Showing 1 - 16 results of 16 for search '"\"((\\"interaction manipulation (model\" OR more\\")) OR (\\"interaction manipulation made\\"))\""', query time: 0.08s Refine Results
  1. 1
  2. 2
  3. 3

    The interactive alphabet with augmented reality as a form of involving children in educational process by Vladimir D. Sekerin, Anna E. Gorokhova, Anatoliy A. Scherbakov, Evgeniy V. Yurkevich

    Published 2017-11-01
    “…The advantages of the Interactive alphabet on the basis of the augmented reality technology are as follows: 1) security of strong emotional responses; 2) the involvement and interactivity promoting steady memorizing; 3) possibilities of interaction with the artificial world by means of gadgets; 4) Digital and offline communication; 5) possibility of carrying out virtual lessons. …”
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Choreographed Soft Morphologies: exploring new ways of ideating soft architecture through material elasticity by Marina Castán, Daniel Suárez

    Published 2018-10-01
    “…The interface acts as a deformable space that can be shaped by the body, producing a collection of form expressions, ranging from subtle surface modifications to more prominent deformations. Such form-giving processes were captured in real time by three Kinect sensors, offering a distinct digital raw material that can be conveniently manipulated and translated into architectural simulations, validating the method as a new way to inform soft architectural design processes. …”
    Get full text
    Article
  7. 7

    AI-based defect detection and self-healing in metal additive manufacturing by Jan Akmal, Kevin Minet-Lallemand, Jukka Kuva, Tatu Syvänen, Pilvi Ylander, Tuomas Puttonen, Roy Björkstrand, Jouni Partanen, Olli Nyrhilä, Mika Salmi

    Published 2025-12-01
    “…In situ optical tomography was used to capture infrared images containing heat signatures of the hot laser interaction zone. Depicting natural process variation, defective regions were seeded using process manipulation (up to ±30%) in proximity of the experimental standard volumetric energy density (VED). …”
    Get full text
    Article
  8. 8

    An approach for classifying sociotechnical attacks by Oleksandr Korchenko, Anna Korchenko, Serhii Zybin, Kyrylo Davydenko

    Published 2025-05-01
    “…Based on the proposed model and the analyzed literature, a generalized set of features, criteria, and sub-criteria has been formed, such as: time aspect, industry affiliation, interaction with security policy, remoteness, initialization, tools, manipulation, violation of characteristics, relational signs, severity level, type of attacked source, type of access, type of appeal, type of sociotechnical technique, and scale, which allows us to select and develop appropriate means of countering sociotechnical attacks from a systemic perspective. …”
    Get full text
    Article
  9. 9

    Individual differences in associative/semantic priming: Spreading of activation in semantic memory and epistemically unwarranted beliefs. by Daniel Huete-Pérez, Robert Davies, Javier Rodríguez-Ferreiro, Pilar Ferré

    Published 2025-01-01
    “…Bayesian linear mixed-effects models over response times (RTs) revealed a main direct priming effect (faster RTs in related pairs than in unrelated ones), a main facilitatory effect for some EUB scores (i.e., the higher the value for EUB score, the faster RTs), and an interactive effect between the experimental manipulation and some EUB scores (the higher the EUB score, the smaller the direct priming effect). …”
    Get full text
    Article
  10. 10

    La vida social de los precios: evaluaciones monetarias y acción económica en los mercados de la seguridad privada = The social life of prices: monetary assessments and economic act... by Valcarce, Federico Lorenc

    Published 2010-01-01
    “…Based on a study of private security markets in Argentina, this paper discusses the way in which prices are produced, perceived, interpreted and manipulated in the course of economic actions of various actors. …”
    Get full text
    Article
  11. 11

    Identification of QTLs Conferring Agronomic and Quality Traits in Hexaploid Wheat by Jun MA, Cai-ying ZHANG, Gui-jun YAN, Chun-ji LIU

    Published 2012-09-01
    “…In this study, genetic analysis of a novel resource, Triticum spelta line CSCR6, from Australia was made by use of a recombination inbred line (RIL) population of 82 individuals from the cross between CSCR6 and another Australian hexaploid wheat cultivar, Lang. …”
    Get full text
    Article
  12. 12

    Learned saccade readiness varies with fluctuations in sustained attention by Anthony W. Sali, Madison P. Shaver, Anna B. Toledo, Austin L. Torain, Isabel N. Flicker

    Published 2025-08-01
    “…Abstract Both the focus of sustained attention and an individual’s readiness to shift attention among spatial locations fluctuate over time. However, the interaction of these ongoing changes in attentional states remains unknown. …”
    Get full text
    Article
  13. 13

    Correlation of neuropsychological indicators of child development with speech: Empirical research underpinning the National Children’s Health Prevention Programme by Otašević Jadranka, Vukašinović-Radojičić Zorica, Otašević Božidar

    Published 2022-01-01
    “…The sample included 60 children from Belgrade of both sexes, aged between 5.5 and 7 years. Of these, 30 made up the experimental group – children with deviations in speech development (articulation disorders), and 30 made up the control group – typically developing children from the general population. …”
    Get full text
    Article
  14. 14

    Protokół wojny jako element protokolaryzacji bezpieczeństwa by Artur Gruszczak

    Published 2024-12-01
    “… WAR PROTOCOL AS AN ELEMENT OF SECURITY PROTOCOLARIZATION: THE CASE OF THE RUSSIAN MILITARY AGGRESSION AGAINST UKRAINE War protocol is a variant of security protocol: an innovative epistemological tool used to explain the complexity of social relations and the subjective-structural dependencies generated by interactions between social actors. It is particularly useful in security studies due to the value of heuristic explanation of decisions made in the face of an increasing threat or a sudden crisis. …”
    Get full text
    Article
  15. 15

    Prolonged contact with dendritic cells turns lymph node‐resident NK cells into anti‐tumor effectors by Francesca Mingozzi, Roberto Spreafico, Tatiana Gorletta, Clara Cigni, Marco Di Gioia, Michele Caccia, Laura Sironi, Maddalena Collini, Matias Soncini, Michela Rusconi, Ulrich H von Andrian, Giuseppe Chirico, Ivan Zanoni, Francesca Granucci

    Published 2016-07-01
    “…The outcome of anti‐tumor vaccination protocols depends on the efficiency of NK‐cell activation, and efforts are constantly made to manipulate them for immunotherapeutic approaches. …”
    Get full text
    Article
  16. 16

    Validación de parrilla de contenidos y desarrollo de plataforma digital de libros ilustrados de no ficción / Content grid validation and digital platform development for non-ficti... by Manuel Francisco Romero Oliva, Hugo Heredia Ponce, Ester Trigo Ibáñez, Carmen Romero Claudio

    Published 2021-10-01
    “…To validate the instrument, we have relied on the criteria of experts in the field who have contributed their critical vision, which, together with the statistical validation process, has made possible to configure a reliable instrument that can be extrapolated to other research contexts.…”
    Get full text
    Article