Filters








13 Hits in 8.8 sec

The mechanics and behavior of cliff swallows during tandem flights

R. M. Shelton, B. E. Jackson, T. L. Hedrick
2014 Journal of Experimental Biology  
These data permit us to evaluate several hypotheses on the high-speed maneuvering flight performance of birds.  ...  Here we used multi-camera videography to measure the three-dimensional kinematics of their natural flight maneuvers in the field.  ...  Acknowledgements We wish to thank Nick Deluga, Katherine Sholtis and Amanda Lohmann for their assistance in collecting and analyzing the video data, and members of the Hedrick lab group for valuable discussion  ... 
doi:10.1242/jeb.101329 pmid:24855672 fatcat:miup2wmfrfhb7fk6xiufdgsb2u

Introduction [chapter]

2016 Music Data Analysis  
The interface between the computer and statistical sciences is increasing, as each discipline seeks to harness the power and resources of the other.  ...  This series aims to foster the integration between the computer sciences and statistical, numerical, and probabilistic methods by publishing a broad range of reference works, textbooks, and handbooks.  ...  ., [29] for uniform filter banks and, e.g., in [11] and [17] , the lat ter two offering near perfect reconstruction for the gammatone filter bank and for the sliding-window CQT.  ... 
doi:10.1201/9781315370996-5 fatcat:avooqogcpnbjngqmzuonil3exq

From social data mining to forecasting socio-economic crises

D. Helbing, S. Balietti
2011 The European Physical Journal Special Topics  
The purpose of this White Paper of the EU Support Action "Visioneer"(see www.visioneer.ethz.ch) is to address the following goals: Develop strategies to quickly increase the objective knowledge about social  ...  and economic systems.Describe requirements for efficient large-scale scientific data mining of anonymized social and economic data.Formulate strategies how to collect stylized facts extracted from large  ...  The authors are grateful for financial support by the Future and Emerging Technologies programme FP7-COSI-ICT of the European Commission through the project Visioneer (grant no.: 248438).  ... 
doi:10.1140/epjst/e2011-01401-8 pmid:32215190 pmcid:PMC7088654 fatcat:qgixn26btng2flz4bqplqqgede

Applications of wavelet transforms to analysing medical signals [article]

Katherine Elizabeth Macey, University Of Canterbury
2012
One-dimensional wavelets are used to quantify amplitude modulation of infant breathing that occurs during quiet sleep.  ...  The construction of both one- and two-dimensional wavelets is described, and examples of wavelets that are used in subsequent analyses are presented.  ...  Each of these is downsampled: 3.2 PERFECT RECONSTRUCTION FILTER BANKS X(Z)I!  ... 
doi:10.26021/2039 fatcat:2pg3imrkpncfzjfghr3w72wn54

The mechanics and behavior of cliff swallows during tandem flights

Ryan M. Shelton, Tyson L. Hedrick, Brandon E. Jackson
2014
Acknowledgements We wish to thank Nick Deluga, Katherine Sholtis and Amanda Lohmann for their assistance in collecting and analyzing the video data, and members of the Hedrick lab group for valuable discussion  ...  We used the filtered position, v and a data for all further calculations.  ...  simple fixed-wing banked turns.  ... 
doi:10.17615/mzy6-0017 fatcat:hznldg27ujfcfddvvbpelatj4i

32. Deutscher Krebskongress Krebsmedizin heute: präventiv, personalisiert, präzise und partizipativ, Berlin, 24.-27. Februar 2016: Abstracts

2016 Oncology Research and Treatment  
Acknowledgment This project was supported by a research grant of the Berliner Krebsgesellschaft e. V.  ...  ID 0257 Application and compliance of complementary medicine in patients with breast and/or gynecologic carcinoma  ...  Samples are filtered through 5μm pore sized silicon nitride filters with a constant pressure of 100mbar.  ... 
doi:10.1159/000444354 pmid:26905290 fatcat:aa4ozsvq6balfgoajaqwhviupq

39th International Symposium on Intensive Care and Emergency Medicine

2019 Critical Care  
We used auditory verbal learning test (AVLT), digit span test (DST), digit-letter substitution test (DLST), Stroop test and trail making test (TMT).  ...  manner, based on the evaluation of Lipocalin-2 (LCN2/NGAL) expression levels by using droplet digital PCR (ddPCR).  ...  Using method of logistic regression and ROC analysis, we measured the prognostic value of AMM. (Table 1) .  ... 
doi:10.1186/s13054-019-2358-0 fatcat:pcva4dngjzfo5ekzkvzj5fcwge

From social data mining to forecasting socio-economic crises

Dirk Helbing, S. Balietti
2011
The purpose of this White Paper of the EU Support Action "Visioneer"(see www.visioneer.ethz.ch) is to address the following goals: 1.  ...  Elaborate ethical standards regarding the storage, processing, evaluation, and publication of social and economic data.  ...  The authors are grateful for financial support by the Future and Emerging Technologies programme FP7-COSI-ICT of the European Commission through the project Visioneer (grant no.: 248438).  ... 
doi:10.3929/ethz-b-000037710 fatcat:4taobnrp3ncwniqgwo5v2vryk4

Prefazione agli Occasional Papers del CeSLiC

Susanna Bonaldi, Louann Haarman, Donna Miller, Paola Nobile, Eva-Maria Thüne
unpublished
, l'ideatore per eccellenza di ciò che Louw chiama la moderna strumentazione 'digitale' per gli studi linguistici, in occasione del suo settantesimo compleanno, l'anno in cui il Sud Africa si accingeva  ...  amsacta.cib.unibo.it/archive/00000953/01/CESLIC_OP1.pdf Gli Occasional Papers vanno ad aggiungersi: 1) alla serie di manuali degli Quaderni del CeSLiC: Functional Grammar Studies for Non-Native Speakers of  ...  Any corpus is such a tiny sample of language in use that there can be little finality in the statistics...The idea of a monitor corpus was born.  ... 
fatcat:fjf66f7q6ravdmfygyg6fruery

On robustness of service-based applications

Andrew Roczniak, Université D'Ottawa / University Of Ottawa, Université D'Ottawa / University Of Ottawa
2013
From the point of view of a user, a service-based application can only be useful if it provides some indication about its robustness.  ...  An example on how a group of users might interact with those services using standard set of protocols and off-the-shelf techniques is presented.  ...  In [57] , a method for digitally signing streams is presented.  ... 
doi:10.20381/ruor-13040 fatcat:hguq6jpf65b2bccbah4xkr5gku

Exploring Motivation, Self-concept and Engagement in an EAP Setting: A Mixed Methods Study in Iraqi Kurdistan

Stacey A. Johnson
2021
Employing an exploratory sequential research design, a combination of qualitative and quantitative research methodologies was used to analyse data from questionnaires, interviews and classroom observations.The  ...  The aim of this mixed methods study is to explore EAP (English for Academic Purposes) classes at universities in Kurdistan, North Iraq.  ...  videos on Youtube -they are giving us the links also.  ... 
doi:10.25392/leicester.data.16601876 fatcat:eojtbxrfgnhhdbojsexsht4b64

Neural network techniques for position and scale invariant image classification

Catherine Alison Grimes
1998
A software model of an artificial retina was used to test the grey scale classification performance of the network and to assess the response of the retina to changes in brightness.  ...  In addition to the goal of invariant classification, the network has to classify the objects in a hierarchical manner, in which complex features are constructed from simpler features, and use unsupervised  ...  David Elliman for their encouragement and support throughout the period of this research. IV  ... 
doi:10.21954/ou.ro.0000e20a fatcat:wkhomydt6zhpne37jdewfhn7xe

Military culture and security: boundaries and identity in the UK private military security field

Paul Charles Thornbury
2020
Using in-depth interviews, the study analyses the experiences of practitioners working across the field and explores the implications that this has for our understanding of the private security phenomenon  ...  It is argued that the UK private military security sector forms a coherent social 'field' based around the commodification of military forms of capital through which the emotional reward of military style  ...  Thus some security organisations had begun to address the potential negative impact of un-reconstructed (and un-reconstructable) military identity.  ... 
doi:10.21953/lse.00004221 fatcat:mghm47hynnc67bzuoadjg6jcnu