Results 21 to 30 of about 3,096,143 (286)

A functional MRI pre-processing and quality control protocol based on statistical parametric mapping (SPM) and MATLAB

open access: yesFrontiers in Neuroimaging, 2023
Functional MRI (fMRI) has become a popular technique to study brain functions and their alterations in psychiatric and neurological conditions. The sample sizes for fMRI studies have been increasing steadily, and growing studies are sourced from open ...
Xin Di, Bharat B. Biswal
doaj   +1 more source

Addressing interoperability in open hypermedia: the design of the open hypermedia protocol [PDF]

open access: yesNew Review of Hypermedia and Multimedia, 1999
Abstract Early hypertext systems were monolithic and closed, but newer systems tend to be open, distributed, and support collaboration. While this development has resulted in increased openness and flexibility, integration or adaptation of various different tools (such as content editors, viewers, services, or even other link servers) has remained a ...
Reich, Seigfied   +7 more
openaire   +4 more sources

Open Field Protocol v1

open access: yes, 2022
This protocol details about Open Field procedure.
openaire   +1 more source

Toward Open-Set Face Recognition

open access: yes, 2017
Much research has been conducted on both face identification and face verification, with greater focus on the latter. Research on face identification has mostly focused on using closed-set protocols, which assume that all probe images used in evaluation ...
Boult, Terrance E.   +3 more
core   +1 more source

Elevated Plus Maze Test to Assess Anxiety-like Behavior in the Mouse

open access: yesBio-Protocol, 2014
The elevated plus maze task is a simple method to assess anxiety-like behaviors in rodents. This version describes the procedure used in mice. However, the protocol may also be applied to rats, considering a proportionally larger apparatus (arms: 10 x 50
Luciana Leo, Fabricio Pamplona
doaj   +1 more source

Response to correspondence article on the research protocol titled Towards Health Equity and Transformative Action on tribal health (THETA) study to describe, explain and act on tribal health inequities in India: A health systems research study protocol [version 1; peer review: 2 approved]

open access: yesWellcome Open Research, 2023
In this correspondence, we, co-authors and collaborators involved in the Towards Health Equity and Transformative Action on tribal health (THETA) study respond to a recent article published in Wellcome Open Research titled Correspondence article on the ...
Yogish Channabasappa   +7 more
doaj   +1 more source

An In-Depth Study on Open-Set Camera Model Identification

open access: yesIEEE Access, 2019
Camera model identification refers to the problem of linking a picture to the camera model used to shoot it. In this paper, as this might be an enabling factor in different forensic applications to single out possible suspects (e.g., detecting the author
Pedro Ribeiro Mendes Junior   +4 more
doaj   +1 more source

Outcome of Haemodynamically Unstable Open Pelvic Fracture Patients Managed with “3-in-1” Pelvic Damage Control Protocol in a Major Trauma Centre

open access: yesJournal of Orthopaedics, Trauma and Rehabilitation, 2018
Introduction Open pelvic fractures are one of the most challenging and severe injuries of orthopaedics. These patients usually are associated with high mortality and morbidity.
Leung Heng Chi Aaran   +3 more
doaj   +1 more source

Perancangan Jaringan Voice Over Internet Protokol (Voip) Menggunakan Platform Asterisknow

open access: yesComputer Science, 2022
Communication is an important stage to support the running of a work program, without good communication it can cause misunderstandings between the two parties, the importance of the role of communication means several companies are growing rapidly in ...
Ahmad Fauzi   +2 more
doaj   +1 more source

The Horcrux Protocol: A Method for Decentralized Biometric-based Self-sovereign Identity

open access: yes, 2017
Most user authentication methods and identity proving systems rely on a centralized database. Such information storage presents a single point of compromise from a security perspective.
Callahan, John, Othman, Asem
core   +1 more source

Home - About - Disclaimer - Privacy