Results 241 to 250 of about 91,718 (288)

Quantitative Defect-Property Correlations in Ti<sub>3</sub>C<sub>2</sub>T<sub>x</sub> MXenes via Precursor-Controlled Defect Engineering. [PDF]

open access: yesNanomicro Lett
Hassan T   +15 more
europepmc   +1 more source
Some of the next articles are maybe not open access.

Related searches:

Experimental Approach to Camouflaged Target Detection and Camouflage Evaluation

IGARSS 2023 - 2023 IEEE International Geoscience and Remote Sensing Symposium, 2023
This work discusses three individual camouflage experiments from a drone-based hyperspectral measurement campaign conducted in 2021. The experiments were designed to provide insight into different scenarios of camouflage classification and detection of camouflaged objects.
Gross, W   +7 more
openaire   +2 more sources

Camouflaged Symmetry

Perception, 2009
The notions of symmetry group and camouflage are explained, and a technique is introduced to visually camouflage symmetry groups in natural textures. Two experiments were carried out to test discriminability of symmetry groups p1, p2, pm, and pg in 4-oddity and 5AFC designs with different or same texture per set of stimulus pictures, respectively.
openaire   +2 more sources

Camouflage for vitiligo

Dermatologic Therapy, 2009
Cosmetic camouflage is indispensable for patients with vitiligo and can result in an improvement of their quality of life. Recent cosmetic advances enabled camouflage to obtain a suitable color match and keep it waterproof. However, camouflage needs some techniques.
Miki, Tanioka, Yoshiki, Miyachi
openaire   +2 more sources

Camouflage Therapy

Dermatologic Clinics, 1995
Camouflage therapy is a system of cosmetic techniques designed for patients to use to assist themselves in coping constructively with the psychological and physical trauma of their disfigurements. It is described as a "system" because these techniques are interrelated.
openaire   +2 more sources

Software Camouflage

2014
Obfuscation is a software technique aimed at protecting high-value programs against reverse-engineering. In embedded devices, it is harder for an attacker to gain access to the program machine code; of course, the program can still be very valuable, as for instance when it consists in a secret algorithm.
Sylvain Guilley   +4 more
openaire   +1 more source

CAMOUFLAGE THERAPY

Australasian Journal of Dermatology, 1984
SummaryA study was undertaken using the camouflage cosmetics available in Australia. Three camouflage cosmetics were compared in a variety of skin conditions. It was found Dermacolor was preferred to Covermark and Keromask. So far, a similar study has not been done.
openaire   +2 more sources

Home - About - Disclaimer - Privacy