Mostrando 1,501 - 1,520 Resultados de 21,342 Para Buscar '"4:3"', tiempo de consulta: 0.71s Limitar resultados
  1. 1501
    Publicado 2012
    Tabla de Contenidos: “…3.2.13 Quality Control and Assurance 3.2.14 Maintaining the Case Study Protocol; 3.2.15 Reporting and Disseminating the Case Study; 3.3 Legal, Ethical, and Professional Issues; 3.4 Conclusion; 4 DATA COLLECTION; 4.1 Introduction; 4.2 Different Types of Data Source; 4.2.1 Classification of Data Sources; 4.2.2 Data Source Selection; 4.3 Interviews; 4.3.1 Planning Interviews; 4.3.2 The Interview Session; 4.3.3 Post interview Activities; 4.4 Focus groups; 4.5 Observations; 4.6 Archival Data; 4.7 Metrics; 4.8 Conclusion; 5 DATA ANALYSIS AND INTERPRETATION; 5.1 Introduction…”
    Libro electrónico
  2. 1502
    por Good, Phillip I.
    Publicado 2013
    Tabla de Contenidos: “…; 4.3.2 The Bias-Corrected and Accelerated Nonparametric Bootstrap; 4.3.3 The Parametric Bootstrap; 4.4 Properties of Independent Observations; 4.5 Summary and Review; Chapter 5: Testing Hypotheses; 5.1 Testing a Hypothesis; 5.1.1 Analyzing the Experiment…”
    Libro electrónico
  3. 1503
    Publicado 2012
    Tabla de Contenidos: “…3.4.1 e-Commerce Systems3.4.2 Industrial Control Systems; 3.4.3 Personal Mobile Devices; 3.5 Security Policy Objectives; 4: Guidance for Decision Makers; 4.1 Tone at the Top; 4.2 Policy as a Project; 4.3 Cyber Security Management; 4.3.1 Arriving at Goals; 4.3.2 Cyber Security Documentation; 4.4 Using the Catalog; 5: The Catalog Approach; 5.1 Catalog Format; 5.2 Cyber Security Policy Taxonomy; 6: Cyber Security Policy Catalog; 6.1 Cyber Governance Issues; 6.1.1 Net Neutrality; 6.1.2 Internet Names and Numbers; 6.1.3 Copyrights and Trademarks; 6.1.4 Email and Messaging; 6.2 Cyber User Issues…”
    Libro electrónico
  4. 1504
    Publicado 2020
    Tabla de Contenidos: “…Die Radikalisierung und Eskalation der Sicherheitsdebatte, 1567-1589 . 235 -- 4.1 »La ruine d'estat« und der Beginn der Diskursradikalisierung, 1567-1571 235 -- 4.1.1 Meaux als Ergebnis und Katalysator -- kollidierender Sicherheitsnarrative, 1567 237 -- 4.1.2 Sicherheit und Handlungslegitimation, 1567 245 -- 4.1.3 Unsichere Edikte und »places de sûreté« . 258 -- 4.1.4 Die Radikalisierung katholischer Sicherheitsnarrative, 1567-1572 274 -- 4.2 »La ruine d'estat« und die Bartholomäusnacht, 1572-1576 . 285 -- 4.2.1 Versicherheitlichungsprozesse und »première Saint-Barthélemy«, 1572 . 289 -- 4.2.2 Die Bartholomäusnacht als Sicherheitsressource, 1572-1573 299 -- 4.2.3 Die Bartholomäusnacht als Sicherheitsproblem, 1572-1573 314 -- 4.2.4 Katharina von Medici als Sicherheitsproblem, 1573-1575 334 -- 4.2.5 Die Sicherheitsdebatte und die »malcontents«, 1574-1576 351 -- 4.3 »La ruine d'estat« und die Liga, 1576-1589 363 -- 4.3.1 Die Liga von Péronne und die Verargumentierung eines Sicherheitsvakuums, 1576-1577 . 364 -- 4.3.2 Die Liga als Ressource und Problem von Sicherheit, 1584-1588 . 383 -- 4.3.3 Der Höhepunkt der Sicherheitsdebatte, 1588-1589 422 -- 4.4 Zwischenfazit . 462 -- 5. …”
    Libro electrónico
  5. 1505
    Publicado 2014
    Tabla de Contenidos: “…4.1 The organisation4.1.1 Structure; 4.1.2 Processes; 4.2 Loosely coupled tasks; 4.2.1 Task dependencies; 4.2.2 Events and event patterns; 4.2.3 Support for dynamic modifications; 4.3 Behaviour-based processes; 4.3.1 Organisational behaviour; 4.3.2 Process definitions; 4.4 Two-tier constraints; 4.4.1 The boundary for a safe modification; 4.4.2 The minimal set of constraints; 4.4.3 Benefits of two-tier constraints; 4.5 Behaviour specialisation; 4.5.1 Variations in organisational behaviour; 4.5.2 Specialisation rules; 4.5.3 Support for unforeseen variations; 4.6 Interaction membranes…”
    Libro electrónico
  6. 1506
    Publicado 2015
    Tabla de Contenidos: “…4.2.4 Late Breakdown Phenomena 4.2.5 Overhead-Line Switching; 4.2.6 Capacitor-Bank Energization; 4.3 Inductive-Load Switching; 4.3.1 Current Chopping; 4.3.2 Implication of Current Chopping; 4.3.3 Inductive-Load Switching Duties; References; 5 Calculation of Switching Transients; 5.1 Analytical Calculation; 5.1.1 Introduction; 5.1.2 Switching LR Circuits; 5.1.3 Switching RLC Circuits; 5.2 Numerical Simulation of Transients; 5.2.1 Historical Overview; 5.2.2 The Electromagnetic Transients Program; 5.2.3 Overview of Electrical Programs for Transient Simulation…”
    Libro electrónico
  7. 1507
    Publicado 2008
    Tabla de Contenidos: “…Peculiarities of WSNs; 3.4.3. Medium Access Control; 3.4.3.1. Random Access Protocols; 3.4.3.2. …”
    Libro electrónico
  8. 1508
    por Wehling, Anika
    Publicado 2021
    Tabla de Contenidos: “…Wissenschaftsverständnis und Methode -- 4.1 Wissenschaftsverständnis und soziologisch‐theoretische Voraussetzungen -- 4.1.1 Sozialwissenschaftliche Hermeneutik -- 4.1.2 Symbolischer Interaktionismus -- 4.1.3 Konstruktivistisches Verständnis -- 4.2 Grounded Theory Methodologie -- 4.2.1 Methodische Elemente nach Glaser und Strauss -- 4.2.2 Konstruktive Grounded Theory nach Charmaz -- 4.2.3 Methodisches Vorgehen in der (selbst‐)reflexiven Grounded Theory -- 4.3 Das narrative Interview als Erhebungsverfahren -- 4.3.1 Transkription der Interviews -- 4.3.2 Auswertung der Interviews -- 4.4 Forschungsethische Aspekte -- 4.4.1 Rekrutierung und Sampling -- 4.4.2 Setting der Interviewdurchführung -- 4.4.3 Anonymisierung und Datenschutz -- 4.5 Gütekriterien der qualitativen Studie -- 5. …”
    Tesis
  9. 1509
    Publicado 2018
    Tabla de Contenidos: “…Intro; Half Title; Title Page; Copyright Page; Acknowledgements; Contents; List of figures; List of abbreviations; 1 Introduction; 1.1 Preamble; 1.2 Nanofibres; 1.3 Key concepts in drug delivery; 1.3.1 The therapeutic window and bioavailability; 1.3.2 Modified-release systems; 1.3.3 Dissolution, solubility and permeability; 1.3.4 Physical form; 1.4 Nanofibre characterisation; 1.4.1 Electron microscopy; 1.4.2 X-ray diffraction; 1.4.3 Thermal methods; 1.4.4 Infrared spectroscopy; 1.4.5 Functional performance; 1.4.5.1 Dissolution and permeability testing; 1.4.5.2 API quantification 1.4.6 Stability studies1.5 An overview of contemporary pharmaceutical technology; 1.5.1 Hot melt extrusion; 1.5.2 Spray drying; 1.5.3 Freeze drying; 1.5.4 Nanofibre manufacturing; 1.6 Summary; References; 2 Electrospinning fundamentals; 2.1 Background; 2.2 A brief history of electrospinning; 2.3 EHD fundamentals; 2.4 Understanding the electrospinning process; 2.4.1 Jet initiation; 2.4.2 Electrospinning vs. electrospraying; 2.4.3 Jet elongation: bending and whipping; 2.4.4 Jet solidification; 2.5 The parameters affecting electrospinning; 2.5.1 Solution parameters; 2.5.2 Processing parameters 2.5.3 Environmental parameters2.5.4 Solvent and polymer selection; 2.6 The experimental set-up; 2.6.1 Basics; 2.6.2 The power supply and syringe pump; 2.6.3 The spinneret; 2.6.4 The collector; 2.6.5 Other considerations; 2.6.6 Establishing and troubleshooting an electrospinning process; 2.7 Fibre properties; 2.8 Characterisation; 2.9 Summary; References; 3 Monoaxial electrospinning; 3.1 Introduction; 3.2 Experimental considerations; 3.2.1 Solution parameters; 3.2.2 Processing parameters; 3.2.3 The spinneret; 3.2.4 Polymer choice; 3.2.5 Starting experimental work; 3.3 Fibre properties 3.4 Some typical results3.5 Fast-dissolving drug delivery systems; 3.5.1 Electrospun fast-dissolving drug delivery systems; 3.5.2 Caveats; 3.5.3 Multicomponent formulations; 3.5.4 Stability; 3.6 Extended-release systems; 3.6.1 Applications; 3.6.2 Drawbacks and release mechanisms; 3.7 pH-controlled delivery; 3.7.1 Oral administration; 3.7.2 Anticancer applications; 3.8 Pulsatile release; 3.9 Multilayer materials; 3.10 Thermoresponsive systems; 3.11 Emulsion and suspension electrospinning; 3.11.1 Emulsions; 3.11.2 Suspensions; 3.12 Tissue-engineering applications 3.13 Using fibres as sacrificial templates3.14 Conclusions; References; 4 Coaxial and multi-axial electrospinning; 4.1 Introduction; 4.2 Experimental considerations; 4.2.1 Handling two liquids; 4.2.2 The spinneret and electrodes; 4.2.3 Establishing a coaxial process; 4.3 Extended-release systems; 4.3.1 Preventing burst release; 4.3.2 Biphasic release; 4.4 Targeted drug delivery; 4.5 Multifunctional materials; 4.6 Other applications; 4.7 Protein delivery systems; 4.8 Cell electrospinning; 4.9 Modified coaxial spinning; 4.10 Triaxial and quad-axial systems; 4.11 Conclusions; References…”
    Libro electrónico
  10. 1510
    Publicado 2023
    Tabla de Contenidos: “…ML-based mechanisms -- 4.3. Anomaly detection approach using machine learning -- 4.3.1. …”
    Libro electrónico
  11. 1511
    Publicado 2023
    Tabla de Contenidos: “…2.4.2 Kryptowährungen -- 2.4.2.1 Die Geburt von Bitcoin -- 2.4.2.2 Verwendung bei digitaler Erpressung -- 2.4.3 Onion-Routing -- 2.4.3.1 Was ist Onion-Routing und wie funktioniert es? …”
    Libro electrónico
  12. 1512
    por Dargie, Waltenegus
    Publicado 2010
    Tabla de Contenidos: “…4.1.1 Data Types -- 4.1.2 Scheduling -- 4.1.3 Stacks -- 4.1.4 System Calls -- 4.1.5 Handling Interrupts -- 4.1.6 Multithreading -- 4.1.7 Thread-Based vs Event-Based Programming -- 4.1.8 Memory Allocation -- 4.2 Nonfunctional Aspects -- 4.2.1 Separation of Concern -- 4.2.2 System Overhead -- 4.2.3 Portability -- 4.2.4 Dynamic Reprogramming -- 4.3 Prototypes -- 4.3.1 TinyOS -- 4.3.2 SOS -- 4.3.3 Contiki -- 4.3.4 LiteOS -- 4.4 Evaluation -- Exercises -- References -- Part Two: BASIC ARCHITECTURAL FRAMEWORK -- 5 Physical Layer -- 5.1 Basic Components -- 5.2 Source Encoding -- 5.2.1 The Efficiency of a Source Encoder -- 5.2.2 Pulse Code Modulation and Delta Modulation -- 5.3 Channel Encoding -- 5.3.1 Types of Channels -- 5.3.2 Information Transmission over a Channel -- 5.3.3 Error Recognition and Correction -- 5.4 Modulation -- 5.4.1 Modulation Types -- 5.4.2 Quadratic Amplitude Modulation -- 5.4.3 Summary Signal Propagation -- 5.5 Signal Propagation -- Exercises -- References -- 6 Medium Access Control -- 6.1 Overview -- 6.1.1 Contention-Free Medium Access -- 6.1.2 Contention-Based Medium Access -- 6.2 Wireless MAC Protocols -- 6.2.1 Carrier Sense Multiple Access -- 6.2.2 Multiple Access with Collision Avoidance (MACA) and MACAW -- 6.2.3 MACA By Invitation -- 6.2.4 IEEE 802.11 -- 6.2.5 IEEE 802.15.4 and ZigBee -- 6.3 Characteristics of MAC Protocols in Sensor Networks -- 6.3.1 Energy Efficiency -- 6.3.2 Scalability -- 6.3.3 Adaptability -- 6.3.4 Low Latency and Predictability -- 6.3.5 Reliability -- 6.4 Contention-Free MAC Protocols -- 6.4.1 Characteristics -- 6.4.2 Traffic-Adaptive Medium Access -- 6.4.3 Y-MAC -- 6.4.4 DESYNC-TDMA -- 6.4.5 Low-Energy Adaptive Clustering Hierarchy -- 6.4.6 Lightweight Medium Access Control -- 6.5 Contention-Based MAC Protocols -- 6.5.1 Power Aware Multi-Access with Signaling -- 6.5.2 Sensor MAC -- 6.5.3 Timeout MAC…”
    Libro electrónico
  13. 1513
    por Altman, Russ B.
    Publicado 2018
    Tabla de Contenidos: “…Data -- 4.2. Evaluation -- 4.3. Results -- 4.3.1. Improved Reliability -- 4.3.2. …”
    Libro electrónico
  14. 1514
    Publicado 2015
    Tabla de Contenidos: “…3.3.8 Summary -- 3.4 Ensembles of Nonmaintained Components -- 3.4.1 System Functional Decomposition -- 3.4.2 Some Examples of System and Service Functional Decompositions -- 3.4.3 Reliability Block Diagram -- 3.4.4 Ensembles of Single-Point-of-Failure Units: Series Systems -- 3.4.5 Ensembles Containing Redundant Elements: Parallel Systems -- 3.4.6 Structure Functions -- 3.4.7 Path Set and Cut Set Methods -- 3.4.8 Reliability Importance -- 3.4.9 Non-Service-Affecting Parts -- 3.5 Reliability Modeling Best Practices for Systems Engineers -- 3.6 Chapter Summary -- 3.7 Exercises -- References -- Chapter 4 Reliability Modeling for Systems Engineers: Maintained Systems -- 4.1 What to Expect from this Chapter -- 4.2 Introduction -- 4.3 Reliability Effectiveness Criteria and Figures of Merit for Maintained Systems -- 4.3.1 Introduction -- 4.3.2 System Reliability Process -- 4.3.3 Reliability Effectiveness Criteria and Figures of Merit Connected with the System Reliability Process -- 4.3.4 When is a Maintainable System Not a Maintained System? …”
    Libro electrónico
  15. 1515
    por Kovari, Peter
    Publicado 2004
    Tabla de Contenidos: “…Technical coexistence scenarios -- 4.1 Introduction -- 4.2 Fundamental interaction classifications -- 4.2.1 Stateful synchronous interaction -- 4.2.2 Stateless synchronous interaction -- 4.2.3 Stateless asynchronous interaction -- 4.2.4 Stateful asynchronous interaction -- 4.2.5 RPC interface style -- 4.2.6 Document interface style -- 4.2.7 Argument by value paradigm -- 4.2.8 Argument by reference paradigm -- 4.2.9 Distributed object architecture -- 4.2.10 Message Oriented Architecture -- 4.2.11 Service-oriented architecture -- 4.2.12 Conclusions and recommendations -- 4.3 Layer interaction classifications -- 4.3.1 Interaction case a: client logic to client logic -- 4.3.2 Interaction case b: client logic to presentation logic -- 4.3.3 Interaction case c: client logic to business logic -- 4.3.4 Interaction case d: presentation logic to presentation logic -- 4.3.5 Interaction case e: presentation logic to business logic -- 4.3.6 Interaction case f: business logic to business logic -- 4.3.7 Interaction case g: business logic to resource -- 4.3.8 Interaction case h: resource to resource -- 4.3.9 Conclusion and recommendations -- 4.4 Technical solution mapping -- 4.4.1 Stateful synchronous integration solution candidates -- 4.4.2 Stateless synchronous integration solution candidates -- 4.4.3 Stateful asynchronous integration solution candidates -- 4.4.4 Other potential candidate technical solutions (to be proven) -- 4.4.5 Some last resource integration technologies -- Chapter 5. …”
    Libro electrónico
  16. 1516
    por Hayashi, Kumiko, 1958-
    Publicado 2005
    Tabla de Contenidos: “…CPU analysis and tuning -- 4.1 CPU overview -- 4.1.1 Performance considerations with POWER4-based systems -- 4.1.2 Performance considerations with POWER5-based systems -- 4.2 CPU monitoring -- 4.2.1 The lparstat command -- 4.2.2 The mpstat command -- 4.2.3 The procmon tool -- 4.2.4 The topas command -- 4.2.5 The sar command -- 4.2.6 The iostat command -- 4.2.7 The vmstat command -- 4.2.8 The ps command -- 4.2.9 The trace tool -- 4.2.10 The curt command -- 4.2.11 The splat command -- 4.2.12 The truss command -- 4.2.13 The gprof command -- 4.2.14 The pprof command -- 4.2.15 The prof command -- 4.2.16 The tprof command -- 4.2.17 The time command -- 4.2.18 The timex command -- 4.3 CPU related tuning tools and techniques -- 4.3.1 The smtctl command -- 4.3.2 The bindintcpu command -- 4.3.3 The bindprocessor command -- 4.3.4 The schedo command -- 4.3.5 The nice command -- 4.3.6 The renice command -- 4.4 CPU summary -- 4.4.1 Other useful commands for CPU monitoring -- Chapter 5. …”
    Libro electrónico
  17. 1517
    por Seo, Jin Keun
    Publicado 2013
    Tabla de Contenidos: “…Machine generated contents note: Preface List of Abbreviations 1 Introduction 1.1 Forward Problem 1.2 Inverse Problem 1.3 Issues in Inverse Problem Solving 1.4 Linear, Nonlinear and Linearized Problems 2 Signal and System as Vectors 2.1 Vector Space 2.1.1 Vector Space and Subspace 2.1.2 Basis, Norm and Inner Product 2.1.3 Hilbert Space 2.2 Vector Calculus 2.2.1 Gradient 2.2.2 Divergence 2.2.3 Curl 2.2.4 Curve 2.2.5 Curvature 2.3 Taylor's Expansion 2.4 Linear System of Equations 2.4.1 Linear System and Transform 2.4.2 Vector Space of Matrix 2.4.3 Least Square Solution 2.4.4 Singular Value Decomposition (SVD) 2.4.5 Pseudo-inverse 2.5 Fourier Transform 2.5.1 Series Expansion 2.5.2 Fourier Transform 2.5.3 Discrete Fourier Transform (DFT) 2.5.4 Fast Fourier Transform (FFT) 2.5.5 Two-dimensional Fourier Transform References 3 Basics for Forward Problem 3.1 Understanding PDE using Images as Examples 3.2 Heat Equation 3.2.1 Formulation of Heat Equation 3.2.2 One-dimensional Heat Equation 3.2.3 Two-dimensional Heat Equation and Isotropic Diffusion 3.2.4 Boundary Conditions 3.3 Wave Equation 3.4 Laplace and Poisson Equations 3.4.1 Boundary Value Problem 3.4.2 Laplace Equation in a Circle 3.4.3 Laplace Equation in Three-dimensional Domain 3.4.4 Representation Formula for Poisson Equation References 4 Analysis for Inverse Problem 4.1 Examples of Inverse Problems in Medical Imaging 4.1.1 Electrical Property Imaging 4.1.2 Mechanical Property Imaging 4.1.3 Image Restoration 4.2 Basic Analysis 4.2.1 Sobolev Space 4.2.2 Some Important Estimates 4.2.3 Helmholtz Decomposition 4.3 Variational Problems 4.3.1 Lax-Milgram Theorem 4.3.2 Ritz Approach 4.3.3 Euler-Lagrange Equations 4.3.4 Regularity Theory and Asymptotic Analysis 4.4 Tikhonov Regularization and Spectral Analysis 4.4.1 Overview of Tikhonov Regularization 4.4.2 Bounded Linear Operators in Banach Space 4.4.3 Regularization in Hilbert Space or Banach Space 4.5 Basics of Real Analysis 4.5.1 Riemann Integrable 4.5.2 Measure Space 4.5.3 Lebesgue Measurable Function 4.5.4 Pointwise, Uniform, Norm Convergence and Convergence in Measure 4.5.5 Differentiation Theory References 5 Numerical Methods 5.1 Iterative Method for Nonlinear Problem 5.2 Numerical Computation of One-dimensional Heat equation 5.2.1 Explicit Scheme 5.2.2 Implicit Scheme 5.2.3 Crank-Nicolson Method 5.3 Numerical Solution of Linear System of Equations 5.3.1 Direct Method using LU Factorization 5.3.2 Iterative Method using Matrix Splitting 5.3.3 Iterative Method using Steepest Descent Minimization 5.3.4 Conjugate Gradient (CG) Method 5.4 Finite Difference Method (FDM) 5.4.1 Poisson Equation 5.4.2 Elliptic Equation 5.5 Finite Element Method (FEM) 5.5.1 One-dimensional Model 5.5.2 Two-dimensional Model 5.5.3 Numerical Examples References 6 CT, MRI and Image Processing Problems 6.1 X-ray CT 6.1.1 Inverse Problem 6.1.2 Basic Principle and Nonlinear Effects 6.1.3 Inverse Radon Transform 6.1.4 Artifacts in CT 6.2 MRI 6.2.1 Basic Principle 6.2.2 K-space Data 6.2.3 Image Reconstruction 6.3 Image Restoration 6.3.1 Role of p in (6.35) 6.3.2 Total Variation Restoration 6.3.3 Anisotropic Edge-preserving Diffusion 6.3.4 Sparse Sensing 6.4 Segmentation 6.4.1 Active Contour Method 6.4.2 Level Set Method 6.4.3 Motion Tracking for Echocardiography References 7 Electrical Impedance Tomography 7.1 Introduction 7.2 Measurement Method and Data 7.2.1 Conductivity and Resistance 7.2.2 Permittivity and Capacitance 7.2.3 Phasor and Impedance 7.2.4 Admittivity and Trans-impedance 7.2.5 Electrode Contact Impedance 7.2.6 EIT System 7.2.7 Data Collection Protocol and Data Set 7.2.8 Linearity between Current and Voltage 7.3 Representation of Physical Phenomena 7.3.1 Derivation of Elliptic PDE 7.3.2 Elliptic PDE for Four-electrode Method 7.3.3 Elliptic PDE for Two-electrode Method 7.3.4 Min-max Property of Complex Potential 7.4 Forward Problem and Model 7.4.1 Continuous Neumann-to-Dirichlet Data 7.4.2 Discrete Neumann-to-Dirichlet Data 7.4.3 Nonlinearity between Admittivity and Voltage 7.5 Uniqueness Theory and Direct Reconstruction Method 7.5.1 Calderon's Approach 7.5.2 Uniqueness and Three-dimensional Reconstruction: Infinite Measurements 7.5.3 Nachmann's D-bar Method in Two Dimension 7.6 Backprojection Algorithm 7.7 Sensitivity and Sensitivity Matrix 7.7.1 Perturbation and Sensitivity 7.7.2 Sensitivity Matrix 7.7.3 Linearization 7.7.4 Quality of Sensitivity Matrix 7.8 Inverse Problem of EIT 7.8.1 Inverse Problem of RC Circuit 7.8.2 Formulation of EIT Inverse Problem 7.8.3 Ill-posedness of EIT Inverse Problem 7.9 Static Imaging 7.9.1 Iterative Data Fitting Method 7.9.2 Static Imaging using 4-channel EIT System 7.9.3 Regularization 7.9.4 Technical Difficulty of Static Imaging 7.10 Time-difference Imaging 7.10.1 Data Sets for Time-difference Imaging 7.10.2 Equivalent Homogeneous Admittivity 7.10.3 Linear Time-difference Algorithm using Sensitivity Matrix 7.10.4 Interpretation of Time-difference Image 7.11 Frequency-difference Imaging 7.11.1 Data Sets for Frequency-difference Imaging 7.11.2 Simple Difference Ft,ω2− Ft,ω1 7.11.3 Weighted Difference Ft,ω2− [alpha] Ft,ω1 7.11.4 Linear Frequency-difference Algorithm using Sensitivity Matrix 7.11.5 Interpretation of Frequency-difference Image References 8 Anomaly Estimation and Layer Potential Techniques 8.1 Harmonic Analysis and Potential Theory 8.1.1 Layer Potentials and Boundary Value Problems for Laplace Equation 8.1.2 Regularity for Solution of Elliptic Equation along Boundary of Inhomogeneity 8.2 Anomaly Estimation using EIT 8.2.1 Size Estimation Method 8.2.2 Location Search Method 8.3 Anomaly Estimation using Planar Probe 8.3.1 Mathematical Formulation 8.3.2 Representation Formula References 9 Magnetic Resonance Electrical Impedance Tomography 9.1 Data Collection using MRI 9.1.1 Measurement of Bz 9.1.2 Noise in Measured Bz Data 9.1.3 Measurement of B = (Bx,By,Bz) 9.2 Forward Problem and Model Construction 9.2.1 Relation between J , Bz and σ 9.2.2 Three Key Observations 9.2.3 Data Bz Traces σ∇u © e z-directional Change of σ 9.2.4 Mathematical Analysis toward MREIT Model 9.3 Inverse Problem Formulation using B or J 9.4 Inverse Problem Formulation using Bz 9.4.1 Model with Two Linearly Independent Currents 9.4.2 Uniqueness 9.4.3 Defected Bz Data in a Local Region 9.5 Image Reconstruction Algorithm 9.5.1 J-substitution Algorithm 9.5.2 Harmonic Bz Algorithm 9.5.3 Gradient Bz Decomposition and Variational Bz Algorithm 9.5.4 Local Harmonic Bz Algorithm 9.5.5 Sensitivity Matrix Based Algorithm 9.5.6 Anisotropic Conductivity Reconstruction Algorithm 9.5.7 Other Algorithms 9.6 Validation and Interpretation 9.6.1 Image Reconstruction Procedure using Harmonic Bz Algorithm 9.6.2 Conductivity Phantom Imaging 9.6.3 Animal Imaging 9.6.4 Human Imaging 9.7 Applications References 10 Magnetic Resonance Elastography 10.1 Representation of Physical Phenomena 10.1.1 Overview of Hooke's Law 10.1.2 Strain Tensor in Lagrangian Coordinates 10.2 Forward Problem and Model 10.3 Inverse Problem in MRE 10.4 Reconstruction Algorithms 10.4.1 Reconstruction of [mu] with the Assumption of Local Homogeneity 10.4.2 Reconstruction of [mu] without the Assumption of Local Homogeneity 10.4.3 Anisotropic Elastic Moduli Reconstruction 10.5 Technical Issues in MRE References…”
    Libro electrónico
  18. 1518
    por Geelhoed, Fiore
    Publicado 2014
    Tabla de Contenidos: “…; 3.4.1 Significant Others; 3.4.2 Gradations of Identity Crisis and (Radical) Conversion; 3.4.3 The Nature of the Crisis: Identity Strain; 3.5 Summary; 4 AN ORTHODOX FOCUS ON POSITIVE SELF-IDENTIFICATION; 4.1 Identity, Identification and Difference; 4.2 Fundamentalist Meaning Systems as a Source of Secure Identities; 4.2.2 The Security of Relying on a Higher Power; 4.3 The Security of Fundamentalist Boundaries in Everyday Life…”
    Click para texto completo desde fuera UPSA
    Click para texto completo desde UPSA
    Libro electrónico
  19. 1519
    por Moral Pérez, María Esther del
    Publicado 2010
    Tabla de Contenidos: “…Desarrollo de competencias genéricas; 4.3. Evaluación de las asignaturas MATRIX: Análisis DAFO; 4.3.1. …”
    Libro electrónico
  20. 1520
    por Avilés Hernández, Manuela
    Publicado 2015
    Tabla de Contenidos: “…RELACIONES ENTRE EL NÚCLEO MONOPARENTAL (...); 4.3. RELACIONES CON OTROS FAMILIARES; 4.3.1. RELACIONES CON LA MADRE; 4.3.2. …”
    Libro electrónico