Books on the topic 'Cycle detection'

To see the other types of publications on this topic, follow the link: Cycle detection.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 46 books for your research on the topic 'Cycle detection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Bateman, Colin. Cycle of violence. New York: Arcade Pub, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Johansen, Iris. Storm cycle. New York: St. Martin's Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Johansen, Iris. Storm cycle. Thorndike, Me: Center Point Pub., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pepper, Mark. Man on a murder cycle. London: Hodder & Stoughton, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bob, Robbins. Signal investing: Detecting powerful trends in risk and market cycles. New York: McGraw-Hill, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Barney Buck and the flying solar-cycle. Wheaton, Ill: WindRider Books, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

King, Stephen. Cycle of the Werewolf. New York, USA: Signet, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

King, Stephen. Cycle of the Werewolf. New York, USA: New American Library, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Johannes, Mark Robert Stephen. Detecting and understanding marine-terrestrial linkages in a developing watershed: Nutrient cycling in the Kenai River watershed. Anchorage, Alaska: EVOS Trustee Council, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kölker, Stefan, Johannes Häberle, and Valerie Walker. Urea Cycle Disorders. Oxford University Press, 2016. http://dx.doi.org/10.1093/med/9780199972135.003.0017.

Full text
Abstract:
The urea cycle is the final pathway for removal of surplus nitrogen from the body, the major route in humans for irreversible detoxification of ammonia and a source of arginine.2,3 Patients with adult-onset urea cycle disorders present with clinical symptoms that have a broad differential diagnosis (e.g., protein aversion, inappetence, cyclic vomiting, epilepsy, psychiatric disease, migraine, liver dysfunction). Unlike infants and children some adult-onset patients may never develop acute hyperammonemic crises. Since symptoms are often fluctuating and the diagnosis can only be made if specific tests are made, the diagnosis is often delayed or missed. Earlier detection and intervention would improve the patients’ outcome, which currently is poor.
APA, Harvard, Vancouver, ISO, and other styles
11

Johnson, Michael Ray. Modeling and detection of limit cycle oscillations in thin-wing aircraft using adaptable linear models. 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Billings Method. Ballantine Books, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

V, Carnahan James, and Segan E. G, eds. Effects of leak detection/location on underground heat distribution systems (UHDS) life cycle costs: A probabilistic model. [Champaign, Ill.]: Construction Engineering Research Laboratory, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

(Editor), Bertold Hock, and Niebner Reinhard (Editor), eds. Immunochemical Detection of Pesticides and Their Metabolites in the Water Cycle: Research Report (Research Report / Deutsche Forschungsgemeinschaft,). Wiley-VCH Verlag GmbH, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Chance, Kelly, and Randall V. Martin. Basic Solar and Planetary Properties. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780199662104.003.0001.

Full text
Abstract:
Basic properties of the Sun, the Earth and its atmosphere, other solar system atmospheres, and extrasolar planetary atmospheres are introduced here to provide background and context for the detailed study of the spectroscopy and radiative transfer of planetary atmospheres. Solar structure is described, including the solar cycle and variability, and a reference solar irradiance is presented. The Earth’s orbit, the seasons, and the ecliptic plane are introduced. The properties of hydrostatic equilibrium, albedo, and spectral reflectance are described. Earth’s atmospheric composition, including aerosols and gases, is summarized. Other atmospheres in the solar system are described and the growing field of extrasolar planets detection and characterization introduced.
APA, Harvard, Vancouver, ISO, and other styles
16

Taberlet, Pierre, Aurélie Bonin, Lucie Zinger, and Eric Coissac. Marine environments. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198767220.003.0013.

Full text
Abstract:
Chapter 13 “Marine environments” focuses on different applications of eDNA to study marine biodiversity. After a brief description of the current knowledge on DNA cycle in pelagic and benthic environments, this chapter revisits how DNA metabarcoding, and more generally environmental genomics have revolutionized the field of marine microbiology through the discovery of novel taxa and by unveiling large-scale patterns of diversity for marine bacteria, protists, and viruses. This chapter then presents recent applications of DNA metabarcoding for both basic research or biomonitoring purposes to study marine invertebrates and fish populations and diversity, as well as the detection of invasive species. Current gaps and methodological challenges are also discussed.
APA, Harvard, Vancouver, ISO, and other styles
17

Bateman, Colin. Cycle of violence. HarperCollins, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Storm cycle. St. Martins, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Bateman, Colin. Cycle of Violence: A Mystery. Arcade, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

On Turning Point Detection in Cyclical Processes: With Applications to the Monitoring of Business Cycles (Statistika Institutionen, Goteborgs Universitet, Skriftserie, 27). Almquiest & Wiksell Intl, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Burley, W. J. Wycliffe and the Cycle of Death. Orion Books Limited, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Edric, Robert. Swan Song (Song Cycle Trilogy 3). Black Swan, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Parent, Jason. Hearing Evil : Cycle of Evil: Book 2. Red Adept Publishing, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

King, Stephen. Cycle Of The Werewolf. Signet, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

King, Stephen. Cycle of the Werewolf. Paw Prints, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

King, Stephen. Cycle of the Werewolf. Tandem Library, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

King, Stephen. Cycle of the Werewolf. Hodder & Stoughton Ltd, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Kochanoff, Peggy. Be a Weather Detective: Solving the Mysteries of Cycles, Seasons, and Elements. Nimbus Publishing, Limited, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Galderisi, Maurizio, Juan Carlos Plana, Thor Edvardsen, Vitantonio Di Bello, and Patrizio Lancellotti. Cardiac oncology. Oxford University Press, 2016. http://dx.doi.org/10.1093/med/9780198726012.003.0064.

Full text
Abstract:
Cancer therapeutics may induce cardiac damage in the left and the right ventricle. Radiotherapy most frequently induces valvular damage, carotid stenosis, and coronary artery disease. Pericardial disease may be due to both chemo- and radiotherapy. The manifestations of both chemo- and radiotherapy can develop acutely but also become overt years after their performance, in particular after radiotherapy. The main cardiac damage of cancer therapeutics-related cardiac dysfunction (CTRCD) corresponds to the reduction of left ventricular (LV) systolic function. The Expert Consensus document from ASE and EACVI has defined CTRCD as a decrease in LV ejection fraction (LVEF) of greater than 10 percentage points, to a value less than 53%. The accurate calculation of LVEF at baseline and during follow-up is extremely important. The assessment of LV longitudinal function, in particular of speckle tracking-derived global longitudinal strain (GLS), can provide additional information, allowing early, subclinical detection of CTRCD. The ideal strategy could be to compare the measurements of GLS obtained during chemotherapy, with the one obtained at baseline. An integrated approach with the use of echocardiography at standardized, clinical preselected intervals with biomarker (ultrasensitive troponin) assessment prior to each chemotherapy cycle could be suggested in patients at high risk of CTRCD. Follow-up after therapy should depend on the type of chemotherapy/radiotherapy and the presence/absence of on-therapy CTRCD. Long-term follow-up should be planned after radiotherapy.
APA, Harvard, Vancouver, ISO, and other styles
30

Abear, Marcus. Terra Firma Murders: Ritual of Primes & the Seven Year Cycle. M Francis Abear, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Abear, Marcus. Terra Firma Murders: Ritual of Primes & the Seven Year Cycle. M Francis Abear, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

LePore, James. Gods and Fathers: The Invictus Cycle Book 4. Fiction Studio, The, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

King, Stephen. Cycle of the Werewolf: A Novel. Gallery 13, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Wrightson, Berni, and Stephen King. Cycle of the Werewolf: A Novel. Gallery Books, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

King, Stephen, and Joaquín Adsuar Ortega;. El ciclo del hombre lobo / Cycle of Werewolf. Debolsillo, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

King, Stephen, and Joaquín Adsuar Ortega;. El ciclo del hombre lobo / Cycle of Werewolf. Debolsillo, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Himes, Chester B. The Harlem Cycle: The Big Gold Dream; All Shot Up; The Heat's on. Payback Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Himes, Chester B. The Harlem Cycle: A Rage in Harlem; The Real Cool Killers; The Crazy Kill. Payback Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Himes, Chester B. The Harlem Cycle: Cotton Comes to Harlem; Blind Man with a Pistol; Plan B. Payback Pr, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Pont Evksinskiy – 2021 : materials of XII All-Russian scientific and applied conference for young scientists on the water systems problems, dedicated to the 150 th anniversary of the Sevastopol Biological Station ‒ A. O. Kovalevsky Institute of Biology of the Southern Seas of RAS, Sevastopol, 20–24 September, 2021. IBSS, 2021. http://dx.doi.org/10.21072/978-5-6044865-8-0.

Full text
Abstract:
The book includes materials of young scientists from Russia and the Republic of Abkhazia, revealing various aspects of modern marine and freshwater biology. Abstracts highlight the results of scientific research in the field of population dynamics and genetic differentiation of aquatic organisms, the features of their life cycle. The book present works on the influence of abiotic and anthropogenic environmental factors on the physiological status of aquaculture species. A number of works describes the capabilities of modern research methods applied in marine and freshwater biological studies, such as metabarcoding, "frame" and "rake method" for detecting beach debris, NGS sequencing, and satellite monitoring. In addition, the book reveals the features of the functioning of coastal ecosystems. The book is valuable for young scientists in the field of marine and freshwater biology, water ecology, biotechnology, aquaculture, marine ecology and zoology
APA, Harvard, Vancouver, ISO, and other styles
41

King, Stephen. El Ciclo Del Hombre Lobo / Cycle of the Werewolf. Planeta Pub Corp, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

King, Stephen, and Joaquin Maria Adsuar Ortega. El Ciclo Del Hombre Lobo / Cycle of the Werewolf. Editorial Planeta, S.A. (Barcelona), 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Garrett, Randall. LORD DARCY: Murder and Magic; Too Many Magicians; Lord Darcy Investigates (by the author of The Gandalara Cycle). Nelson Doubleday, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

King, Stephen. El Ciclo Del Hombre Lobo/Cycle of the Werewolf (Serie Los Españoles). Planeta Pub Corp, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Torgerson,, Paul R., C. N. L. Macpherson, and D. A. Vuitton. Cystic echinococcosis. Oxford University Press, 2011. http://dx.doi.org/10.1093/med/9780198570028.003.0060.

Full text
Abstract:
Cystic echinococcosis (CE)\cystic hydatid disease is one of the most widespread and important global helminth zoonoses. The parasite Echinococcus granulosus is maintained in a wide spectrum of intermediate hosts, including sheep, goats, camels, cattle, pigs and equines. A number of wild intermediate hosts occur, including cervids in the northern part of the North American continent and Eurasia, marsupials in Australia and wild herbivores in East and southern Africa. The application of a range of molecular techniques to the characterization of the parasite has confirmed the existence of mostly host-adapted strains and genotypes of the parasite and several new species have been proposed. The ubiquitous domestic dog serves as the most important definitive host for the transmission of the parasite throughout its wide geographical range.A wide range of diagnostic techniques, including necropsy, arecoline purgation, coproantigen ELISA and DNA based tests are available for detecting E. granulosus infection in the definitive host. In intermediate animal hosts, diagnosis at post mortem still remains the most reliable option. In humans, imaging techniques including ultrasound, nuclear magnetic resonance (NMR) or computer aided tomography (CAT-scan provide not only a method of diagnosis but also reveal important clinical information on the location, condition, number and size of the hydatid cysts in man. Of these ultrasound is the most widely used diagnostic technique and is the only imaging technique for screening of populations in rural areas, where the disease is most common. A classification system has been developed which can be used to assess the likely development of a cyst and hence guide the clinician in treatment options for the patient. Treatment relies on surgery and/or percutaneous interventions, especially ‘Puncture, Aspiration, Injection, Re-aspiration’ (PAIR) and/or antiparasitic treatment with albendazole (and alternatively mebendazole).CE is largely a preventable disease. Successful elimination programmes have focused on frequent periodic treatments of dogs with anthelmintics and the control of slaughter of domestic livestock. In many regions elimination or even control remains a problem as the parasite is endemic over vast areas of low income countries where there may be limited resources for control. In some areas, such as former communist administered countries, the parasite is resurgent. New tools are becoming available to control the parasite, including a highly effective vaccine in sheep which prevents the infection in sheep and breaks the transmission cycle. In addition cost effective methods are being developed which may be appropriate in low income countries where financial resources are not available for intensive control programmes that have been successful in high income countries.
APA, Harvard, Vancouver, ISO, and other styles
46

Hilgurt, S. Ya, and O. A. Chemerys. Reconfigurable signature-based information security tools of computer systems. PH “Akademperiodyka”, 2022. http://dx.doi.org/10.15407/akademperiodyka.458.297.

Full text
Abstract:
The book is devoted to the research and development of methods for combining computational structures for reconfigurable signature-based information protection tools for computer systems and networks in order to increase their efficiency. Network security tools based, among others, on such AI-based approaches as deep neural networking, despite the great progress shown in recent years, still suffer from nonzero recognition error probability. Even a low probability of such an error in a critical infrastructure can be disastrous. Therefore, signature-based recognition methods with their theoretically exact matching feature are still relevant when creating information security systems such as network intrusion detection systems, antivirus, anti-spam, and wormcontainment systems. The real time multi-pattern string matching task has been a major performance bottleneck in such systems. To speed up the recognition process, developers use a reconfigurable hardware platform based on FPGA devices. Such platform provides almost software flexibility and near-ASIC performance. The most important component of a signature-based information security system in terms of efficiency is the recognition module, in which the multipattern matching task is directly solved. It must not only check each byte of input data at speeds of tens and hundreds of gigabits/sec against hundreds of thousand or even millions patterns of signature database, but also change its structure every time a new signature appears or the operating conditions of the protected system change. As a result of the analysis of numerous examples of the development of reconfigurable information security systems, three most promising approaches to the construction of hardware circuits of recognition modules were identified, namely, content-addressable memory based on digital comparators, Bloom filter and Aho–Corasick finite automata. A method for fast quantification of components of recognition module and the entire system was proposed. The method makes it possible to exclude resource-intensive procedures for synthesizing digital circuits on FPGAs when building complex reconfigurable information security systems and their components. To improve the efficiency of the systems under study, structural-level combinational methods are proposed, which allow combining into single recognition device several matching schemes built on different approaches and their modifications, in such a way that their advantages are enhanced and disadvantages are eliminated. In order to achieve the maximum efficiency of combining methods, optimization methods are used. The methods of: parallel combining, sequential cascading and vertical junction have been formulated and investigated. The principle of multi-level combining of combining methods is also considered and researched. Algorithms for the implementation of the proposed combining methods have been developed. Software has been created that allows to conduct experiments with the developed methods and tools. Quantitative estimates are obtained for increasing the efficiency of constructing recognition modules as a result of using combination methods. The issue of optimization of reconfigurable devices presented in hardware description languages is considered. A modification of the method of affine transformations, which allows parallelizing such cycles that cannot be optimized by other methods, was presented. In order to facilitate the practical application of the developed methods and tools, a web service using high-performance computer technologies of grid and cloud computing was considered. The proposed methods to increase efficiency of matching procedure can also be used to solve important problems in other fields of science as data mining, analysis of DNA molecules, etc. Keywords: information security, signature, multi-pattern matching, FPGA, structural combining, efficiency, optimization, hardware description language.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography