Books on the topic 'Cyclist detection'

To see the other types of publications on this topic, follow the link: Cyclist detection.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 36 books for your research on the topic 'Cyclist detection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Conan, Doyle Arthur. The Adventure of the Solitary Cyclist. Mankato, MN, USA: Creative Education, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bob, Robbins. Signal investing: Detecting powerful trends in risk and market cycles. New York: McGraw-Hill, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pulido, Eugenio Fuentes. Contrarreloj. Barcelona, Spain: Tusquets, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Goodwin, Vincent. Sir Arthur Conan Doyle's The adventure of the solitary cyclist. Minneapolis, Minn: Magic Wagon, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Moody, Greg. Derailleur: A cycling murder mystery. Boulder, Colo: VeloPress, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dead air: A cycling murder mystery : a novel. Boulder, CO: VeloPress, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Moody, Greg. Deadroll: A cycling murder mystery. Boulder, Colo: VeloPress, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Johannes, Mark Robert Stephen. Detecting and understanding marine-terrestrial linkages in a developing watershed: Nutrient cycling in the Kenai River watershed. Anchorage, Alaska: EVOS Trustee Council, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Conan, Doyle Arthur. Quatre aventures de Sherlock Holmes: La cycliste solitaire suivi de ; Charles Auguste Milverton ; Le Gloria Scott ; Le trois-quart aile manquant. Paris: Librio, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hill, Laban Carrick. Spiked snow. New York: Hyperion Books for Children, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Ghost biker. Buena Park, CA: Artesian Press, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Brown, Marc Tolon. The Mystery of the Stolen Bike (Arthur Chapter Books #8). Boston: Little, Brown, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Brown, Marc Tolon. The Mystery of the Stolen Bike (Arthur Chapter Books #8). Boston, Mass: Little, Brown and Co., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Moody, Greg. Perfect circles: A novel. Boulder, Colo: VeloPress, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Keene, Carolyn. Una carrera contrarreloj. Barcelona: Molino, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Latitude zero. New York, New York: Viking, an imprint of Penguin Group (USA), 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Brouwer, Sigmund. Mountain biking-- to the extreme-- cliff dive. Dallas: Word Pub., 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Jenkins, Jerry B. Grave shadows. Wheaton, Ill: Tyndale House Publishers, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

France) International Conference on Noncommutative Rings and Their Applications (2013 Artois. Noncommutative rings and their applications: International Conference on Noncommutative Rings and Their Applications, July 1-4, 2013, University of Artois, France. Edited by Dougherty Steven 1966 editor, Facchini Alberto editor, Leroy, Andre (Andre Gerard), 1955- editor, Puczylowski Edmund editor, and Sole Patrick 1960 editor. Providence, Rhode Island: American Mathematical Society, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Conan, Doyle Arthur. Adventure of the Solitary Cyclist (Works). DH Audio, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Detection and mitigation of roadway hazards for bicyclists. Austin, Tex. (3208 Red River, Suite 200, Austin 78705-2650): Center for Transportation Research, The University of Texas at Austin, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Conan, Doyle Arthur. Sherlock Holmes: Adventure of the Solitary Cyclist. DH Audio, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Non Co-Operative Detection of LPI/LPD Signals Via Cyclic Spectral Analysis. Storming Media, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Arnold, Monica M., Lauren M. Burgeno, and Paul E. M. Phillips. Fast-Scan Cyclic Voltammetry in Behaving Animals. Oxford University Press, 2015. http://dx.doi.org/10.1093/med/9780199939800.003.0005.

Full text
Abstract:
Gaining insight into the mechanisms by which neural transmission governs behavior remains a central goal of behavioral neuroscience. Multiple applications exist for monitoring neurotransmission during behavior, including fast-scan cyclic voltammetry (FSCV). This technique is an electrochemical detection method that can be used to monitor subsecond changes in concentrations of electroactive molecules such as neurotransmitters. In this technique, a triangular waveform voltage is applied to a carbon fiber electrode implanted into a selected brain region. During each waveform application, specific molecules in the vicinity of the electrode will undergo electrolysis and produce a current, which can be detected by the electrode. In order to monitor subsecond changes in neurotransmitter release, waveform application is repeated every 100 ms, yielding a 10 Hz sampling rate. This chapter describes the fundamental principles behind FSCV and the basic instrumentation required, using as an example system the detection of in vivo phasic dopamine changes in freely-moving animals over the course of long-term experiments. We explain step-by-step, how to construct and surgically implant a carbon fiber electrode that can readily detect phasic neurotransmitter fluctuations and that remains sensitive over multiple recordings across months. Also included are the basic steps for recording FSCV during behavioral experiments and how to process voltammetric data in which signaling is time-locked to behavioral events of interest. Together, information in this chapter provides a foundation of FSCV theory and practice that can be applied to the assembly of an FSCV system and execution of in vivo experiments.
APA, Harvard, Vancouver, ISO, and other styles
25

On Turning Point Detection in Cyclical Processes: With Applications to the Monitoring of Business Cycles (Statistika Institutionen, Goteborgs Universitet, Skriftserie, 27). Almquiest & Wiksell Intl, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Kochanoff, Peggy. Be a Weather Detective: Solving the Mysteries of Cycles, Seasons, and Elements. Nimbus Publishing, Limited, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

El ciclista: II parte. Chiado, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

El ciclista: I parte. Chiado, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Farb, Benson, and Dan Margalit. Torsion. Princeton University Press, 2017. http://dx.doi.org/10.23943/princeton/9780691147949.003.0008.

Full text
Abstract:
This chapter deals with finite subgroups of the mapping class group. It first explains the distinction between finite-order mapping classes and finite-order homeomorphisms, focusing on the Nielsen realization theorem for cyclic groups and detection of torsion with the symplectic representation. It then considers the problem of finding an Euler characteristic for orbifolds, to prove a Gauss–Bonnet theorem for orbifolds, and to use these results to show that there is a universal lower bound of π‎/21 for the area of any 2-dimensional orientable hyperbolic orbifold. The chapter demonstrates that, when g is greater than or equal to 2, finite subgroups have order at most 84(g − 1) and cyclic subgroups have order at most 4g + 2. It also describes finitely many conjugacy classes of finite subgroups in Mod(S) and concludes by proving that Mod(Sɡ) is generated by finitely many elements of order 2.
APA, Harvard, Vancouver, ISO, and other styles
30

Moody, Greg. Two Wheels: A Cycling Murder Mystery. VeloPress, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Kölker, Stefan, Johannes Häberle, and Valerie Walker. Urea Cycle Disorders. Oxford University Press, 2016. http://dx.doi.org/10.1093/med/9780199972135.003.0017.

Full text
Abstract:
The urea cycle is the final pathway for removal of surplus nitrogen from the body, the major route in humans for irreversible detoxification of ammonia and a source of arginine.2,3 Patients with adult-onset urea cycle disorders present with clinical symptoms that have a broad differential diagnosis (e.g., protein aversion, inappetence, cyclic vomiting, epilepsy, psychiatric disease, migraine, liver dysfunction). Unlike infants and children some adult-onset patients may never develop acute hyperammonemic crises. Since symptoms are often fluctuating and the diagnosis can only be made if specific tests are made, the diagnosis is often delayed or missed. Earlier detection and intervention would improve the patients’ outcome, which currently is poor.
APA, Harvard, Vancouver, ISO, and other styles
32

Schraff, Anne E. Ghost Biker (Standing Tall Mysteries). Saddleback Publishing, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Bugeja, Michael J. Secret at Mystic Lake. Aladdin, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Brouwer, Sigmund. Cliff Dive (Short Cuts (Cygnet Books)). Tandem Library, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Cliff Dive. Cygnet Books, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Hilgurt, S. Ya, and O. A. Chemerys. Reconfigurable signature-based information security tools of computer systems. PH “Akademperiodyka”, 2022. http://dx.doi.org/10.15407/akademperiodyka.458.297.

Full text
Abstract:
The book is devoted to the research and development of methods for combining computational structures for reconfigurable signature-based information protection tools for computer systems and networks in order to increase their efficiency. Network security tools based, among others, on such AI-based approaches as deep neural networking, despite the great progress shown in recent years, still suffer from nonzero recognition error probability. Even a low probability of such an error in a critical infrastructure can be disastrous. Therefore, signature-based recognition methods with their theoretically exact matching feature are still relevant when creating information security systems such as network intrusion detection systems, antivirus, anti-spam, and wormcontainment systems. The real time multi-pattern string matching task has been a major performance bottleneck in such systems. To speed up the recognition process, developers use a reconfigurable hardware platform based on FPGA devices. Such platform provides almost software flexibility and near-ASIC performance. The most important component of a signature-based information security system in terms of efficiency is the recognition module, in which the multipattern matching task is directly solved. It must not only check each byte of input data at speeds of tens and hundreds of gigabits/sec against hundreds of thousand or even millions patterns of signature database, but also change its structure every time a new signature appears or the operating conditions of the protected system change. As a result of the analysis of numerous examples of the development of reconfigurable information security systems, three most promising approaches to the construction of hardware circuits of recognition modules were identified, namely, content-addressable memory based on digital comparators, Bloom filter and Aho–Corasick finite automata. A method for fast quantification of components of recognition module and the entire system was proposed. The method makes it possible to exclude resource-intensive procedures for synthesizing digital circuits on FPGAs when building complex reconfigurable information security systems and their components. To improve the efficiency of the systems under study, structural-level combinational methods are proposed, which allow combining into single recognition device several matching schemes built on different approaches and their modifications, in such a way that their advantages are enhanced and disadvantages are eliminated. In order to achieve the maximum efficiency of combining methods, optimization methods are used. The methods of: parallel combining, sequential cascading and vertical junction have been formulated and investigated. The principle of multi-level combining of combining methods is also considered and researched. Algorithms for the implementation of the proposed combining methods have been developed. Software has been created that allows to conduct experiments with the developed methods and tools. Quantitative estimates are obtained for increasing the efficiency of constructing recognition modules as a result of using combination methods. The issue of optimization of reconfigurable devices presented in hardware description languages is considered. A modification of the method of affine transformations, which allows parallelizing such cycles that cannot be optimized by other methods, was presented. In order to facilitate the practical application of the developed methods and tools, a web service using high-performance computer technologies of grid and cloud computing was considered. The proposed methods to increase efficiency of matching procedure can also be used to solve important problems in other fields of science as data mining, analysis of DNA molecules, etc. Keywords: information security, signature, multi-pattern matching, FPGA, structural combining, efficiency, optimization, hardware description language.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography