Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 691
- Biblia 427
- Moral cristiana 281
- Teología dogmática 281
- Derecho canónico 258
- Teología 221
- Obras anteriores a 1800 201
- Iglesia Católica 197
- Documentales 187
- Data processing 165
- obras anteriores a 1800 163
- Sermones 155
- Management 154
- Computer networks 149
- Development 135
- Crítica e interpretación 115
- Tomás de Aquino 112
- Application software 109
- Computer programs 100
- Mathematical models 98
- Design and construction 96
- Engineering & Applied Sciences 95
- Derecho 93
- Derecho civil 91
- Historia eclesiástica 88
- Artificial intelligence 86
- Películas cinematográficas 83
- Security measures 83
- Filosofía 82
- WebSphere 81
-
1501Publicado 2012Tabla de Contenidos: “…3.2.13 Quality Control and Assurance 3.2.14 Maintaining the Case Study Protocol; 3.2.15 Reporting and Disseminating the Case Study; 3.3 Legal, Ethical, and Professional Issues; 3.4 Conclusion; 4 DATA COLLECTION; 4.1 Introduction; 4.2 Different Types of Data Source; 4.2.1 Classification of Data Sources; 4.2.2 Data Source Selection; 4.3 Interviews; 4.3.1 Planning Interviews; 4.3.2 The Interview Session; 4.3.3 Post interview Activities; 4.4 Focus groups; 4.5 Observations; 4.6 Archival Data; 4.7 Metrics; 4.8 Conclusion; 5 DATA ANALYSIS AND INTERPRETATION; 5.1 Introduction…”
Libro electrónico -
1502por Good, Phillip I.Tabla de Contenidos: “…; 4.3.2 The Bias-Corrected and Accelerated Nonparametric Bootstrap; 4.3.3 The Parametric Bootstrap; 4.4 Properties of Independent Observations; 4.5 Summary and Review; Chapter 5: Testing Hypotheses; 5.1 Testing a Hypothesis; 5.1.1 Analyzing the Experiment…”
Publicado 2013
Libro electrónico -
1503Publicado 2012Tabla de Contenidos: “…3.4.1 e-Commerce Systems3.4.2 Industrial Control Systems; 3.4.3 Personal Mobile Devices; 3.5 Security Policy Objectives; 4: Guidance for Decision Makers; 4.1 Tone at the Top; 4.2 Policy as a Project; 4.3 Cyber Security Management; 4.3.1 Arriving at Goals; 4.3.2 Cyber Security Documentation; 4.4 Using the Catalog; 5: The Catalog Approach; 5.1 Catalog Format; 5.2 Cyber Security Policy Taxonomy; 6: Cyber Security Policy Catalog; 6.1 Cyber Governance Issues; 6.1.1 Net Neutrality; 6.1.2 Internet Names and Numbers; 6.1.3 Copyrights and Trademarks; 6.1.4 Email and Messaging; 6.2 Cyber User Issues…”
Libro electrónico -
1504Publicado 2020Tabla de Contenidos: “…Die Radikalisierung und Eskalation der Sicherheitsdebatte, 1567-1589 . 235 -- 4.1 »La ruine d'estat« und der Beginn der Diskursradikalisierung, 1567-1571 235 -- 4.1.1 Meaux als Ergebnis und Katalysator -- kollidierender Sicherheitsnarrative, 1567 237 -- 4.1.2 Sicherheit und Handlungslegitimation, 1567 245 -- 4.1.3 Unsichere Edikte und »places de sûreté« . 258 -- 4.1.4 Die Radikalisierung katholischer Sicherheitsnarrative, 1567-1572 274 -- 4.2 »La ruine d'estat« und die Bartholomäusnacht, 1572-1576 . 285 -- 4.2.1 Versicherheitlichungsprozesse und »première Saint-Barthélemy«, 1572 . 289 -- 4.2.2 Die Bartholomäusnacht als Sicherheitsressource, 1572-1573 299 -- 4.2.3 Die Bartholomäusnacht als Sicherheitsproblem, 1572-1573 314 -- 4.2.4 Katharina von Medici als Sicherheitsproblem, 1573-1575 334 -- 4.2.5 Die Sicherheitsdebatte und die »malcontents«, 1574-1576 351 -- 4.3 »La ruine d'estat« und die Liga, 1576-1589 363 -- 4.3.1 Die Liga von Péronne und die Verargumentierung eines Sicherheitsvakuums, 1576-1577 . 364 -- 4.3.2 Die Liga als Ressource und Problem von Sicherheit, 1584-1588 . 383 -- 4.3.3 Der Höhepunkt der Sicherheitsdebatte, 1588-1589 422 -- 4.4 Zwischenfazit . 462 -- 5. …”
Libro electrónico -
1505Publicado 2014Tabla de Contenidos: “…4.1 The organisation4.1.1 Structure; 4.1.2 Processes; 4.2 Loosely coupled tasks; 4.2.1 Task dependencies; 4.2.2 Events and event patterns; 4.2.3 Support for dynamic modifications; 4.3 Behaviour-based processes; 4.3.1 Organisational behaviour; 4.3.2 Process definitions; 4.4 Two-tier constraints; 4.4.1 The boundary for a safe modification; 4.4.2 The minimal set of constraints; 4.4.3 Benefits of two-tier constraints; 4.5 Behaviour specialisation; 4.5.1 Variations in organisational behaviour; 4.5.2 Specialisation rules; 4.5.3 Support for unforeseen variations; 4.6 Interaction membranes…”
Libro electrónico -
1506Publicado 2015Tabla de Contenidos: “…4.2.4 Late Breakdown Phenomena 4.2.5 Overhead-Line Switching; 4.2.6 Capacitor-Bank Energization; 4.3 Inductive-Load Switching; 4.3.1 Current Chopping; 4.3.2 Implication of Current Chopping; 4.3.3 Inductive-Load Switching Duties; References; 5 Calculation of Switching Transients; 5.1 Analytical Calculation; 5.1.1 Introduction; 5.1.2 Switching LR Circuits; 5.1.3 Switching RLC Circuits; 5.2 Numerical Simulation of Transients; 5.2.1 Historical Overview; 5.2.2 The Electromagnetic Transients Program; 5.2.3 Overview of Electrical Programs for Transient Simulation…”
Libro electrónico -
1507Publicado 2008Tabla de Contenidos: “…Peculiarities of WSNs; 3.4.3. Medium Access Control; 3.4.3.1. Random Access Protocols; 3.4.3.2. …”
Libro electrónico -
1508por Wehling, AnikaTabla de Contenidos: “…Wissenschaftsverständnis und Methode -- 4.1 Wissenschaftsverständnis und soziologisch‐theoretische Voraussetzungen -- 4.1.1 Sozialwissenschaftliche Hermeneutik -- 4.1.2 Symbolischer Interaktionismus -- 4.1.3 Konstruktivistisches Verständnis -- 4.2 Grounded Theory Methodologie -- 4.2.1 Methodische Elemente nach Glaser und Strauss -- 4.2.2 Konstruktive Grounded Theory nach Charmaz -- 4.2.3 Methodisches Vorgehen in der (selbst‐)reflexiven Grounded Theory -- 4.3 Das narrative Interview als Erhebungsverfahren -- 4.3.1 Transkription der Interviews -- 4.3.2 Auswertung der Interviews -- 4.4 Forschungsethische Aspekte -- 4.4.1 Rekrutierung und Sampling -- 4.4.2 Setting der Interviewdurchführung -- 4.4.3 Anonymisierung und Datenschutz -- 4.5 Gütekriterien der qualitativen Studie -- 5. …”
Publicado 2021
Tesis -
1509Publicado 2018Tabla de Contenidos: “…Intro; Half Title; Title Page; Copyright Page; Acknowledgements; Contents; List of figures; List of abbreviations; 1 Introduction; 1.1 Preamble; 1.2 Nanofibres; 1.3 Key concepts in drug delivery; 1.3.1 The therapeutic window and bioavailability; 1.3.2 Modified-release systems; 1.3.3 Dissolution, solubility and permeability; 1.3.4 Physical form; 1.4 Nanofibre characterisation; 1.4.1 Electron microscopy; 1.4.2 X-ray diffraction; 1.4.3 Thermal methods; 1.4.4 Infrared spectroscopy; 1.4.5 Functional performance; 1.4.5.1 Dissolution and permeability testing; 1.4.5.2 API quantification 1.4.6 Stability studies1.5 An overview of contemporary pharmaceutical technology; 1.5.1 Hot melt extrusion; 1.5.2 Spray drying; 1.5.3 Freeze drying; 1.5.4 Nanofibre manufacturing; 1.6 Summary; References; 2 Electrospinning fundamentals; 2.1 Background; 2.2 A brief history of electrospinning; 2.3 EHD fundamentals; 2.4 Understanding the electrospinning process; 2.4.1 Jet initiation; 2.4.2 Electrospinning vs. electrospraying; 2.4.3 Jet elongation: bending and whipping; 2.4.4 Jet solidification; 2.5 The parameters affecting electrospinning; 2.5.1 Solution parameters; 2.5.2 Processing parameters 2.5.3 Environmental parameters2.5.4 Solvent and polymer selection; 2.6 The experimental set-up; 2.6.1 Basics; 2.6.2 The power supply and syringe pump; 2.6.3 The spinneret; 2.6.4 The collector; 2.6.5 Other considerations; 2.6.6 Establishing and troubleshooting an electrospinning process; 2.7 Fibre properties; 2.8 Characterisation; 2.9 Summary; References; 3 Monoaxial electrospinning; 3.1 Introduction; 3.2 Experimental considerations; 3.2.1 Solution parameters; 3.2.2 Processing parameters; 3.2.3 The spinneret; 3.2.4 Polymer choice; 3.2.5 Starting experimental work; 3.3 Fibre properties 3.4 Some typical results3.5 Fast-dissolving drug delivery systems; 3.5.1 Electrospun fast-dissolving drug delivery systems; 3.5.2 Caveats; 3.5.3 Multicomponent formulations; 3.5.4 Stability; 3.6 Extended-release systems; 3.6.1 Applications; 3.6.2 Drawbacks and release mechanisms; 3.7 pH-controlled delivery; 3.7.1 Oral administration; 3.7.2 Anticancer applications; 3.8 Pulsatile release; 3.9 Multilayer materials; 3.10 Thermoresponsive systems; 3.11 Emulsion and suspension electrospinning; 3.11.1 Emulsions; 3.11.2 Suspensions; 3.12 Tissue-engineering applications 3.13 Using fibres as sacrificial templates3.14 Conclusions; References; 4 Coaxial and multi-axial electrospinning; 4.1 Introduction; 4.2 Experimental considerations; 4.2.1 Handling two liquids; 4.2.2 The spinneret and electrodes; 4.2.3 Establishing a coaxial process; 4.3 Extended-release systems; 4.3.1 Preventing burst release; 4.3.2 Biphasic release; 4.4 Targeted drug delivery; 4.5 Multifunctional materials; 4.6 Other applications; 4.7 Protein delivery systems; 4.8 Cell electrospinning; 4.9 Modified coaxial spinning; 4.10 Triaxial and quad-axial systems; 4.11 Conclusions; References…”
Libro electrónico -
1510Publicado 2023Tabla de Contenidos: “…ML-based mechanisms -- 4.3. Anomaly detection approach using machine learning -- 4.3.1. …”
Libro electrónico -
1511Publicado 2023Tabla de Contenidos: “…2.4.2 Kryptowährungen -- 2.4.2.1 Die Geburt von Bitcoin -- 2.4.2.2 Verwendung bei digitaler Erpressung -- 2.4.3 Onion-Routing -- 2.4.3.1 Was ist Onion-Routing und wie funktioniert es? …”
Libro electrónico -
1512por Dargie, WaltenegusTabla de Contenidos: “…4.1.1 Data Types -- 4.1.2 Scheduling -- 4.1.3 Stacks -- 4.1.4 System Calls -- 4.1.5 Handling Interrupts -- 4.1.6 Multithreading -- 4.1.7 Thread-Based vs Event-Based Programming -- 4.1.8 Memory Allocation -- 4.2 Nonfunctional Aspects -- 4.2.1 Separation of Concern -- 4.2.2 System Overhead -- 4.2.3 Portability -- 4.2.4 Dynamic Reprogramming -- 4.3 Prototypes -- 4.3.1 TinyOS -- 4.3.2 SOS -- 4.3.3 Contiki -- 4.3.4 LiteOS -- 4.4 Evaluation -- Exercises -- References -- Part Two: BASIC ARCHITECTURAL FRAMEWORK -- 5 Physical Layer -- 5.1 Basic Components -- 5.2 Source Encoding -- 5.2.1 The Efficiency of a Source Encoder -- 5.2.2 Pulse Code Modulation and Delta Modulation -- 5.3 Channel Encoding -- 5.3.1 Types of Channels -- 5.3.2 Information Transmission over a Channel -- 5.3.3 Error Recognition and Correction -- 5.4 Modulation -- 5.4.1 Modulation Types -- 5.4.2 Quadratic Amplitude Modulation -- 5.4.3 Summary Signal Propagation -- 5.5 Signal Propagation -- Exercises -- References -- 6 Medium Access Control -- 6.1 Overview -- 6.1.1 Contention-Free Medium Access -- 6.1.2 Contention-Based Medium Access -- 6.2 Wireless MAC Protocols -- 6.2.1 Carrier Sense Multiple Access -- 6.2.2 Multiple Access with Collision Avoidance (MACA) and MACAW -- 6.2.3 MACA By Invitation -- 6.2.4 IEEE 802.11 -- 6.2.5 IEEE 802.15.4 and ZigBee -- 6.3 Characteristics of MAC Protocols in Sensor Networks -- 6.3.1 Energy Efficiency -- 6.3.2 Scalability -- 6.3.3 Adaptability -- 6.3.4 Low Latency and Predictability -- 6.3.5 Reliability -- 6.4 Contention-Free MAC Protocols -- 6.4.1 Characteristics -- 6.4.2 Traffic-Adaptive Medium Access -- 6.4.3 Y-MAC -- 6.4.4 DESYNC-TDMA -- 6.4.5 Low-Energy Adaptive Clustering Hierarchy -- 6.4.6 Lightweight Medium Access Control -- 6.5 Contention-Based MAC Protocols -- 6.5.1 Power Aware Multi-Access with Signaling -- 6.5.2 Sensor MAC -- 6.5.3 Timeout MAC…”
Publicado 2010
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1513por Altman, Russ B.Tabla de Contenidos: “…Data -- 4.2. Evaluation -- 4.3. Results -- 4.3.1. Improved Reliability -- 4.3.2. …”
Publicado 2018
Libro electrónico -
1514Publicado 2015Tabla de Contenidos: “…3.3.8 Summary -- 3.4 Ensembles of Nonmaintained Components -- 3.4.1 System Functional Decomposition -- 3.4.2 Some Examples of System and Service Functional Decompositions -- 3.4.3 Reliability Block Diagram -- 3.4.4 Ensembles of Single-Point-of-Failure Units: Series Systems -- 3.4.5 Ensembles Containing Redundant Elements: Parallel Systems -- 3.4.6 Structure Functions -- 3.4.7 Path Set and Cut Set Methods -- 3.4.8 Reliability Importance -- 3.4.9 Non-Service-Affecting Parts -- 3.5 Reliability Modeling Best Practices for Systems Engineers -- 3.6 Chapter Summary -- 3.7 Exercises -- References -- Chapter 4 Reliability Modeling for Systems Engineers: Maintained Systems -- 4.1 What to Expect from this Chapter -- 4.2 Introduction -- 4.3 Reliability Effectiveness Criteria and Figures of Merit for Maintained Systems -- 4.3.1 Introduction -- 4.3.2 System Reliability Process -- 4.3.3 Reliability Effectiveness Criteria and Figures of Merit Connected with the System Reliability Process -- 4.3.4 When is a Maintainable System Not a Maintained System? …”
Libro electrónico -
1515por Kovari, PeterTabla de Contenidos: “…Technical coexistence scenarios -- 4.1 Introduction -- 4.2 Fundamental interaction classifications -- 4.2.1 Stateful synchronous interaction -- 4.2.2 Stateless synchronous interaction -- 4.2.3 Stateless asynchronous interaction -- 4.2.4 Stateful asynchronous interaction -- 4.2.5 RPC interface style -- 4.2.6 Document interface style -- 4.2.7 Argument by value paradigm -- 4.2.8 Argument by reference paradigm -- 4.2.9 Distributed object architecture -- 4.2.10 Message Oriented Architecture -- 4.2.11 Service-oriented architecture -- 4.2.12 Conclusions and recommendations -- 4.3 Layer interaction classifications -- 4.3.1 Interaction case a: client logic to client logic -- 4.3.2 Interaction case b: client logic to presentation logic -- 4.3.3 Interaction case c: client logic to business logic -- 4.3.4 Interaction case d: presentation logic to presentation logic -- 4.3.5 Interaction case e: presentation logic to business logic -- 4.3.6 Interaction case f: business logic to business logic -- 4.3.7 Interaction case g: business logic to resource -- 4.3.8 Interaction case h: resource to resource -- 4.3.9 Conclusion and recommendations -- 4.4 Technical solution mapping -- 4.4.1 Stateful synchronous integration solution candidates -- 4.4.2 Stateless synchronous integration solution candidates -- 4.4.3 Stateful asynchronous integration solution candidates -- 4.4.4 Other potential candidate technical solutions (to be proven) -- 4.4.5 Some last resource integration technologies -- Chapter 5. …”
Publicado 2004
Libro electrónico -
1516por Hayashi, Kumiko, 1958-Tabla de Contenidos: “…CPU analysis and tuning -- 4.1 CPU overview -- 4.1.1 Performance considerations with POWER4-based systems -- 4.1.2 Performance considerations with POWER5-based systems -- 4.2 CPU monitoring -- 4.2.1 The lparstat command -- 4.2.2 The mpstat command -- 4.2.3 The procmon tool -- 4.2.4 The topas command -- 4.2.5 The sar command -- 4.2.6 The iostat command -- 4.2.7 The vmstat command -- 4.2.8 The ps command -- 4.2.9 The trace tool -- 4.2.10 The curt command -- 4.2.11 The splat command -- 4.2.12 The truss command -- 4.2.13 The gprof command -- 4.2.14 The pprof command -- 4.2.15 The prof command -- 4.2.16 The tprof command -- 4.2.17 The time command -- 4.2.18 The timex command -- 4.3 CPU related tuning tools and techniques -- 4.3.1 The smtctl command -- 4.3.2 The bindintcpu command -- 4.3.3 The bindprocessor command -- 4.3.4 The schedo command -- 4.3.5 The nice command -- 4.3.6 The renice command -- 4.4 CPU summary -- 4.4.1 Other useful commands for CPU monitoring -- Chapter 5. …”
Publicado 2005
Libro electrónico -
1517por Seo, Jin KeunTabla de Contenidos: “…Machine generated contents note: Preface List of Abbreviations 1 Introduction 1.1 Forward Problem 1.2 Inverse Problem 1.3 Issues in Inverse Problem Solving 1.4 Linear, Nonlinear and Linearized Problems 2 Signal and System as Vectors 2.1 Vector Space 2.1.1 Vector Space and Subspace 2.1.2 Basis, Norm and Inner Product 2.1.3 Hilbert Space 2.2 Vector Calculus 2.2.1 Gradient 2.2.2 Divergence 2.2.3 Curl 2.2.4 Curve 2.2.5 Curvature 2.3 Taylor's Expansion 2.4 Linear System of Equations 2.4.1 Linear System and Transform 2.4.2 Vector Space of Matrix 2.4.3 Least Square Solution 2.4.4 Singular Value Decomposition (SVD) 2.4.5 Pseudo-inverse 2.5 Fourier Transform 2.5.1 Series Expansion 2.5.2 Fourier Transform 2.5.3 Discrete Fourier Transform (DFT) 2.5.4 Fast Fourier Transform (FFT) 2.5.5 Two-dimensional Fourier Transform References 3 Basics for Forward Problem 3.1 Understanding PDE using Images as Examples 3.2 Heat Equation 3.2.1 Formulation of Heat Equation 3.2.2 One-dimensional Heat Equation 3.2.3 Two-dimensional Heat Equation and Isotropic Diffusion 3.2.4 Boundary Conditions 3.3 Wave Equation 3.4 Laplace and Poisson Equations 3.4.1 Boundary Value Problem 3.4.2 Laplace Equation in a Circle 3.4.3 Laplace Equation in Three-dimensional Domain 3.4.4 Representation Formula for Poisson Equation References 4 Analysis for Inverse Problem 4.1 Examples of Inverse Problems in Medical Imaging 4.1.1 Electrical Property Imaging 4.1.2 Mechanical Property Imaging 4.1.3 Image Restoration 4.2 Basic Analysis 4.2.1 Sobolev Space 4.2.2 Some Important Estimates 4.2.3 Helmholtz Decomposition 4.3 Variational Problems 4.3.1 Lax-Milgram Theorem 4.3.2 Ritz Approach 4.3.3 Euler-Lagrange Equations 4.3.4 Regularity Theory and Asymptotic Analysis 4.4 Tikhonov Regularization and Spectral Analysis 4.4.1 Overview of Tikhonov Regularization 4.4.2 Bounded Linear Operators in Banach Space 4.4.3 Regularization in Hilbert Space or Banach Space 4.5 Basics of Real Analysis 4.5.1 Riemann Integrable 4.5.2 Measure Space 4.5.3 Lebesgue Measurable Function 4.5.4 Pointwise, Uniform, Norm Convergence and Convergence in Measure 4.5.5 Differentiation Theory References 5 Numerical Methods 5.1 Iterative Method for Nonlinear Problem 5.2 Numerical Computation of One-dimensional Heat equation 5.2.1 Explicit Scheme 5.2.2 Implicit Scheme 5.2.3 Crank-Nicolson Method 5.3 Numerical Solution of Linear System of Equations 5.3.1 Direct Method using LU Factorization 5.3.2 Iterative Method using Matrix Splitting 5.3.3 Iterative Method using Steepest Descent Minimization 5.3.4 Conjugate Gradient (CG) Method 5.4 Finite Difference Method (FDM) 5.4.1 Poisson Equation 5.4.2 Elliptic Equation 5.5 Finite Element Method (FEM) 5.5.1 One-dimensional Model 5.5.2 Two-dimensional Model 5.5.3 Numerical Examples References 6 CT, MRI and Image Processing Problems 6.1 X-ray CT 6.1.1 Inverse Problem 6.1.2 Basic Principle and Nonlinear Effects 6.1.3 Inverse Radon Transform 6.1.4 Artifacts in CT 6.2 MRI 6.2.1 Basic Principle 6.2.2 K-space Data 6.2.3 Image Reconstruction 6.3 Image Restoration 6.3.1 Role of p in (6.35) 6.3.2 Total Variation Restoration 6.3.3 Anisotropic Edge-preserving Diffusion 6.3.4 Sparse Sensing 6.4 Segmentation 6.4.1 Active Contour Method 6.4.2 Level Set Method 6.4.3 Motion Tracking for Echocardiography References 7 Electrical Impedance Tomography 7.1 Introduction 7.2 Measurement Method and Data 7.2.1 Conductivity and Resistance 7.2.2 Permittivity and Capacitance 7.2.3 Phasor and Impedance 7.2.4 Admittivity and Trans-impedance 7.2.5 Electrode Contact Impedance 7.2.6 EIT System 7.2.7 Data Collection Protocol and Data Set 7.2.8 Linearity between Current and Voltage 7.3 Representation of Physical Phenomena 7.3.1 Derivation of Elliptic PDE 7.3.2 Elliptic PDE for Four-electrode Method 7.3.3 Elliptic PDE for Two-electrode Method 7.3.4 Min-max Property of Complex Potential 7.4 Forward Problem and Model 7.4.1 Continuous Neumann-to-Dirichlet Data 7.4.2 Discrete Neumann-to-Dirichlet Data 7.4.3 Nonlinearity between Admittivity and Voltage 7.5 Uniqueness Theory and Direct Reconstruction Method 7.5.1 Calderon's Approach 7.5.2 Uniqueness and Three-dimensional Reconstruction: Infinite Measurements 7.5.3 Nachmann's D-bar Method in Two Dimension 7.6 Backprojection Algorithm 7.7 Sensitivity and Sensitivity Matrix 7.7.1 Perturbation and Sensitivity 7.7.2 Sensitivity Matrix 7.7.3 Linearization 7.7.4 Quality of Sensitivity Matrix 7.8 Inverse Problem of EIT 7.8.1 Inverse Problem of RC Circuit 7.8.2 Formulation of EIT Inverse Problem 7.8.3 Ill-posedness of EIT Inverse Problem 7.9 Static Imaging 7.9.1 Iterative Data Fitting Method 7.9.2 Static Imaging using 4-channel EIT System 7.9.3 Regularization 7.9.4 Technical Difficulty of Static Imaging 7.10 Time-difference Imaging 7.10.1 Data Sets for Time-difference Imaging 7.10.2 Equivalent Homogeneous Admittivity 7.10.3 Linear Time-difference Algorithm using Sensitivity Matrix 7.10.4 Interpretation of Time-difference Image 7.11 Frequency-difference Imaging 7.11.1 Data Sets for Frequency-difference Imaging 7.11.2 Simple Difference Ft,ω2− Ft,ω1 7.11.3 Weighted Difference Ft,ω2− [alpha] Ft,ω1 7.11.4 Linear Frequency-difference Algorithm using Sensitivity Matrix 7.11.5 Interpretation of Frequency-difference Image References 8 Anomaly Estimation and Layer Potential Techniques 8.1 Harmonic Analysis and Potential Theory 8.1.1 Layer Potentials and Boundary Value Problems for Laplace Equation 8.1.2 Regularity for Solution of Elliptic Equation along Boundary of Inhomogeneity 8.2 Anomaly Estimation using EIT 8.2.1 Size Estimation Method 8.2.2 Location Search Method 8.3 Anomaly Estimation using Planar Probe 8.3.1 Mathematical Formulation 8.3.2 Representation Formula References 9 Magnetic Resonance Electrical Impedance Tomography 9.1 Data Collection using MRI 9.1.1 Measurement of Bz 9.1.2 Noise in Measured Bz Data 9.1.3 Measurement of B = (Bx,By,Bz) 9.2 Forward Problem and Model Construction 9.2.1 Relation between J , Bz and σ 9.2.2 Three Key Observations 9.2.3 Data Bz Traces σ∇u © e z-directional Change of σ 9.2.4 Mathematical Analysis toward MREIT Model 9.3 Inverse Problem Formulation using B or J 9.4 Inverse Problem Formulation using Bz 9.4.1 Model with Two Linearly Independent Currents 9.4.2 Uniqueness 9.4.3 Defected Bz Data in a Local Region 9.5 Image Reconstruction Algorithm 9.5.1 J-substitution Algorithm 9.5.2 Harmonic Bz Algorithm 9.5.3 Gradient Bz Decomposition and Variational Bz Algorithm 9.5.4 Local Harmonic Bz Algorithm 9.5.5 Sensitivity Matrix Based Algorithm 9.5.6 Anisotropic Conductivity Reconstruction Algorithm 9.5.7 Other Algorithms 9.6 Validation and Interpretation 9.6.1 Image Reconstruction Procedure using Harmonic Bz Algorithm 9.6.2 Conductivity Phantom Imaging 9.6.3 Animal Imaging 9.6.4 Human Imaging 9.7 Applications References 10 Magnetic Resonance Elastography 10.1 Representation of Physical Phenomena 10.1.1 Overview of Hooke's Law 10.1.2 Strain Tensor in Lagrangian Coordinates 10.2 Forward Problem and Model 10.3 Inverse Problem in MRE 10.4 Reconstruction Algorithms 10.4.1 Reconstruction of [mu] with the Assumption of Local Homogeneity 10.4.2 Reconstruction of [mu] without the Assumption of Local Homogeneity 10.4.3 Anisotropic Elastic Moduli Reconstruction 10.5 Technical Issues in MRE References…”
Publicado 2013
Libro electrónico -
1518por Geelhoed, FioreTabla de Contenidos: “…; 3.4.1 Significant Others; 3.4.2 Gradations of Identity Crisis and (Radical) Conversion; 3.4.3 The Nature of the Crisis: Identity Strain; 3.5 Summary; 4 AN ORTHODOX FOCUS ON POSITIVE SELF-IDENTIFICATION; 4.1 Identity, Identification and Difference; 4.2 Fundamentalist Meaning Systems as a Source of Secure Identities; 4.2.2 The Security of Relying on a Higher Power; 4.3 The Security of Fundamentalist Boundaries in Everyday Life…”
Publicado 2014
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
1519por Moral Pérez, María Esther delTabla de Contenidos: “…Desarrollo de competencias genéricas; 4.3. Evaluación de las asignaturas MATRIX: Análisis DAFO; 4.3.1. …”
Publicado 2010
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1520por Avilés Hernández, ManuelaTabla de Contenidos: “…RELACIONES ENTRE EL NÚCLEO MONOPARENTAL (...); 4.3. RELACIONES CON OTROS FAMILIARES; 4.3.1. RELACIONES CON LA MADRE; 4.3.2. …”
Publicado 2015
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico