Additional examples are adjusted to the entries in an automated way - we cannot guarantee that they are correct.
A polygraphic test could be viewed as a working memory task.
From the Polygraphic studies, it appears that the hill might have been known as senagiri.
It also issued catalogues of the reproduction paintings available in "polygraphic" form.
Polygraphic systems do provide a significant improvement in security over monoalphabetic substitutions.
The polygraphic consonant signs are treated as single letters.
The initial name for the polygraphic works was "pollaplasiasmos" (sometimes spelled "polyplasiasmos").
Part of the edition is a true polygraphic artwork produced with a natural leather binding, hand-made according to a 19th century technique.
After each of the training sessions, the rat would be placed in a recording cage for six hours of polygraphic recordings.
(08) Collected and polygraphic works.
Axali Epocha was outstanding not only by its Journalistic position, but also by its polygraphic standards.
A polygraphic substitution is a cipher in which a uniform substitution is performed on blocks of letters.
In classical cryptography, the Hill cipher is a polygraphic substitution cipher based on linear algebra.
Other practical "pencil-and-paper" polygraphic ciphers include:
I was aware of the controversial nature of polygraphic results, and so determined to add a test of Mr. Laurendi's effectiveness to the process.
In a polygraphic substitution cipher, plaintext letters are substituted in larger groups, instead of substituting letters individually.
During standard sleep laboratory measurements, the states of sleep and waking have behavioral, polygraphic, and psychological manifestation within the pontine brainstem.
From his opened briefcase he fished out the Voigt-Kampff apparatus, seated himself at a nearby rosewood coffee table, and began to assemble the rather simple polygraphic instruments.
Polygraphic 'stress- meters' camouflaged as transistor radios that promised to unscramble and digitalize the double and multiple meanings in other people's communications'.
From the given information, the side length and the number of sides, the Polygraphic lines yield the radius of the circle that will contain the required regular polygon.
The technique encrypts pairs of letters (digraphs), and thus falls into a category of ciphers known as polygraphic substitution ciphers.
After this polygraphic formation period, Tetens goes back to more fundamental enquiries: after having read David Hume's work, he popularized it throughout the German-speaking world.
The Hill cipher, invented in 1929 by Lester S. Hill, is a polygraphic substitution which can combine much larger groups of letters simultaneously using linear algebra.
"I would like you to submit to a polygraphic reading of your statements; in other words, sir, a measuring by an independent percept system of the veracity of your answers.
If the cipher operates on single letters, it is termed a simple substitution cipher; a cipher that operates on larger groups of letters is termed polygraphic.
Invented by Lester S. Hill in 1929, it was the first polygraphic cipher in which it was practical (though barely) to operate on more than three symbols at once.