Academic literature on the topic 'Computer perimetry'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer perimetry.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer perimetry"
Yerichev, V. P., A. A. Vitkov, A. M. Akimov та S. A. Ovsepyan. "Cliniсal aspects of static perimetry in the diagnosis of glaucoma". Modern technologies in ophtalmology 60, № 2 (2025): 53–54. https://doi.org/10.25276/2312-4911-2025-2-53-54.
Full textFabrikantov, O. L., A. V. Sukhorukova, and S. V. Shutova. "Perimetric Calculator." Ophthalmology in Russia 17, no. 3 (2020): 459–64. http://dx.doi.org/10.18008/1816-5095-2020-3-459-464.
Full textTikhonovskaya, Irina A., and Irina L. Simakova. "Non-standard computer perimetry in the diagnosis of some optic neuropathies." Ophthalmology Journal 14, no. 1 (2021): 75–87. http://dx.doi.org/10.17816/ov60059.
Full textSerdyukova, Svetlana A., and Irina L. Simakova. "Computer perimetry in the diagnosis of primary open-angle glaucoma." Ophthalmology journal 11, no. 1 (2018): 54–65. http://dx.doi.org/10.17816/ov11154-65.
Full textWild, J. "Computer-assisted perimetry — a review." Ophthalmic and Physiological Optics 7, no. 4 (1987): 447. http://dx.doi.org/10.1016/0275-5408(87)90075-5.
Full textGudlin, Julia, Iris Mueller, Solon Thanos, and Bernhard A. Sabel. "Computer based vision restoration therapy in glaucoma patients: A small open pilot study." Restorative Neurology and Neuroscience 26, no. 4-5 (2008): 403–12. https://doi.org/10.3233/rnn-2008-00430.
Full textYerichev, V. P., A. A. Vitkov, E. S. Oganesyan, and I. I. Vitkova. "Computer perimetry in the diagnosis of glaucoma." Modern technologies in ophtalmology 60, no. 2 (2025): 49–50. https://doi.org/10.25276/2312-4911-2025-2-49-50.
Full textHEIJL, ANDERS. "COMPUTER TEST LOGICS FOR AUTOMATIC PERIMETRY." Acta Ophthalmologica 55, no. 5 (2009): 837–53. http://dx.doi.org/10.1111/j.1755-3768.1977.tb08283.x.
Full textKasten, Erich, Tobias Guenther, and Bernhard A. Sabel. "Inverse stimuli in perimetric performance reveal larger visual field defects: Implications for vision restoration." Restorative Neurology and Neuroscience 26, no. 4-5 (2008): 355–64. https://doi.org/10.3233/rnn-2008-00429.
Full textMitova, D. "Computer perimetry. Indications and interpretation (Part I)." Bulgarian Review of Ophthalmology 65, no. 1 (2021): 50. http://dx.doi.org/10.14748/bro.v65i1.7434.
Full textDissertations / Theses on the topic "Computer perimetry"
Wu, John Xing Wang. "Visual screening for blinding diseases in the community using computer controlled video perimetry." Thesis, University College London (University of London), 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.397262.
Full textШкатула, Т. Є., та П. Ю. Шкатула. "Переваги комп'ютерної периметрії у порівнянні з іншими методами дослідження поля зору та чутливості сітківки при глаукомі". Thesis, Видавництво СумДУ, 2012. http://essuir.sumdu.edu.ua/handle/123456789/27307.
Full textDahbi, Abdelmounaim. "Emulation of Limited-perimeter Vector Matching Fault Localization Protocol." Thesis, University of Ottawa (Canada), 2010. http://hdl.handle.net/10393/28723.
Full textRadtke, Adrienne M. (Adrienne Michelle) 1977. "A novel instrument to measure visual field loss in glaucoma patients using pupil perimetrty." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/87167.
Full textAdeka, Muhammad I. "Cryptography and Computer Communications Security. Extending the Human Security Perimeter through a Web of Trust." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/11380.
Full textKingston, Derek B. "Decentralized Control of Multiple UAVs for Perimeter and Target Surveillance." BYU ScholarsArchive, 2007. https://scholarsarchive.byu.edu/etd/1174.
Full textElmubarak, Mona. "Accuracy and reliability of traditional measurement techniques for tooth widths and arch perimeter compared to CAD/CAM." University of the Western Cape, 2018. http://hdl.handle.net/11394/6521.
Full textRydén, Calle. "Scenario Based Comparison Between Risk AssessmentSchemes." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-19722.
Full textSintaro, Abel Tariku, and Yemi Emmanuel Komolafe. "SDP And VPN For Remote Access : A Comparative Study And Performance Evaluation." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-103892.
Full textHolt, Ryan S. "Three Enabling Technologies for Vision-Based, Forest-Fire Perimeter Surveillance Using Multiple Unmanned Aerial Systems." BYU ScholarsArchive, 2007. https://scholarsarchive.byu.edu/etd/931.
Full textBooks on the topic "Computer perimetry"
Nelson, Frederick A. Guidelines for using the wetted perimeter (WETP) computer program of the Montana Department of Fish, Wildlife and Parks. Montana Dept. of Fish, Wildlife and Parks, 1989.
Find full textCaprioli, Joseph, and Jorg Weber. Atlas of Computerized Perimetry. W.B. Saunders Company, 1999.
Find full textRiggs, Cliff. Network Perimeter Security: Building Defense In-Depth. AUERBACH, 2003.
Find full textZeltser, Lenny, Scott Winters, Ronald W. Ritchey, Karen Fredrick, and Stephen Northcutt. Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems. Sams, 2002.
Find full textSchwartz, Michael. Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software. Apress, 2018.
Find full textRiggs, Cliff. Network Perimeter Security: Building Defense In-Depth. Auerbach Publishers, Incorporated, 2003.
Find full textBook chapters on the topic "Computer perimetry"
De Jong, D. G. M. M., E. L. Greve, D. Bakker, and T. J. T. P. Van Den Berg. "Psychological Factors in Computer Assisted Perimetry; Automatic and Semi-Automatic Perimetry." In Documenta Ophthalmologica Proceedings Series. Springer Netherlands, 1985. http://dx.doi.org/10.1007/978-94-009-5512-7_20.
Full textde Jong, D. G. M. M., E. L. Greve, and D. Bakker. "Psychological Factors in Computer Assisted Perimetry; Automatic and Semi-Automatic Perimetry." In Second European Glaucoma Symposium, Helsinki, May 1984. Springer Netherlands, 1985. http://dx.doi.org/10.1007/978-94-009-5516-5_3.
Full textFaschinger, Christoph. "Computer perimetry in patients with corneal dystrophies." In Seventh International Visual Field Symposium, Amsterdam, September 1986. Springer Netherlands, 1987. http://dx.doi.org/10.1007/978-94-009-3325-5_9.
Full textBrusini, Paolo, and Claudia Tosoni. "Automatic Perimetry in Glaucoma: A Clinical Comparison of Two Computer-Assisted Perimeters (Perimetron and Octopus 2000)." In Documenta Ophthalmologica Proceedings Series. Springer Netherlands, 1985. http://dx.doi.org/10.1007/978-94-009-5512-7_25.
Full textApáthy, Peter P., S. G. Jacobson, L. Nghiem-Phu, R. W. Knighton, and J. M. Parel. "Computer-aided analysis in automated dark-adapted static perimetry." In Seventh International Visual Field Symposium, Amsterdam, September 1986. Springer Netherlands, 1987. http://dx.doi.org/10.1007/978-94-009-3325-5_36.
Full textWild, J. M., J. M. Wood, M. K. Hussey, and S. J. Crews. "The quantification of the visual field in computer-assisted threshold perimetry." In Seventh International Visual Field Symposium, Amsterdam, September 1986. Springer Netherlands, 1987. http://dx.doi.org/10.1007/978-94-009-3325-5_26.
Full textGreve, Erik L., Tom J. T. P. van den Berg, and Christine T. Langerhorst. "Present and Future of Computer Assisted Perimetry in Glaucoma Selected Topics." In Second European Glaucoma Symposium, Helsinki, May 1984. Springer Netherlands, 1985. http://dx.doi.org/10.1007/978-94-009-5516-5_1.
Full textLópez, Carlos Linares, and Andreas Junghanns. "Perimeter Search Performance." In Computers and Games. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-40031-8_23.
Full textWeik, Martin H. "perimeter protection system." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_13815.
Full textAltshuler, Yaniv, Vladimir Yanovsky, Daniel Vainsencher, Israel A. Wagner, and Alfred M. Bruckstein. "On Minimal Perimeter Polyminoes." In Discrete Geometry for Computer Imagery. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11907350_2.
Full textConference papers on the topic "Computer perimetry"
Dallel, Olfa, Souheil Ben Ayed, and Jamel Bel Hadj Taher. "Ph.D. Forum: Smart Software-Defined Perimeter Framework for Social Internet of Things." In 2024 IEEE/ACS 21st International Conference on Computer Systems and Applications (AICCSA). IEEE, 2024. https://doi.org/10.1109/aiccsa63423.2024.10912577.
Full textFernández-Martínez, Carolina, Anastasios Bikos, Christos Verikoukis, and Shuaib Siddiqui. "Trusted Access to 6G Testbeds Through a Security Intent-Driven Software-Defined Perimeter Framework." In 2024 IEEE 29th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE, 2024. https://doi.org/10.1109/camad62243.2024.10942785.
Full textKardon, Randy H., Chris Haupert, and H. Stanley Thompson. "Automated Pupil Perimetry." In Noninvasive Assessment of the Visual System. Optica Publishing Group, 1990. http://dx.doi.org/10.1364/navs.1990.mb5.
Full textWeiss, Stefan, Frank Schaeffel, Helmut Wilhelm, and Eberhart Zrenner. "Pupil Perimetry by Real-time Analysis of Digitized Video Images." In Noninvasive Assessment of the Visual System. Optica Publishing Group, 1993. http://dx.doi.org/10.1364/navs.1993.nsud.1.
Full textWegner, Isaac, and Matthew I. Campbell. "3D Infill Path Generation on Quadric Surfaces for Additive Manufacturing." In ASME 2024 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2024. http://dx.doi.org/10.1115/detc2024-142544.
Full textStellari, Franco, Chung-Ching Lin, Thomas Wassick, Thomas Shaw, and Peilin Song. "Automated Contactless Defect Analysis Technique Using Computer Vision." In ISTFA 2018. ASM International, 2018. http://dx.doi.org/10.31399/asm.cp.istfa2018p0079.
Full textDing, Huafeng, and Zhen Huang. "Isomorphism Identification of Graphs of Kinematic Chains." In ASME 2007 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/detc2007-34148.
Full textDe Vogeleer, Karel, Selim Ickin, David Erman, and Markus Fiedler. "PERIMETER: A user-centric mobility framework." In 2010 IEEE 35th Conference on Local Computer Networks (LCN 2010). IEEE, 2010. http://dx.doi.org/10.1109/lcn.2010.5735783.
Full textTu, Peter, Ting Yu, Dashan Gao, et al. "A systems level approach to perimeter protection." In 2012 IEEE Workshop on Applications of Computer Vision (WACV). IEEE, 2012. http://dx.doi.org/10.1109/wacv.2012.6163038.
Full textGotsiridze, Irina A., Giorgi T. Gigilashvili, Zviad T. Gurtskaia, and Nikoloz S. Invia. "Computer perimeter for screening of field of visions and standardization of this method." In 2015 E-Health and Bioengineering Conference (EHB). IEEE, 2015. http://dx.doi.org/10.1109/ehb.2015.7391569.
Full textReports on the topic "Computer perimetry"
Styles, Richard, Rachel Bain, and Anthony Priestas. Method to evaluate vessel wake forces on wetland scarps. Engineer Research and Development Center (U.S.), 2022. http://dx.doi.org/10.21079/11681/45304.
Full textOver, Thomas, Riki Saito, Andrea Veilleux, et al. Estimation of Peak Discharge Quantiles for Selected Annual Exceedance Probabilities in Northeastern Illinois. Illinois Center for Transportation, 2016. http://dx.doi.org/10.36501/0197-9191/16-014.
Full text