Academic literature on the topic 'Computer perimetry'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer perimetry.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer perimetry"

1

Yerichev, V. P., A. A. Vitkov, A. M. Akimov та S. A. Ovsepyan. "Cliniсal aspects of static perimetry in the diagnosis of glaucoma". Modern technologies in ophtalmology 60, № 2 (2025): 53–54. https://doi.org/10.25276/2312-4911-2025-2-53-54.

Full text
Abstract:
Relevance Technologies and research programs are constantly evolving. The latest models of computer perimeters allow for qualitative and quantitative assessment of photosensitivity defects and calculation of perimetric indices [1, 2]. To assess changes in the visual field in computer perimetry, the Single Field Analysis (SFA) protocol for Humphrey Field Analyzer (HFA) and Seven-in-One for Octopus are most often used. The forms of these programs contain the maximum amount of information on one page. In addition to the main data, the protocol contains study quality indicators, the number of fals
APA, Harvard, Vancouver, ISO, and other styles
2

Fabrikantov, O. L., A. V. Sukhorukova, and S. V. Shutova. "Perimetric Calculator." Ophthalmology in Russia 17, no. 3 (2020): 459–64. http://dx.doi.org/10.18008/1816-5095-2020-3-459-464.

Full text
Abstract:
The paper considers the problems of the early glaucoma diagnosis before the development of the marked glaucomatous optic neuropathy. Special attention is paid to the methods of computer perimetry, which are important in diagnosing the presence or progression of glaucoma.Purpose. To create the computer program “perimetric calculator” that performs mutual recalculation of perimeter data of HFA and HEP without additional perimetric studies, as well as calculation of diagnostic information content of perimeter parameters with different “cut-off points” of HFA and HEP parameters.Patients and method
APA, Harvard, Vancouver, ISO, and other styles
3

Tikhonovskaya, Irina A., and Irina L. Simakova. "Non-standard computer perimetry in the diagnosis of some optic neuropathies." Ophthalmology Journal 14, no. 1 (2021): 75–87. http://dx.doi.org/10.17816/ov60059.

Full text
Abstract:
Modern computer perimetry is divided into traditional white stimulus-on-white background, the gold standard of which is perimetry performed by using expert class perimeters Humphrey and Octopus and therefore called standard automatic or automated perimetry (SAP), and non-traditional or non-standard perimetry, which differs, first of all, in a different nature of a stimulus. The article is a review devoted to the assessment of the diagnostic capabilities of non-standard computer perimetry in the form of different variants of perimetry with doubling the spatial frequency (Frequency Doubling Tech
APA, Harvard, Vancouver, ISO, and other styles
4

Serdyukova, Svetlana A., and Irina L. Simakova. "Computer perimetry in the diagnosis of primary open-angle glaucoma." Ophthalmology journal 11, no. 1 (2018): 54–65. http://dx.doi.org/10.17816/ov11154-65.

Full text
Abstract:
Static perimetry, made using Humphrey and Octopus expert class perimeters, is called the standard automated perimetry (SAP); and for more than 30 years, it is the “gold standard” in assessing the visual field in glaucoma diagnosis. Currently, many computer perimeters appeared on the Russian market. The article reviews modern methods of computerized perimetry which are most widespread in our country and presents their comparative characteristics. (For citation: Serdyukova SA, Simakova IL. Computer perimetry in the diagnosis of primary open-angle glaucoma. Ophthalmology Journal. 2018;11(1):54-65
APA, Harvard, Vancouver, ISO, and other styles
5

Wild, J. "Computer-assisted perimetry — a review." Ophthalmic and Physiological Optics 7, no. 4 (1987): 447. http://dx.doi.org/10.1016/0275-5408(87)90075-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gudlin, Julia, Iris Mueller, Solon Thanos, and Bernhard A. Sabel. "Computer based vision restoration therapy in glaucoma patients: A small open pilot study." Restorative Neurology and Neuroscience 26, no. 4-5 (2008): 403–12. https://doi.org/10.3233/rnn-2008-00430.

Full text
Abstract:
Purpose: Several studies have shown that computer-based visual stimulation improves detection performance in brain damaged patients with post-chiasmatic lesions after stroke or trauma. Because it is not known whether visual field defects after retinal lesions can also be modified by visual stimulation we explored if visual field enlargements are possible in patients with glaucoma. Methods: Five patients with primary open angle glaucoma (POAG) performed Vision Restoration Training (VRT), a computer-based vision training for a total of 6 months in two 3-months blocks with a 3-months training-fre
APA, Harvard, Vancouver, ISO, and other styles
7

Yerichev, V. P., A. A. Vitkov, E. S. Oganesyan, and I. I. Vitkova. "Computer perimetry in the diagnosis of glaucoma." Modern technologies in ophtalmology 60, no. 2 (2025): 49–50. https://doi.org/10.25276/2312-4911-2025-2-49-50.

Full text
Abstract:
Relevance Primary open-angle glaucoma is a chronic disease that leads to irreversible blindness. Fluctuations in intraocular pressure lead to the death of retinal ganglion cells (RGC) and the retinal nerve fiber layer (RNFL) [1–3]. As glaucoma progresses, characteristic structural and functional changes develop. The absence of timely and adequate treatment leads to irreversible vision loss. The "gold standard" in glaucoma diagnostics is computer perimetry. This study allows assessing the state of visual functions by analyzing the differential light sensitivity of the retina at the studied poin
APA, Harvard, Vancouver, ISO, and other styles
8

HEIJL, ANDERS. "COMPUTER TEST LOGICS FOR AUTOMATIC PERIMETRY." Acta Ophthalmologica 55, no. 5 (2009): 837–53. http://dx.doi.org/10.1111/j.1755-3768.1977.tb08283.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kasten, Erich, Tobias Guenther, and Bernhard A. Sabel. "Inverse stimuli in perimetric performance reveal larger visual field defects: Implications for vision restoration." Restorative Neurology and Neuroscience 26, no. 4-5 (2008): 355–64. https://doi.org/10.3233/rnn-2008-00429.

Full text
Abstract:
Purpose: When studying the efficacy of vision restoration training (VRT), near-threshold and super-threshold perimetry revealed visual field enlargements whereas the Scanning Laser Ophthalmoscope (SLO) did not. Because the SLO procedure differs in many parameters from the other perimetric tests (task difficulty, inability to reveal relative defects, inverse stimulus presentation, bright red background) the question arises which of these parameters might be responsible for such discrepancies in outcome. We have therefore simulated with a computer-based campimetry test some of the SLO parameters
APA, Harvard, Vancouver, ISO, and other styles
10

Mitova, D. "Computer perimetry. Indications and interpretation (Part I)." Bulgarian Review of Ophthalmology 65, no. 1 (2021): 50. http://dx.doi.org/10.14748/bro.v65i1.7434.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer perimetry"

1

Wu, John Xing Wang. "Visual screening for blinding diseases in the community using computer controlled video perimetry." Thesis, University College London (University of London), 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.397262.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Шкатула, Т. Є., та П. Ю. Шкатула. "Переваги комп'ютерної периметрії у порівнянні з іншими методами дослідження поля зору та чутливості сітківки при глаукомі". Thesis, Видавництво СумДУ, 2012. http://essuir.sumdu.edu.ua/handle/123456789/27307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dahbi, Abdelmounaim. "Emulation of Limited-perimeter Vector Matching Fault Localization Protocol." Thesis, University of Ottawa (Canada), 2010. http://hdl.handle.net/10393/28723.

Full text
Abstract:
Survivability in all-optical networks is an imperative requirement. There are two types of restoration techniques: link restoration and path restoration. Although link restoration is advantageous in terms of restoration speed and network load balancing, it requires to be preceded by an efficient fault localization procedure. This explains the importance of fault localization in all-optical networks. Limited-perimeter Vector Matching (LVM) Fault localization Protocol was designed to be fast and efficient. This thesis presents the emulation process for LVM Protocol. The emulation process consist
APA, Harvard, Vancouver, ISO, and other styles
4

Radtke, Adrienne M. (Adrienne Michelle) 1977. "A novel instrument to measure visual field loss in glaucoma patients using pupil perimetrty." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/87167.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2000.<br>Includes bibliographical references (leaves 98-99).<br>by Adrienne M. Radtke.<br>S.M.
APA, Harvard, Vancouver, ISO, and other styles
5

Adeka, Muhammad I. "Cryptography and Computer Communications Security. Extending the Human Security Perimeter through a Web of Trust." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/11380.

Full text
Abstract:
This work modifies Shamir’s algorithm by sharing a random key that is used to lock up the secret data; as against sharing the data itself. This is significant in cloud computing, especially with homomorphic encryption. Using web design, the resultant scheme practically globalises secret sharing with authentications and inherent secondary applications. The work aims at improving cybersecurity via a joint exploitation of human factors and technology; a human-centred cybersecurity design as opposed to technology-centred. The completed functional scheme is tagged CDRSAS. The literature on secret s
APA, Harvard, Vancouver, ISO, and other styles
6

Kingston, Derek B. "Decentralized Control of Multiple UAVs for Perimeter and Target Surveillance." BYU ScholarsArchive, 2007. https://scholarsarchive.byu.edu/etd/1174.

Full text
Abstract:
With the recent development of reliable autonomous technologies for small unmanned air vehicles (UAVs), the algorithms utilizing teams of these vehicles are becoming an increasingly important research area. Unfortunately, there is no unified framework into which all (or even most) cooperative control problems fall. Five factors that affect the development of cooperative control algorithms are objective coupling, communication, completeness, robustness, and efficiency. We classify cooperative control algorithms by these factors and then present three algorithms with application to target and pe
APA, Harvard, Vancouver, ISO, and other styles
7

Elmubarak, Mona. "Accuracy and reliability of traditional measurement techniques for tooth widths and arch perimeter compared to CAD/CAM." University of the Western Cape, 2018. http://hdl.handle.net/11394/6521.

Full text
Abstract:
>Magister Scientiae - MSc<br>Background: Plaster models form an integral part of the traditional orthodontic records. They are necessary for diagnosis and treatment planning, case presentations as well as for the evaluation of treatment progress. The accuracy of the measurements taken for space assessment is crucial prior to treatment planning. The introduction of digital models overcomes some problems experienced with plaster models. Digital models have shown to be an acceptable alternative for plaster models. Aim: The aim of the study was to determine the accuracy of traditional measur
APA, Harvard, Vancouver, ISO, and other styles
8

Rydén, Calle. "Scenario Based Comparison Between Risk AssessmentSchemes." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-19722.

Full text
Abstract:
Background. In the field of risk management, focusing on digital infrastructure, there is an uncertainty about which methods and algorithms are relevant and correct. Behind this uncertainty lies a need for testing and evaluation of different risk management analysis methods in order to determine how effective they are in relation to each other. Purpose. The purpose of this thesis is to manufacture a reproducible and universal method of comparison between risk management analysis methods. This is based on the need to compare two risk assessment analysis methods. One method relies solely on impa
APA, Harvard, Vancouver, ISO, and other styles
9

Sintaro, Abel Tariku, and Yemi Emmanuel Komolafe. "SDP And VPN For Remote Access : A Comparative Study And Performance Evaluation." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-103892.

Full text
Abstract:
Remote access is a way of providing access to networks from outside the premises of the network. Virtual Private Network (VPN) is one solution used to provide remote access. Software-Defined Perimeter (SDP) is another solution that is capable of providing access to resources from a remote location. These two technologies use different security models yet provide comparable remote access functionalities. This thesis project investigates the basic components, architecture, and security services of SDP and IPSec VPN. Additionally, a performance evaluation is conducted on SDPand VPN on their conne
APA, Harvard, Vancouver, ISO, and other styles
10

Holt, Ryan S. "Three Enabling Technologies for Vision-Based, Forest-Fire Perimeter Surveillance Using Multiple Unmanned Aerial Systems." BYU ScholarsArchive, 2007. https://scholarsarchive.byu.edu/etd/931.

Full text
Abstract:
The ability to gather and process information regarding the condition of forest fires is essential to cost-effective, safe, and efficient fire fighting. Advances in sensory and autopilot technology have made miniature unmanned aerial systems (UASs) an important tool in the acquisition of information. This thesis addresses some of the challenges faced when employing UASs for forest-fire perimeter surveillance; namely, perimeter tracking, cooperative perimeter surveillance, and path planning. Solutions to the first two issues are presented and a method for understanding path planning within the
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Computer perimetry"

1

Jörg, Weber. Atlas of computerized perimetry. W.B. Saunders, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nelson, Frederick A. Guidelines for using the wetted perimeter (WETP) computer program of the Montana Department of Fish, Wildlife and Parks. Montana Dept. of Fish, Wildlife and Parks, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Caprioli, Joseph, and Jorg Weber. Atlas of Computerized Perimetry. W.B. Saunders Company, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Network Perimeter Security. Taylor and Francis, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Riggs, Cliff. Network Perimeter Security. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Riggs, Cliff. Network Perimeter Security: Building Defense In-Depth. AUERBACH, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zeltser, Lenny, Scott Winters, Ronald W. Ritchey, Karen Fredrick, and Stephen Northcutt. Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems. Sams, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schwartz, Michael. Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software. Apress, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Inside Network Perimeter Security (2nd Edition) (Inside). 2nd ed. Sams, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Riggs, Cliff. Network Perimeter Security: Building Defense In-Depth. Auerbach Publishers, Incorporated, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Computer perimetry"

1

De Jong, D. G. M. M., E. L. Greve, D. Bakker, and T. J. T. P. Van Den Berg. "Psychological Factors in Computer Assisted Perimetry; Automatic and Semi-Automatic Perimetry." In Documenta Ophthalmologica Proceedings Series. Springer Netherlands, 1985. http://dx.doi.org/10.1007/978-94-009-5512-7_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

de Jong, D. G. M. M., E. L. Greve, and D. Bakker. "Psychological Factors in Computer Assisted Perimetry; Automatic and Semi-Automatic Perimetry." In Second European Glaucoma Symposium, Helsinki, May 1984. Springer Netherlands, 1985. http://dx.doi.org/10.1007/978-94-009-5516-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Faschinger, Christoph. "Computer perimetry in patients with corneal dystrophies." In Seventh International Visual Field Symposium, Amsterdam, September 1986. Springer Netherlands, 1987. http://dx.doi.org/10.1007/978-94-009-3325-5_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brusini, Paolo, and Claudia Tosoni. "Automatic Perimetry in Glaucoma: A Clinical Comparison of Two Computer-Assisted Perimeters (Perimetron and Octopus 2000)." In Documenta Ophthalmologica Proceedings Series. Springer Netherlands, 1985. http://dx.doi.org/10.1007/978-94-009-5512-7_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Apáthy, Peter P., S. G. Jacobson, L. Nghiem-Phu, R. W. Knighton, and J. M. Parel. "Computer-aided analysis in automated dark-adapted static perimetry." In Seventh International Visual Field Symposium, Amsterdam, September 1986. Springer Netherlands, 1987. http://dx.doi.org/10.1007/978-94-009-3325-5_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wild, J. M., J. M. Wood, M. K. Hussey, and S. J. Crews. "The quantification of the visual field in computer-assisted threshold perimetry." In Seventh International Visual Field Symposium, Amsterdam, September 1986. Springer Netherlands, 1987. http://dx.doi.org/10.1007/978-94-009-3325-5_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Greve, Erik L., Tom J. T. P. van den Berg, and Christine T. Langerhorst. "Present and Future of Computer Assisted Perimetry in Glaucoma Selected Topics." In Second European Glaucoma Symposium, Helsinki, May 1984. Springer Netherlands, 1985. http://dx.doi.org/10.1007/978-94-009-5516-5_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

López, Carlos Linares, and Andreas Junghanns. "Perimeter Search Performance." In Computers and Games. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-40031-8_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Weik, Martin H. "perimeter protection system." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_13815.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Altshuler, Yaniv, Vladimir Yanovsky, Daniel Vainsencher, Israel A. Wagner, and Alfred M. Bruckstein. "On Minimal Perimeter Polyminoes." In Discrete Geometry for Computer Imagery. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11907350_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer perimetry"

1

Dallel, Olfa, Souheil Ben Ayed, and Jamel Bel Hadj Taher. "Ph.D. Forum: Smart Software-Defined Perimeter Framework for Social Internet of Things." In 2024 IEEE/ACS 21st International Conference on Computer Systems and Applications (AICCSA). IEEE, 2024. https://doi.org/10.1109/aiccsa63423.2024.10912577.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fernández-Martínez, Carolina, Anastasios Bikos, Christos Verikoukis, and Shuaib Siddiqui. "Trusted Access to 6G Testbeds Through a Security Intent-Driven Software-Defined Perimeter Framework." In 2024 IEEE 29th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE, 2024. https://doi.org/10.1109/camad62243.2024.10942785.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kardon, Randy H., Chris Haupert, and H. Stanley Thompson. "Automated Pupil Perimetry." In Noninvasive Assessment of the Visual System. Optica Publishing Group, 1990. http://dx.doi.org/10.1364/navs.1990.mb5.

Full text
Abstract:
Objective tests of visual function are reliable indicators of disease and are not influenced by a patient's fears and biases. Unfortunately, there are few such tests available. We were interested in testing the feasibility of using automated pupil perimetry as an objective means of assessing the visual field. Although previous attempts at pupil perimetry did suggest it could be used to assess afferent visual function, the lack of a sensitive means to quantitate the pupil response, automatically analyze it, and produce a reproducible, automated, stimulus source has kept it from becoming a usefu
APA, Harvard, Vancouver, ISO, and other styles
4

Weiss, Stefan, Frank Schaeffel, Helmut Wilhelm, and Eberhart Zrenner. "Pupil Perimetry by Real-time Analysis of Digitized Video Images." In Noninvasive Assessment of the Visual System. Optica Publishing Group, 1993. http://dx.doi.org/10.1364/navs.1993.nsud.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wegner, Isaac, and Matthew I. Campbell. "3D Infill Path Generation on Quadric Surfaces for Additive Manufacturing." In ASME 2024 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2024. http://dx.doi.org/10.1115/detc2024-142544.

Full text
Abstract:
Abstract Conventional 3-axis 3D printing has limitations due to the need for supports for certain geometries and in weaknesses along layer lines. Layers for these printers are entirely planar, leading to difficulty in printing overhanging material. The planar structure also allows the weaker inter-layer adhesion to align with stresses, making components prone to failure under certain loading conditions. The recent advent of additional rotational axes on these printers has allowed for a departure from using strictly planar layers, but the software needed to generate these non-planar toolpaths i
APA, Harvard, Vancouver, ISO, and other styles
6

Stellari, Franco, Chung-Ching Lin, Thomas Wassick, Thomas Shaw, and Peilin Song. "Automated Contactless Defect Analysis Technique Using Computer Vision." In ISTFA 2018. ASM International, 2018. http://dx.doi.org/10.31399/asm.cp.istfa2018p0079.

Full text
Abstract:
Abstract In this paper, an automated contactless defect analysis technique using Computer Vision (CV) algorithms is presented. The proposed method includes closed-loop control of optical tools for automated image collection, as well as advanced image analysis methods to improve image quality and detect potential defects. As an example, the technique was successfully used to identify delamination defects along the perimeter of a large test chip.
APA, Harvard, Vancouver, ISO, and other styles
7

Ding, Huafeng, and Zhen Huang. "Isomorphism Identification of Graphs of Kinematic Chains." In ASME 2007 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/detc2007-34148.

Full text
Abstract:
Isomorphism identification of graphs is one of the most important and challenging problems in the fields of mathematics, computer science and mechanisms. This paper attempts to solve the problem by finding a unique representation of graphs. First, the perimeter loop of a graph is identified from all the loops of the graph obtained through a new algorithm. From the perimeter loop a corresponding perimeter graph is derived, which renders the forms of the graph canonical. Then, by relabelling the perimeter graph, the canonical perimeter graph is obtained, reducing the adjacency matrices of a grap
APA, Harvard, Vancouver, ISO, and other styles
8

De Vogeleer, Karel, Selim Ickin, David Erman, and Markus Fiedler. "PERIMETER: A user-centric mobility framework." In 2010 IEEE 35th Conference on Local Computer Networks (LCN 2010). IEEE, 2010. http://dx.doi.org/10.1109/lcn.2010.5735783.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tu, Peter, Ting Yu, Dashan Gao, et al. "A systems level approach to perimeter protection." In 2012 IEEE Workshop on Applications of Computer Vision (WACV). IEEE, 2012. http://dx.doi.org/10.1109/wacv.2012.6163038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gotsiridze, Irina A., Giorgi T. Gigilashvili, Zviad T. Gurtskaia, and Nikoloz S. Invia. "Computer perimeter for screening of field of visions and standardization of this method." In 2015 E-Health and Bioengineering Conference (EHB). IEEE, 2015. http://dx.doi.org/10.1109/ehb.2015.7391569.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computer perimetry"

1

Styles, Richard, Rachel Bain, and Anthony Priestas. Method to evaluate vessel wake forces on wetland scarps. Engineer Research and Development Center (U.S.), 2022. http://dx.doi.org/10.21079/11681/45304.

Full text
Abstract:
This Coastal and Hydraulics engineering technical note (CHETN) presents a methodology to compute normal forces on wetland perimeters with vertically scarped edges. The approach uses an empirical algorithm that predicts the normal force given the offshore vessel wake height, period, and water depth at a given point. Wave impact forces are measured using load cells, which have not been applied previously to marsh settings. Load cell and vessel wake measurements from two field sites are combined to generate an empirical transfer function relating forces to incoming vessel wake characteristics.
APA, Harvard, Vancouver, ISO, and other styles
2

Over, Thomas, Riki Saito, Andrea Veilleux, et al. Estimation of Peak Discharge Quantiles for Selected Annual Exceedance Probabilities in Northeastern Illinois. Illinois Center for Transportation, 2016. http://dx.doi.org/10.36501/0197-9191/16-014.

Full text
Abstract:
This report provides two sets of equations for estimating peak discharge quantiles at annual exceedance probabilities (AEPs) of 0.50, 0.20, 0.10, 0.04, 0.02, 0.01, 0.005, and 0.002 (recurrence intervals of 2, 5, 10, 25, 50, 100, 200, and 500 years, respectively) for watersheds in Illinois based on annual maximum peak discharge data from 117 watersheds in and near northeastern Illinois. One set of equations was developed through a temporal analysis with a two-step least squares-quantile regression technique that measures the average effect of changes in the urbanization of the watersheds used i
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!