2395) 1, no. 4 (April 30, 2014): 1317. http://dx.doi.org/10.53555/nneee.v1i4.240.

Full text
Abstract:
The Compiler Construction is mainly used to improve the network processing system through the advance advance compiler design.The name Compiler is primarily used for programs that translate source code from a high –level programming language to a lower level language.The advance compiler design is useful in the industrial application like telecommunication. Our approach to increase the flexibility ,productivity and usability of the system to target with the minimal effort .we use the bit level addressing for the network processor we show how a compiler backend has been design and also improve the feature of the compiler and fully operational. A compiler is a computer program (or set of programs) that transforms source code written in a programming language (the source language) into another computer language (the target language, often having a binary form known as object code The most common reason for wanting to transform source code is to create an executabe program.
APA, Harvard, Vancouver, ISO, and other styles
13

Rosebashvili, Valerian R., Daniil B. Kaplan, Nailya S. Drobysheva, and Leonid S. Persin. "A modern approach to the diagnosis of orthodontic patients using a computer program “Assessment of the position of teeth and dentition relative to the lp point”." Russian Journal of Dentistry 25, no. 2 (March 15, 2021): 167–76. http://dx.doi.org/10.17816/1728-2802-2021-25-2-167-176.

Full text
Abstract:
BACKGROUND: Currently, the most important direction in the field of orthodontics is the improvement of existing and the development of new tools for the diagnosis of dental anomalies. Although there are many ways to assess the occlusion of dentition, but this issue remains relevant in the daily practice of a dentist. AIM: Study is to develop a computer program for rapid diagnosis of the position of teeth and dentition without X-ray examination of patients at the initial consultation. MATERIAL AND METHODS: 100 patients aged 1844 with mesial occlusion were examined using anthropometric and radiological methods. The sizes of teeth and dentition were measured on plaster models. Telerentgenography of the head in a lateral projection and further analysis proposed at the Department of Orthodontics of the A.I. Evdokimov Moscow State Medical University were performed. The data was used for comparison with calculations obtained using a computer program developed by us. RESULTS: The computer program Diagnostics of the position of teeth and dentition relative to the coordinate point makes it possible to estimate the size of the dentition and position of the upper jaw relative to the lower one in the sagittal and transversal positions. At the same time, the accuracy of the diagnostics performed will not be inferior to similar computer programs. The simplicity of the analysis allows it to be used as an express diagnosis in planning treatment. CONCLUSION: This computer program simplifies the work of an orthodontist, allowing patients with various dental ano- malies to perform express diagnostics based on modern methods and facilitating the choice of treatment tactics. Reduces the burden on the patient without subjecting him to additional X-ray irradiation during the initial consultation, while the accuracy of diagnosis will not be inferior to similar computer programs. Allows you to evaluate not only the size of the dentition, but the position of the lower dentition in the sagittal and transversal positions.
APA, Harvard, Vancouver, ISO, and other styles
14

Thurzo, Andrej, Viera Jančovičová, Miroslav Hain, Milan Thurzo, Bohuslav Novák, Helena Kosnáčová, Viera Lehotská, Ivan Varga, Peter Kováč, and Norbert Moravanský. "Human Remains Identification Using Micro-CT, Chemometric and AI Methods in Forensic Experimental Reconstruction of Dental Patterns after Concentrated Sulphuric Acid Significant Impact." Molecules 27, no. 13 (June 23, 2022): 4035. http://dx.doi.org/10.3390/molecules27134035.

Full text
Abstract:
(1) Teeth, in humans, represent the most resilient tissues. However, exposure to concentrated acids might lead to their dissolving, thus making human identification difficult. Teeth often contain dental restorations from materials that are even more resilient to acid impact. This paper aims to introduce a novel method for the 3D reconstruction of dental patterns as a crucial step for the digital identification of dental records. (2) With a combination of modern methods, including micro-computed tomography, cone-beam computer tomography, and attenuated total reflection, in conjunction with Fourier transform infrared spectroscopy and artificial intelligence convolutional neural network algorithms, this paper presents a method for 3D-dental-pattern reconstruction, and human remains identification. Our research studies the morphology of teeth, bone, and dental materials (amalgam, composite, glass-ionomer cement) under different periods of exposure to 75% sulfuric acid. (3) Our results reveal a significant volume loss in bone, enamel, dentine, as well as glass-ionomer cement. The results also reveal a significant resistance by the composite and amalgam dental materials to the impact of sulfuric acid, thus serving as strong parts in the dental-pattern mosaic. This paper also probably introduces the first successful artificial intelligence application in automated-forensic-CBCT segmentation. (4) Interdisciplinary cooperation, utilizing the mentioned technologies, can solve the problem of human remains identification with a 3D reconstruction of dental patterns and their 2D projections over existing ante-mortem records.
APA, Harvard, Vancouver, ISO, and other styles
15

Jingxian, Fang, Liu Yang, Liu Qiong, Qian Hong, Liu Hedi, Zhang Jinglan, Liu Fang, Yang Jing, Wu Xiaoming, and Song Yingying. "Application of Quality Control Circle in Promoting the Use of Rubber Dams in the Root Canal Treatment of Primary Teeth." BioMed Research International 2020 (February 26, 2020): 1–5. http://dx.doi.org/10.1155/2020/5397838.

Full text
Abstract:
Objective. Study the effect of quality control circle (QCC) in promoting the usage of rubber dams (RD) in root canal treatment of chronic pulpitis in primary teeth. Methods. Set up a quality control group to increase the amount of rubber dams used in the treatment of chronic pulpitis in primary teeth. Monthly monitoring results of the usage amount were counted by the outpatient computer system. Relevant data were collected through questionnaires, and causes of low utilization were analyzed, and the improvement measurements were formulated and implemented. Quality control circle activity was evaluated. Results. Through the quality control circle activity, the consumption of rubber dams in the root canal treatment of chronic pulpitis was significantly improved, children in treatment became more cooperative, and operation time of root canal treatment has also been shortened. Conclusion. The quality control circle activities played a significant role in promoting the use of rubber dams in the root canal treatment of primary teeth, and it can be used as a method to promote new clinical treatment programs.
APA, Harvard, Vancouver, ISO, and other styles
16

Bozkurt, Mustafa Hakan, and Serap Karagol. "Jaw and Teeth Segmentation on the Panoramic X-Ray Images for Dental Human Identification." Journal of Digital Imaging 33, no. 6 (August 6, 2020): 1410–27. http://dx.doi.org/10.1007/s10278-020-00380-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Liu, Zhenpeng, Xianwei Yang, Yi Liu, Yonggang Zhao, and Xiaofei Li. "ImReMuDF: Redundant Mutants Identification Method Based on Definition and Reference of Variables." Scientific Programming 2021 (October 21, 2021): 1–10. http://dx.doi.org/10.1155/2021/7543896.

Full text
Abstract:
Mutation testing is an effective defect-based software testing method, but a large number of mutants lead to expensive testing costs, which hinders the application of variation testing in industrial engineering. To solve this problem and enable mutation testing to be applied in industrial engineering, this paper improves the method of identifying redundant mutants based on data flow analysis and proposes the inclusion relationship between redundant mutants, so that the redundancy rate of mutants is reduced. In turn, the cost of mutation testing can be reduced. The redundant mutants identification method based on definition and reference of variables (ImReMuDF) was validated and evaluated using 8 C programs. The minimum improvement in redundant mutant identification rate was 34.0%, and the maximum improvement was 71.3% in the 8 C programs tested, and the verification results showed that the method is feasible and effective and has been improved in reducing redundant mutants and effectively reducing the execution time of mutation testing.
APA, Harvard, Vancouver, ISO, and other styles
18

Afzalan, Milad, and Farrokh Jazizadeh. "Data-Driven Identification of Consumers With Deferrable Loads for Demand Response Programs." IEEE Embedded Systems Letters 12, no. 2 (June 2020): 54–57. http://dx.doi.org/10.1109/les.2019.2937834.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Nelson, R. T., D. Grant, and R. C. Shoemaker. "ESTminer: a suite of programs for gene and allele identification." Bioinformatics 21, no. 5 (November 5, 2004): 691–93. http://dx.doi.org/10.1093/bioinformatics/bti075.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Marcus, M., C. A. Maida, Y. Wang, D. Xiong, R. D. Hays, I. D. Coulter, S. Y. Lee, et al. "Child and Parent Demographic Characteristics and Oral Health Perceptions Associated with Clinically Measured Oral Health." JDR Clinical & Translational Research 3, no. 3 (May 18, 2018): 302–13. http://dx.doi.org/10.1177/2380084418774549.

Full text
Abstract:
Objective: To examine child and parent reports about the child’s oral health and assess the associations of these reports with clinical assessments of oral health status by dental examiners. Methods: Surveys with 139 items for children and 133 items for parents were administered by Audio Computer-Assisted Self-Interview Software. In addition, the Children’s Oral Health Status Index (COHSI) was computed from a dental examination. Results: A total of 334 families with children ages 8 to 17 y participated at 12 dental practices in Los Angeles County. Ordinary least squares regression models were estimated separately for child and parent surveys to identify items uniquely associated with the COHSI. Ten of 139 items the children reported regarding their oral health were associated with the COHSI. The strongest associations were found for child’s age, aesthetic factors (straight teeth and pleased with teeth), and cognitive factors related to perception of dental appearance (pleased/happy with the look of the child’s mouth, teeth, and jaws). Nine of 133 parent items about the child’s oral health were associated with the COHSI in the parent model, notably being a single parent, parent’s gender, parent born in the United States, pleased or happy with the look of their child’s teeth, and accessing the Internet. Conclusion: These child and parent survey items have potential to be used to assess oral health status for groups of children in programs and practices in lieu of dental screenings. Knowledge Translation Statement: The paper’s results inform the development of a toolkit that can be used by schools, public health agencies, and dental programs to identify children with low oral health status based on parents’ and children’s responses to survey items across demographic, physical, mental, and social domains. These survey items can be used to inform parents of the desirability of proactively addressing inadequacies in their child’s oral health status, enabling them to more rationally address dental needs.
APA, Harvard, Vancouver, ISO, and other styles
21

Gadzhula, N. G., T. V. Fedyk, M. A. Goray, and V. V. Yasko. "Vertical root fracture diagnosis in endodontically treated teeth." Reports of Vinnytsia National Medical University 26, no. 1 (March 28, 2022): 35–38. http://dx.doi.org/10.31393/reports-vnmedical-2022-26(1)-06.

Full text
Abstract:
Annotation. Timely diagnosis of vertical root fractures is a big challenge to dentists, because there are no specific clinical signs, symptoms and X-ray features. The aim of the research is to study clinical cases of vertical root fractures in endodontically treated teeth and to carry out analysis the methods of their diagnosis, clinical features and radiological characteristics. In patients aged 40-65 years, 34 clinical cases of vertical root fracture are considered. The main and additional methods of patients’ examination are analyzed. The statistical calculation of the obtained results is performed by the method of variation statistics with the determination of the Student’s t-test using computer programs Microsoft® Excel 2017 and “Statistica 6.1”. Clinical symptoms and abnormal findings during examination were recorded but not subjected to statistical analysis. Clinical examination revealed periodontal swelling or abscess in 6 patients, isolated narrow and deep periodontal pocket in 24 patients, low localized fistula in 9 patients. Radiological results: only in 6 clinical cases a vertical fracture line was observed on intraoral X-ray images; in 30 cases the destruction of bone tissue in the periapical area, mainly in the halo-type radiolucency was determined; in 4 cases no pathological changes in periapical bone tissue were revealed. Vertical root fracture was confirmed by muco-periosteal flap detachment in all cases. It has been established that a number of signs, namely: isolated deep narrow periodontal pocket; coronally located fistula; characteristic bone destruction (J-shaped or “halo” radiolucency) on the radiograph indicate the likelihood of vertical root fracture. Signs of fenestration of the bone adjacent to the fractured root and visualization of the fracture line after mucoperiosteal flap surgery are pathognomonic.
APA, Harvard, Vancouver, ISO, and other styles
22

Gadzhula, N. G., T. V. Fedyk, M. A. Goray, and V. V. Yasko. "Vertical root fracture diagnosis in endodontically treated teeth." Reports of Vinnytsia National Medical University 26, no. 1 (March 28, 2022): 35–38. http://dx.doi.org/10.31393/reports-vnmedical-2022-26(1)-06.

Full text
Abstract:
Annotation. Timely diagnosis of vertical root fractures is a big challenge to dentists, because there are no specific clinical signs, symptoms and X-ray features. The aim of the research is to study clinical cases of vertical root fractures in endodontically treated teeth and to carry out analysis the methods of their diagnosis, clinical features and radiological characteristics. In patients aged 40-65 years, 34 clinical cases of vertical root fracture are considered. The main and additional methods of patients’ examination are analyzed. The statistical calculation of the obtained results is performed by the method of variation statistics with the determination of the Student’s t-test using computer programs Microsoft® Excel 2017 and “Statistica 6.1”. Clinical symptoms and abnormal findings during examination were recorded but not subjected to statistical analysis. Clinical examination revealed periodontal swelling or abscess in 6 patients, isolated narrow and deep periodontal pocket in 24 patients, low localized fistula in 9 patients. Radiological results: only in 6 clinical cases a vertical fracture line was observed on intraoral X-ray images; in 30 cases the destruction of bone tissue in the periapical area, mainly in the halo-type radiolucency was determined; in 4 cases no pathological changes in periapical bone tissue were revealed. Vertical root fracture was confirmed by muco-periosteal flap detachment in all cases. It has been established that a number of signs, namely: isolated deep narrow periodontal pocket; coronally located fistula; characteristic bone destruction (J-shaped or “halo” radiolucency) on the radiograph indicate the likelihood of vertical root fracture. Signs of fenestration of the bone adjacent to the fractured root and visualization of the fracture line after mucoperiosteal flap surgery are pathognomonic.
APA, Harvard, Vancouver, ISO, and other styles
23

Che Salleh, Natifah, Mohamad Fuad Mohamad Anuar, Nurrul Ashikin Abdullah, Siew Lian Yaw, Norazizah Ibrahim Wong, Ting Teck Pei, S. Maria Awaluddin, and Tahir Aris. "Prevalence and Factors Associated With Oral and Hand Hygiene Practices Among Adolescents in Malaysia: Findings From the National Health and Morbidity Survey 2017." Asia Pacific Journal of Public Health 31, no. 8_suppl (October 22, 2019): 97S—104S. http://dx.doi.org/10.1177/1010539519880998.

Full text
Abstract:
This cross-sectional national survey aimed to determine the prevalence of oral and hand hygiene practices as well as associations between sociodemographic characteristics and oral and hygiene practice among adolescents aged 13 to 17 years during the past 30 days. A validated self-administered bilingual questionnaire adapted from the Malaysian Global School Health Survey with computer-scanable answer sheets was distributed to 30 823 adolescents attending government secondary schools in Malaysia; and 89.2% responded to the questionnaire given. More than 80% (87.1%; 95% confidence interval [CI] = 86.24-87.96) of the adolescents reported that they had brushed their teeth at least twice daily and had always washed their hands after using the toilet (86.6%; 95% CI = 85.85-87.36). The odds of adolescents who brushed their teeth at least 2 times daily and washed their hands after using the toilet was significantly associated with sociodemographic characteristics. This study highlights the need to further improve the effectiveness of current oral health promotion programs with consideration for sociodemographic characteristics.
APA, Harvard, Vancouver, ISO, and other styles
24

Voronin, Vladimir V., and Aleksey V. Morozov. "Technology of key feature identification in malware API calls sequences." Analysis and data processing systems, no. 3 (September 30, 2021): 37–52. http://dx.doi.org/10.17212/2782-2001-2021-3-37-52.

Full text
Abstract:
Today, almost everyone is faced with computer security problems in one or another way. Antivirus programs are used to control threats to the security of malicious software. Conventional methods for detecting malware are no longer effective enough; nowadays, neural networks and behavioral analysis technology have begun to be used for these purposes. Analyzing the behavior of programs is a difficult task, since there is no clear sequence of actions to accurately identify a program as malicious. In addition, such programs use measures to resist such detection, for example, noise masking the sequence of their work with meaningless actions. There is also the problem of uniquely identifying the class of malware due to the fact that malware can use similar methods, while being assigned to different classes. In this paper, it is proposed to use NLP methods, such as word embedding, and LDA in relation to the problems of analyzing malware API calls sequences in order to reveal the presence of semantic dependencies and assess the effectiveness of the application of these methods. The results obtained indicate the possibility of identifying the key features of malware behavior, which in the future will significantly improve the technology for detecting and identifying such programs.
APA, Harvard, Vancouver, ISO, and other styles
25

Gosselin, C., T. Nonaka, Y. Shiono, A. Kubo, and T. Tatsuno. "Identification of the Machine Settings of Real Hypoid Gear Tooth Surfaces." Journal of Mechanical Design 120, no. 3 (September 1, 1998): 429–40. http://dx.doi.org/10.1115/1.2829170.

Full text
Abstract:
In the spiral bevel and hypoid gear manufacturing industry, master gear sets are usually developed from initial machine settings obtained from computer software or instruction sheets. These initial machine settings are then modified until a satisfactory bearing pattern is obtained, a process called bearing pattern development. Once a satisfactory bearing pattern is obtained, manufacturing errors and heat treatment distorsions can be accounted for by proportionally changing the machine settings according to the results of a V-H test in which the pinion vertical and horizontal positions are modified until the bearing pattern is acceptable. Once a satisfactory combination of master pinion and gear is obtained, their actual tooth surfaces usually do not correspond to those of the initial theoretical model, and the theoretical pinion and gear surface definitions are unknown. This paper presents a computer algorithm used to identify the machine settings producing a theoretical tooth surface closest to that of a measured surface, what the authors call Surface Match, in order to effectively simulate the kinematical behavior of real gear teeth. The approach is applicable to both 1st and 2nd order surface errors, including profile deviation, for any cutting process. However, given the availability of experimental data for the Fixed Setting™, Formate™ and Helixform™ cutting processes, the examples presented in the paper are related to these cutting processes.
APA, Harvard, Vancouver, ISO, and other styles
26

Alam, S. O., J. W. Edmonds, T. Hom, J. A. Nicolosi, and B. Scott. "A Reference Database Retrieval System: Information as a Tool to Assist in XRD Phase Identification." Advances in X-ray Analysis 32 (1988): 545–50. http://dx.doi.org/10.1154/s0376030800020887.

Full text
Abstract:
A common analytical problem in a X-ray diffraction laboratory is the phase identification of an unknown sample. Presently, most phase identification is either performed manually or through computer search-match programs, as found on automated powder diffraction systems. Whether phase identification is performed manually or with computer search-match, often, the diffractionist wishes or needs to be able to make use of more sample information in the phase identification process than just d-I data. Additional information may be in the diffractionist's possession or can be readily obtained. The types of additional information which can be used in computer search-match programs are currently limited to information in the Powder Diffraction File-1 (PDF- 1) (1), formerly Level I, database (ie., JCPDS sub-files, elemental and functional groups). The use of other information is not possible. Users of manual search procedures are not able to make optimum use of additional information.
APA, Harvard, Vancouver, ISO, and other styles
27

Nomir, Omaima, and Mohamed Abdel-Mottaleb. "Human Identification From Dental X-Ray Images Based on the Shape and Appearance of the Teeth." IEEE Transactions on Information Forensics and Security 2, no. 2 (June 2007): 188–97. http://dx.doi.org/10.1109/tifs.2007.897245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Jiang, Bin, Lili Fan, Peiyi Zhao, Yufeng Song, and Bin Wang. "Modeling and Distribution Identification of Instantaneous Cutting Energy Efficiency of Milling Cutter under Vibration." Applied Sciences 12, no. 21 (October 25, 2022): 10816. http://dx.doi.org/10.3390/app122110816.

Full text
Abstract:
The instantaneous cutting energy efficiency of a milling cutter is an important index to evaluate the cutting performance of the milling cutter. The existing models for cutting energy efficiency ignore the differences in the instantaneous cutting energy efficiency of each cutter tooth. In this work, according to the influence of milling vibration on instantaneous cutting posture and the input and output energy, a correlation model of the instantaneous cutting energy efficiency of a milling cutter and its cutter teeth was established. Using the cutting-force energy efficiency and the specific cutting energy and their distribution on the cutting edge of the cutter teeth, the dynamic relationship between the effective cutting energy transfer and conversion of the milling cutter was characterized. The instantaneous cutting-force energy efficiency and specific cutting energy were calculated. The formation of the dynamic distribution of the cutting energy efficiency was unveiled. Finally, an identification method for distributive variation in the instantaneous cutting energy efficiency of the milling cutter was proposed. The response of the distribution of the instantaneous cutting energy efficiency was studied and verified using experiments. The results showed that there was high similarity and good agreement between the calculated and measured results of the cutting energy efficiency of the milling cutter.
APA, Harvard, Vancouver, ISO, and other styles
29

Leonov, Sergey V., and Julia P. Shakiryanova. "Use of computed tomography data for forensic identification of an individual." Russian Journal of Forensic Medicine 6, no. 4 (December 15, 2020): 41–45. http://dx.doi.org/10.19048/fm339.

Full text
Abstract:
Background: The article presents our own experience of using computer tomography for identification of individuals with known results. Aims: The aim of the study was to verify the possibility of performing an identification study using a three-dimensional model obtained from computed tomography of the head. Identification was performed using a three-dimensional model of the head, based on computer tomography sections made in various projections, with a step of 1.231.25 mm. Two-dimensional images of the face (photos) were used for comparison. All comparative studies were conducted using approved methods of craniofacial and portrait identification: by reference points and contours. The experiment used a computer program that allows you to export DICOM-files of computed tomography results to other formats (InVesalius), as well as computer programs that directly work with the research objects (Autodesk 3ds Max, alternative programs Adobe Photoshop, Smith Micro Poser Pro). Results: In the course of research, it was found that, having computer tomography data of the head, it is possible to conduct identification studies on the following parameters: on the reconstructed three-dimensional model of the soft tissues of the face, on the three-dimensional model of the skull (craniofacial identification), on the features of the structure of the ear. Conclusion: Positive results were obtained when comparing objects, which makes it advisable to use them in practical and scientific activities.
APA, Harvard, Vancouver, ISO, and other styles
30

Carlos Navarro Venegas. "Identification of genomes: Clustal Omega and BLAST: One introduction." International Journal of Science and Research Archive 6, no. 2 (July 30, 2022): 026–29. http://dx.doi.org/10.30574/ijsra.2022.6.2.0154.

Full text
Abstract:
Knowing the sequence of a pathogen isolated in our laboratory is currently an accessible task, and there are no excuses to start it. The remarkable occurrence of Kary Mullis and the existence of computer programs has helped a lot in this task and in this introductory article we give an account of that and invite those who still do not dare to this adventure.
APA, Harvard, Vancouver, ISO, and other styles
31

Piqueira, José R. C., and Felipe Barbosa Cesar. "Dynamical Models for Computer Viruses Propagation." Mathematical Problems in Engineering 2008 (2008): 1–11. http://dx.doi.org/10.1155/2008/940526.

Full text
Abstract:
Nowadays, digital computer systems and networks are the main engineering tools, being used in planning, design, operation, and control of all sizes of building, transportation, machinery, business, and life maintaining devices. Consequently, computer viruses became one of the most important sources of uncertainty, contributing to decrease the reliability of vital activities. A lot of antivirus programs have been developed, but they are limited to detecting and removing infections, based on previous knowledge of the virus code. In spite of having good adaptation capability, these programs work just as vaccines against diseases and are not able to prevent new infections based on the network state. Here, a trial on modeling computer viruses propagation dynamics relates it to other notable events occurring in the network permitting to establish preventive policies in the network management. Data from three different viruses are collected in the Internet and two different identification techniques, autoregressive and Fourier analyses, are applied showing that it is possible to forecast the dynamics of a new virus propagation by using the data collected from other viruses that formerly infected the network.
APA, Harvard, Vancouver, ISO, and other styles
32

Eliášová, Hana, and Taťjana Dostálová. "3D Multislice and Cone-beam Computed Tomography Systems for Dental Identification." Prague Medical Report 118, no. 1 (2017): 14–25. http://dx.doi.org/10.14712/23362936.2017.2.

Full text
Abstract:
3D Multislice and Cone-beam computed tomography (CBCT) in forensic odontology has been shown to be useful not only in terms of one or a few of dead bodies but also in multiple fatality incidents. 3D Multislice and Cone-beam computed tomography and digital radiography were demonstrated in a forensic examination form. 3D images of the skull and teeth were analysed and validated for long ante mortem/post mortem intervals. The image acquisition was instantaneous; the images were able to be optically enlarged, measured, superimposed and compared prima vista or using special software and exported as a file. Digital radiology and computer tomography has been shown to be important both in common criminalistics practices and in multiple fatality incidents. Our study demonstrated that CBCT imaging offers less image artifacts, low image reconstruction times, mobility of the unit and considerably lower equipment cost.
APA, Harvard, Vancouver, ISO, and other styles
33

Thomas, Gray Cortright, and Luis Sentis. "Quadric Inclusion Programs: An LMI Approach to $\mathcal H_\infty$-Model Identification." IEEE Transactions on Automatic Control 64, no. 10 (October 2019): 4229–36. http://dx.doi.org/10.1109/tac.2019.2897886.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Lin, Liya. "Virtual Reality and Its Application for Producing TV Programs." Mobile Information Systems 2022 (June 28, 2022): 1–8. http://dx.doi.org/10.1155/2022/8018236.

Full text
Abstract:
This paper aims to conduct an in-depth study on the effective application of virtual reality technology in TV program production. To begin, construct the three-dimensional animation system’s overall structure, determine the animation system’s user interface, and establish the three-dimensional animation system for TV program production. Second, software like YOLOv3 and ResNet-50 network is used for identification and facial recognition. Then, the pixel cross-support window is built using the adaptive stereo matching method. The adaptive filter window is built using the horizontal expansion of the cross-support window. For the successful application of virtual reality technology in TV program creation, the aggregation is completed by regional filtering, and the final parallax image is obtained by parallax selection and parallax optimization. This technology has the ability to improve the visual effect and quality of TV programs, increase the amount of information in programs’ content, and shorten the production cycle of the program in the context of the gradual development of science and technology and the new technology period. In comparison to other approaches, simulation experiments demonstrate that the proposed method has the potential to increase the quality and attractiveness of TV programs and meet the psychological demand of viewers.
APA, Harvard, Vancouver, ISO, and other styles
35

Suzuki, Kei, Hiroyuki Nakano, Kazuya Inoue, Yoichiro Nakajima, Sho Mizobuchi, Michi Omori, Nahoko Kato-Kogoe, Katsuaki Mishima, and Takaaki Ueno. "Examination of new parameters for sex determination of mandible using Japanese computer tomography data." Dentomaxillofacial Radiology 49, no. 5 (July 2020): 20190282. http://dx.doi.org/10.1259/dmfr.20190282.

Full text
Abstract:
Objective: In the field of forensic science, sex discrimination of skeletons is an important identification item for personal identification. The individual sex discrimination method using skeletons includes a determination method using measurement values and a macroscopic form observation method. Both methods have advantage and disadvantage. In this study, we used the homologous model technique and principal component (PC) analysis to determine gender difference from morphology of the mandible. Methods and materials: 45 patients (23 males and 22 females) of CT imaging for tooth extraction from January 2018 to March 2019 at department of oral surgery, Osaka Medical College. The mean age was 43.1 ± 14.6. Patients with less than 14 remaining teeth were excluded because the number of remaining teeth may affect the shape of the mandible. 3D images were constructed, and 20 landmarks plotting on the 3D model surfaces. We generated template models of the mandible consisting of approximately 8434 polygons. The template model automatically fitted into the individually scanned point cloud of the mandible by minimising external and internal energy functions. As described above, the mandibles were constructed for each sample by using the Homologous Body Modeling software (HBM, Digital Human Technology, Inc.) and the mHBM-Rugle (Medic Engineering Corporation). The mandibles were analysed using the PCA. Results: The contribution of the most important PC was found to be 27.2%. 12 PCs explained over 75% of the total variance. That is, it was able to express 75% or more of the mandible expression with 12 PCs. A significant difference between male and female was observed in the first PCs (Wilcoxon test, p < 0.05). Visualising the result of the first PC showed that the mandibular branch of male was larger than that of female, and the mandible angle was overhanging outside. Conclusion: This method is a combination of the determination method using the previous measurement values and the determination using macroscopic observation, and is considered to be innovative method.
APA, Harvard, Vancouver, ISO, and other styles
36

ANTONOV, IVAN, and MARK BORODOVSKY. "GENETACK: FRAMESHIFT IDENTIFICATION IN PROTEIN-CODING SEQUENCES BY THE VITERBI ALGORITHM." Journal of Bioinformatics and Computational Biology 08, no. 03 (June 2010): 535–51. http://dx.doi.org/10.1142/s0219720010004847.

Full text
Abstract:
We describe a new program for ab initio frameshift detection in protein-coding nucleotide sequences. The task is to distinguish the same strand overlapping ORFs that occur in the sequence due to a presence of a frameshifted gene from the same strand overlapping ORFs that encompass true overlapping or adjacent genes. The GeneTack program uses a hidden Markov model (HMM) of genomic sequence with possibly frameshifted protein-coding regions. The Viterbi algorithm finds the maximum likelihood path that discriminates between true adjacent genes and those adjacent protein-coding regions that just appear to be separate entities due to frameshifts. Therefore, the program can identify spurious predictions made by a conventional gene-finding program misled by a frameshift. We tested GeneTack as well as two earlier developed programs FrameD and FSFind on 17 prokaryotic genomes with frameshifts introduced randomly into known genes. We observed that the average frameshift prediction accuracy of GeneTack, in terms of (Sn + Sp)/2 values, was higher by a significant margin than the accuracy of two other programs. In addition, we observed that the average accuracy of GeneTack is favorably compared with the accuracy of the FSFind-BLAST program that uses protein database search to verify predicted frameshifts, even though GeneTack does not use external evidence. GeneTack is freely available at .
APA, Harvard, Vancouver, ISO, and other styles
37

Iyashvili, L. V., Yu A. Vinnichenko, and A. V. Vinnichenko. "A method for determining the natural moisture content of dentin in a clinical setting." Medical alphabet 1, no. 12 (August 15, 2020): 36–39. http://dx.doi.org/10.33667/2078-5631-2020-12-36-39.

Full text
Abstract:
The purpose of the study is a quantitative assessment of the yield of dentinal fluid on the surface of the treated dentin of the tooth when restoring its structure with a composite filling material. To achieve this goal, digital images of the coronal parts of the teeth having formed carious cavities were used; virtual models of hard tissues of teeth recreated using specialized computer programs; A computer program that provides the ability to accurately determine the area of the treated dentin tooth. The results made it possible to draw the following conclusions: with an increase in the depth of the carious cavity, the amount of dentin fluid that can stand out on its surface (1–2 mm from the tooth cavity) sharply increases; with an increase in the area of the formed carious cavity (more than 30 mm2), the risk of release of a critical mass of dentinal fluid (more than 0.4 mg), which can adversely affect the strength of the adhesive interaction between the composite material and the hard tissues of the tooth, increases significantly; the same dynamics is observed with increasing time, at which there is the possibility of free exit of dentinal fluid to the surface of the cavity prepared for filling (more than 45 seconds).
APA, Harvard, Vancouver, ISO, and other styles
38

Hills, C. R., and G. A. Poulter. "On-line diffraction pattern analysis and phase identification using a JEM 2000FX AEM with a macintosh-based program." Proceedings, annual meeting, Electron Microscopy Society of America 52 (1994): 1006–7. http://dx.doi.org/10.1017/s0424820100172760.

Full text
Abstract:
A number of computer programs have been written to aid in the indexing of transmission electron diffraction pattcrns. These programs are useful for determining crystallographic orientation and for phase identification and often simplify the analysis of complex patterns. Over the last few years there has been a trend toward automated electron microscopy. It is natural to extend this automation to real time diffraction pattern analysis and phase identification using A/D data acquisition boards and computer software to interface the modern AEM with an electron diffraction database (EDD). This paper describes a real-time Macintosh-based system (hardware and software) for automated electron diffraction pattern analysis and phase identification developed for the JEM 2000FX AEM. Crystallographic analysis with this system is attractive because of the rapid analysis time, ease of implementation, and it is inexpensive compared to buying a digitizing board and video system.Computer-aided diffraction pattern-indexing programs typically require the user to input reciprocal lattice point spacings (r-spacings) and the interplanar angle measurements for at least three non-colinear lattice points in the pattern. It is also necessary to know the crystal structure and lattice constants of the sample.
APA, Harvard, Vancouver, ISO, and other styles
39

Khan, Yaseen, Surendra Thakur, Obiseye Obiyemi, and Emmanuel Adetiba. "Identification of Bots and Cyborgs in the #FeesMustFall Campaign." Informatics 9, no. 1 (March 4, 2022): 21. http://dx.doi.org/10.3390/informatics9010021.

Full text
Abstract:
Bots (social robots) are computer programs that replicate human behavior in online social networks. They are either fully automated or semi-automated, and their use makes online activism vulnerable to manipulation. This study examines the existence of social robots in the #FeesMustFall movement by conducting a scientific investigation into whether social bots were present in the form of Twitter bots and cyborgs. A total of 576,823 tweets posted between 15 October 2015 and 10 April 2017 were cleaned, with 490,449 tweets analyzed for 90,783 unique persons. Three separate approaches were used to screen out suspicious bot and cyborg activity, supplemented by the DeBot team’s methodology. User 1 and User 2, two of the 90,783 individuals, were recognized as bots or cyborgs in the study and contributed 22,413 (4.57 percent) of the 490,449 tweets. This confirms the existence of bots throughout the campaign, which aided in the #FeesMustFall’s amplification on Twitter, complicating sentiment analysis and invariably making it the most popular and lengthiest hashtag campaign in Africa, particularly at the time of data collection.
APA, Harvard, Vancouver, ISO, and other styles
40

Mullins, Wayman C., and John Rempusheski. "Improving Effectiveness in Policing through the Use of Computer Technology." Proceedings of the Human Factors Society Annual Meeting 30, no. 7 (September 1986): 707–11. http://dx.doi.org/10.1177/154193128603000721.

Full text
Abstract:
This paper discusses how computer technology has improved police performance. Automated criminal history systems provide complete histories of criminals, thereby improving arrest rates and the adjudication, process. Automated fingerprint identification systems have had a significant impact in the area of criminalistics. Computer simulation has aided the police in manpower allocation, workload requirements, and training programs. Robots are being used by the police for bomb disposal, and are being considered for patrol duties, special surveillance situations, and in prisons.
APA, Harvard, Vancouver, ISO, and other styles
41

Fuyamada, Mariko, Hiroyuki Nawa, Momoko Shibata, Kazuhito Yoshida, Yoshitaka Kise, Akitoshi Katsumata, Eiichiro Ariji, and Shigemi Goto. "Reproducibility of landmark identification in the jaw and teeth on 3-dimensional cone-beam computed tomography images." Angle Orthodontist 81, no. 5 (May 14, 2011): 843–49. http://dx.doi.org/10.2319/010711-5.1.

Full text
Abstract:
Abstract Objective: To compare the reproducibility of landmark identification on three-dimensional (3D) cone-beam computed tomography (CBCT) images between procedures based on traditional cephalometric definitions (procedure 1) and those tentatively proposed for 3D images (procedure 2). Materials and Methods: A phantom with embedded dried human skull was scanned using CBCT. The acquired volume data were transferred to a personal computer, and 3D images were reconstructed. Eighteen dentists plotted nine landmarks related to the jaws and teeth four times: menton (Me), pogonion (Po), upper-1 (U1), lower-1 (L1), left upper-6 (U6), left lower-6 (L6), gonion (Go), condyle (Cd), and coronoid process (Cp). The plotting reliabilities of the two procedures were compared by calculating standard deviations (SDs) in three components (x, y, and z) of coordinates and volumes of 95% confidence ellipsoid. Results: All 27 SDs for procedure 2 were less than 1 mm, and only five of them exceeded 0.5 mm. The variations were significantly different between the two procedures, and the SDs of procedure 2 were smaller than those of procedure 1 in 21 components of coordinates. The ellipsoid volumes were also smaller for procedure 2 than procedure 1, although a significant difference was not found. Conclusions: Definitions determined strictly on each three sectional images, such as for procedure 2, were required for sufficient reliability in identifying the landmark related to the jaws and teeth.
APA, Harvard, Vancouver, ISO, and other styles
42

Lima-Araujo, Frede, Ana Carolina Brasileiro, Elvis Franklin Fernandes Carvalho, and Daniel Cunha Passos. "Efficiency of photo identification of inguinal color patterns of Pithecopus gonzagai (Anura: Phyllomedusidae) from northeastern Brazil." Phyllomedusa: Journal of Herpetology 20, no. 1 (June 22, 2021): 67–74. http://dx.doi.org/10.11606/issn.2316-9079.v20i1p67-74.

Full text
Abstract:
Animal monitoring research involving mark-recapture techniques increasingly requires non-invasive methods of individual identification. The photographic identification method (PIM) is an excellent tool for this purpose and has been applied successfully to many taxa. However, the utility of PIM is a function of species-specific features that are judged suitable for a given target-species. Herein, the suitability of inguinal color patterns for photo identification of individuals of Pithecopus gonzagai are evaluated by comparing two widely used computer-assisted photographic matching programs (I³S and Wild.ID). Both programs accurately identified more than 70% of individuals in the top 20 potential matching photographs. Wild.ID was slightly better than I³S in matching efficiency and has a faster processing time. Thus, PIM is useful to identify individual P. gonzagai; however, before implementing the technique in animal-monitoring studies of other taxa, one must evaluate the suitability PIM for the target species and calibrate the relative efficiency of the software programs in identifying individuals.
APA, Harvard, Vancouver, ISO, and other styles
43

Borko, Yuliia. "Economic and legal aspects of the use of computer programs." Theory and Practice of Intellectual Property, no. 5 (November 17, 2021): 79–86. http://dx.doi.org/10.33731/52021.244522.

Full text
Abstract:
Keywords: computer program, economic and legal regulation, taxation, licenseagreement, initial cost, value added tax, royalties The article deals with the economic and legal aspects of using computer programs inbusiness operations. In particular, certain problems of taxation relating to the creationand use of computer programs are considered. There have been consideredways and means of representations in the accounting of the following operations: purchaseof intellectual property rights to a computer program, supply of a computer programfrom a non-resident (resident) to a resident. The principles of the formation ofthe cost of a computer program, depending on the terms of purchase, have been outlined.The has been defined the concept of royalties from the use of a computer programin the economic activity of an enterprise. The article indicates that the supply ofservices (performance of work) related to software products and that introducechanges to the software are deemed to be any updates, changes, additions to expandtheir functionality. Such an operation is referred to as the supply of software productsusing IT benefits. The supply of services that do not introduce changes, namely: installation,configuration, testing, identification and rectification of deficiencies, information,and consulting support is referred to operations that are subject to VAT atthe general rate. The article states that VAT is charged on operations for the supplyof software products from a non-resident (resident) to a resident in the customs territory(customs territory) of Ukraine, which, in turn, is not subject to VAT. At the sametime, if as a result of the provision of technical support services for software products(including software products provided for use under the license agreement) there areno changes in software products (for example, training staff to work with the program,installing the program, configuration of office equipment, etc.), then operationsfor the provision of such services are subject to VAT in the generally established mannerin the amount of 20 percent.There has been determined the need to improve economic and legal regulation ofthe creation and use of computer programs in the economic activities of companies interms of taxation.
APA, Harvard, Vancouver, ISO, and other styles
44

Khodiakova, Galina. "Computer processing of texts in quantitative linguistics course." Scientific Visnyk V.O. Sukhomlynskyi Mykolaiv National University. Pedagogical Sciences 65, no. 2 (2019): 323–28. http://dx.doi.org/10.33310/2518-7813-2019-65-2-323-328.

Full text
Abstract:
In the article one of the approaches to teaching quantitative linguistics course is described. In spite of the fact that the course is relatively new there are already some traditions in its teaching. Usually the usage of a number of mathematical methods and methods of mathematical statistics is accented. Students studying quantitative linguistics according to these programs are required to have a deep understanding in the corresponding subject areas. From the beginning of the 2000s text processing computer programs have been actively developed, there are examples of using these programs in studying process. Supporting and updating previously created programs is not of current interest, online services developed by big corporations are widely used for analysis and processing of linguistic information. Programs that appeared lately have much better quality, reliability and availability compared to their predecessors. They can be successfully used in studying process. The goal of writing this article is to describe the possibilities of modern computer means for text information analysis and the methods of their usage in the process of teaching students the course of quantitative linguistics. The functionalities of a number of popular online text processing and analysis services are described in this article. Further in the article examples of the practical work on following topics are given: Text frequency characteristics, Zipf’s Law, Semantic text analysis, Typological indices of Greenberg, Grammar text analysis, building semantic graphs. Computer text processing is used also during phonosemantic analysis of words and text, identification of the author of a text, finding the amount of information in the linguistic unit. In the program of teaching students on specialization «Applied linguistics» for studying the discipline «Quantitative linguistics» 3 credits, 10 hours of lectures and 20 hours of workshops are allocated. In prospect, the development of quantitative linguistics teaching course, extension of a list of topics for studying methods of computer text processing, deepening knowledge by studying algorithms of automated text processing are possible. This can be a subject for further research in the field of teaching quantitative linguistics course.
APA, Harvard, Vancouver, ISO, and other styles
45

Toby, B. H., R. L. Harlow, and M. A. Holomany. "The POWDER SUITE: Computer Programs for Searching and Accessing the JCPDS-ICDD Powder Diffraction Database." Powder Diffraction 5, no. 1 (March 1990): 2–7. http://dx.doi.org/10.1017/s0885715600015153.

Full text
Abstract:
AbstractTwo new VAX/VMS computer programs are presented for accessing and searching the Powder Diffraction File (PDF) (1989) of the JCPDS-International Centre for Diffraction Data (ICDD). The programs use binary mapped index files which affords rapid searches of the database. Program LOGIC permits entries in the database to be selected by chemistry, peak position or name constraints. The selected entries may be displayed, printed or graphed. The program can display or print entries from the full PDF-2 (1989) database, if on-line. Program SEARCH searches for patterns in the database which match an unknown set of peaks; the program may be optimized for a wide variety of applications including identification of component phases in mixtures. Commands may be entered to the programs in two modes. In the “novice-friendly” mode, users must answer questions to select options. However, experienced users may opt to use a concise one-line command syntax. The modes may be mixed.
APA, Harvard, Vancouver, ISO, and other styles
46

Ibrahim, Aisha N., Vinaya Bhat, Shilpa M. Shenoy, and Veena A. Shetty. "Quantitative evaluation of DNA from the tooth pulp exposed to varying temperatures." Journal of Health and Allied Sciences NU 06, no. 03 (September 2016): 06–09. http://dx.doi.org/10.1055/s-0040-1708653.

Full text
Abstract:
Abstract Context: During natural calamities like fire accidents, many times the human body gets charred beyond recognition. Tooth, being the hardest structure in the human body protects the pulp within from such accidents. Forensic identification through the pulpal DNA could be avery useful tool in such situations. Aim: This study was designed to evaluate the quantity of DNA obtained from the pulp when exposed to varying temperatures. Methods and Material: Extracted teeth were subjected to the following temperatures:-80°C,37°C,100°C, 200°C, 300°C, 500°C and 1000°C. Pulp from these teeth were retrieved by horizontally sectioning the teeth using a fine needle diamond point in a high speed air rotor, followed by extraction of DNA with the HipuraA™ Forensic Genomic DNA purification spink it. The samples were quantified using personal computer(PC) based double beam spectro photo meter. Kruskal Wallis test and Mann WhitneyU test were used for statistical analysis. Results: Statistically significant difference (p<0.005) was seen in the quantity of DNA obtained from pulp subjected to higher temperatures as compared to oral temperature. However, there was no significant difference (p>0.05) in the quantity of DNA obtained from teeth subjected to-80°C Conclusions: Increase in temperature decreases the amount of DNA from the tooth pulp where as a decrease in temperature does not cause any change in the quantity of DNA.
APA, Harvard, Vancouver, ISO, and other styles
47

KEARNEY, P., and P. THIBAULT. "BIOINFORMATICS MEETS PROTEOMICS — BRIDGING THE GAP BETWEEN MASS SPECTROMETRY DATA ANALYSIS AND CELL BIOLOGY." Journal of Bioinformatics and Computational Biology 01, no. 01 (April 2003): 183–200. http://dx.doi.org/10.1142/s021972000300023x.

Full text
Abstract:
Proteomics research programs typically comprise the identification of protein content of any given cell, their isoforms, splice variants, post-translational modifications, interacting partners and higher-order complexes under different conditions. These studies present significant analytical challenges owing to the high proteome complexity and the low abundance of the corresponding proteins, which often requires highly sensitive and resolving techniques. Mass spectrometry plays an important role in proteomics and has become an indispensable tool for molecular and cellular biology. However, the analysis of mass spectrometry data can be a daunting task in view of the complexity of the information to decipher, the accuracy and dynamic range of quantitative analysis, the availability of appropriate bioinformatics software and the overwhelming size of data files. The past ten years have witnessed significant technological advances in mass spectrometry-based proteomics and synergy with bioinformatics is vital to fulfill the expectations of biological discovery programs. We present here the technological capabilities of mass spectrometry and bioinformatics for mining the cellular proteome in the context of discovery programs aimed at trace-level protein identification and expression from microgram amounts of protein extracts from human tissues.
APA, Harvard, Vancouver, ISO, and other styles
48

Jenkins, Ron. "New Developments in PC-Based Powder Data Retrieval Programs." Advances in X-ray Analysis 37 (1993): 117–21. http://dx.doi.org/10.1154/s0376030800015585.

Full text
Abstract:
While most contemporary methods of qualitative analysis of multi-phase materials are still based on the classic Search/Match/Identify process developed by Hanawalt, Rinn and Frevel in the 1930s, during the past 10 years or so the personal computer, with associated CD-ROM storage, has made a dramatic impact on the ways in which classical procedures are being implemented. Until recently, most of the commercial mainframe and PC based software packages for qualitative phase identification have been designed to implement a fully automatic search/matching sequence. All of the major instrument suppliers now offer such programs as part of their Automated Powder Diffractometer (APD) packages. While these programs are extremely useful, the success of their application to a specific problem is critically dependent on the quality of both experimental data and reference data. Until the problems arising from comparing variable quality experimental and reference data are completely understood, it appears that there will continue to be an interest in user-inter active (computer-aided) manual methods of search/matching. This paper explores the use of the personal computer in the area of computer-aided search/matching
APA, Harvard, Vancouver, ISO, and other styles
49

Marr, Charles. "422 Digital Video Images and Their Use in Extension Programs." HortScience 34, no. 3 (June 1999): 517B—517. http://dx.doi.org/10.21273/hortsci.34.3.517b.

Full text
Abstract:
Digital images are becoming an essential part of computer “slide” presentations, identification of plants and problems from a distant location, and adding visual elements to Web pages. The use of digital video images allows capturing of single frames for individual or sequence photographs as well as “mass” storage of digital images. There are also some uses of short “video clips” to be included in slide or Web presentations. A discussion of digital image quality and demonstration of equipment used will be included in the presentation.
APA, Harvard, Vancouver, ISO, and other styles
50

Lalić, Maja, Irena Melih, Ema Aleksić, Milica Gajić, Katarina Kalevski, and Anika Ćuković. "Oral Health Related Quality of Life and Dental Status of Adult Patients." Balkan Journal of Dental Medicine 21, no. 2 (July 26, 2017): 93–99. http://dx.doi.org/10.1515/bjdm-2017-0014.

Full text
Abstract:
SummaryBackground: The aim of this study was to assess the oral health-related quality of life in adult patients who visit the Dental Clinic of the Faculty of Stomatology, Pancevo, using a Serbian version of 14-items Oral Health Impact Profile (OHIP14) Questionnaire. Material and Methods: A total of 89 respondents (42 women and 47 men, mean age 52.83 ± 13.74 years) filled in the questionnaire themselves. Three calibrated dentists recorded the oral health status of the respondents (number of healthy, decayed, filled and missing teeth), the type and time of wearing prosthodontic replacements, if they existed, and assessed the need for prosthodontic treatment. The total OHIP-14 score was calculated by adding scores for all fourteen items; OHIP-14 subscale scores were calculated by adding the scores for the two items in each of the seven subscales. Results: Mean total OHIP score was 10.25 ± 8.89. Patients with less than eight extracted teeth, wearers of fixed prosthodontic appliances and patients without replacements who did not need prosthodontic treatment reported better oral health-related quality of life. The most severe oral impacts assessed by the subscale OHIP14 scores were recorded in psychological discomfort (2.44 ± 2.18), physical pain (1.87 ± 1.73) and psychological disability subscale (1.83 ± 1.88). Women more often than men were dissatisfied with their diet and had been irritable in contact with other people. Conclusion: Further studies using the OHIP14 questionnaire in a larger sample will permit identification of key factors related to poor oral health and planning of treatment protocols and preventive programs for the adult population in Serbia.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography