The increasing quest for the minimally processed foods and demand for nearly fresh foods from the consumer segment has paved the way for the emergence of Non thermal processing technologies.A significant development in the food and bioprocessing sector is the evolution of cold plasma processing which is renowned for its preservation efficacy and sh
Selfie use: The implications for psychopathology expression of body dysmorphic disorder
Preoccupation with a body part can lead to indulgence in various forms of coping behavior.Users are frequently using technology as well as selfie to overcome their anxiety to relate to a body ultra glow black soap part as well as get approval from other online users.The present case highlights the excessive use of selfie to manage the distress-rela
Web Quality in Lithuanian Financial Institution: a Comparison with the EU Results
The objective of this paper is to analyse the navigation quality of the websites of Lithuanian banks.Information completeness for investors ensures the correct functioning of capital markets.In banking environments, this goal is reached by increasing the use of the corporate Website.For this reason, to ensure the quality of these online resources i
BPNN and CNN-based AI modeling of spreading and icing pattern of a water droplet impact on a supercooled surface
A water droplet impacting on a supercooled surface normally experiencing spreading and freezing is a complex process involving fluid flow, heat transfer, and phase change.We established two models to, respectively, predict the spreading dynamics of a water droplet impact on a supercooled surface and classify the icing patterns to predict the corres
Blockage detection in networks: The area reconstruction method
In this note we present a reconstructive algorithm for solving the cross-sectional pipe area from boundary bg tuley measurements in a tree network with one inaccessible end.This is equivalent to reconstructing the first order perturbation to a wave equation on a quantum graph from boundary measurements at all network ends except one.The method pres