To see the other types of publications on this topic, follow the link: Error Transformations.

Books on the topic 'Error Transformations'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 25 books for your research on the topic 'Error Transformations.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Jerri, Abdul J. Integral and discrete transforms with applications and error analysis. New York: M. Dekker, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jerri, Abdul J. Integral and discrete transforms with applications and error analysis. New York: M. Dekker, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gilsinn, David. Updating a turning center error model by singular value decomposition. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Memphis State University. Center for Research on Women., Research Clearinghouse and Curriculum Integration Project on Women of Color and Southern Women., and Workshop on Women in the Curriculum (2nd : 1986 : Memphis State University, Center for Research on Women), eds. Conceptual errors across the curriculum: Towards a transformation of the tradition. Memphis, TN: Research Clearinghouse and Curriculum Integration Project, Center for Research on Women, Memphis State University, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Quality and safety for transformational nursing: Core competencies. Boston: Pearson, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Muth, Lorant A. An iterative technique to correct probe position errors in planar near-field to far-field transformations. Boulder, CO: U.S. Dept. of Commerce, National Institute of Standards & Technology, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Muth, Lorant A. An iterative technique to correct probe position errors in planar near-field to far-field transformations. Boulder, CO: U.S. Dept. of Commerce, National Institute of Standards & Technology, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ritalin nation: Rapid-fire culture and the transformation of human consciousness. New York: W.W. Norton, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ritalin nation: Rapid-fire culture and the transformation of human consciousness. New York: W.W. Norton, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

United States. National Aeronautics and Space Administration., ed. Study of one- and two-dimensional filtering and deconvolution algorithms for a streaming array computer: Final report. [Washington, D.C: National Aeronautics and Space Administration, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

United States. National Aeronautics and Space Administration., ed. Study of one- and two-dimensional filtering and deconvolution algorithms for a streaming array computer: Final report, appendix 5. [Washington, D.C: National Aeronautics and Space Administration, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

United States. National Aeronautics and Space Administration., ed. Study of one- and two-dimensional filtering and deconvolution algorithms for a streaming array computer: Final report, appendix 5. [Washington, D.C: National Aeronautics and Space Administration, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

United States. National Aeronautics and Space Administration., ed. Study of one- and two-dimensional filtering and deconvolution algorithms for a streaming array computer: Final report : [appendices]. [Washington, D.C: National Aeronautics and Space Administration, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Gill, Jeff, and Jonathan Homola. Issues in Polling Methodologies. Edited by Lonna Rae Atkeson and R. Michael Alvarez. Oxford University Press, 2016. http://dx.doi.org/10.1093/oxfordhb/9780190213299.013.11.

Full text
Abstract:
This chapter presents issues and complications in statistical inference and uncertainty assessment using public opinion and polling data. It emphasizes the methodologically appropriate treatment of polling results as binomial and multinomial outcomes, and highlights methodological issues with correctly specifying and explaining the margin of error. The chapter also examines the log-ratio transformation of compositional data such as proportions of candidate support as one possible approach for the difficult analysis of such information. The deeply flawed Null Hypothesis Significance Testing (NHST) is discussed, along with common inferential misinterpretations. The relevance of this discussion is illustrated using specific examples of errors from journalistic sources as well as from academic journals focused on measures of public opinion.
APA, Harvard, Vancouver, ISO, and other styles
15

Errol Walton Barrow and the Postwar Transformation of Barbados: The Late Colonial Period. University of the West Indies Press, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Watson, Hilbourne A. Errol Walton Barrow and the Postwar Transformation of Barbados: The Late Colonial Period. University of the West Indies Press, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Watson, Hilbourne A. Errol Walton Barrow and the Postwar Transformation of Barbados: The Late Colonial Period. University of the West Indies Press, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Watson, Hilbourne A. Errol Walton Barrow and the Postwar Transformation of Barbados: The Independence Period, 1966-1976. University of the West Indies Press, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Boddice, Rob. Scientism and Practice. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252040580.003.0007.

Full text
Abstract:
The conclusion argues that a discussion on the origin, purpose, evolution and moral implications of sympathy led to cultural and policy changes in Victorian life, as well as to new expressions of the self. It establishes the extent of scientific influence in policy creation, and illustrates the irony of Darwin’s key intellectual contribution to public life: although he meant only to describe the evolution of sympathy in order to justify Victorian morals, the description nevertheless contributed to the transformation of Victorian practices as justified by Darwinian morals. The conclusion emphasises the importance of scientific error, in contrast to the history of science’s orientation towards seminal successes, and highlights the extent to which scientific discourse tended towards scientism, dogmatically preached from the heart.
APA, Harvard, Vancouver, ISO, and other styles
20

Pievani, Telmo. Imperfection. The MIT Press, 2022. http://dx.doi.org/10.7551/mitpress/14573.001.0001.

Full text
Abstract:
In praise of imperfection: how life on our planet is a catalog of imperfections, errors, alternatives, and anomalies. In the beginning, there was imperfection, which became the source of all things. Anomalies and asymmetries caused planets to take shape from the bubbling void and sent light into darkness. Life on earth is a catalog of accidents, alternatives, and errors that turned out to work quite well. In this book, Telmo Pievani shows that life on our planet has flourished and survived not because of its perfection but despite (and perhaps because of) its imperfection. He begins his story with the disruption-filled birth of the universe and proceeds through the random DNA copying errors that fuel evolution, the transformations of advantages into handicaps by natural selection, the anatomical and functional jumble that is the human brain, and our many bodily mismatches. Along the way, Pievani tells readers about the Irish elk (incidentally, neither Irish nor elk), whose enormous antlers serve to illustrate the first two laws of imperfection; the widespread dissemination of costly or useless traits; and the neuroimperfection of the human brain—“a frozen accident of evolution that was not designed from scratch,” as Pievani calls it. He sizes up the alleged perfection of the human body, asking, for example, if everything in our bodies serves a purpose, why do we have appendixes? Why bipedalism, with the inevitable back pain that results? In this fascinating account, Pievani offers the first comprehensive explanatory theory for the ubiquity of imperfection.
APA, Harvard, Vancouver, ISO, and other styles
21

Hilgurt, S. Ya, and O. A. Chemerys. Reconfigurable signature-based information security tools of computer systems. PH “Akademperiodyka”, 2022. http://dx.doi.org/10.15407/akademperiodyka.458.297.

Full text
Abstract:
The book is devoted to the research and development of methods for combining computational structures for reconfigurable signature-based information protection tools for computer systems and networks in order to increase their efficiency. Network security tools based, among others, on such AI-based approaches as deep neural networking, despite the great progress shown in recent years, still suffer from nonzero recognition error probability. Even a low probability of such an error in a critical infrastructure can be disastrous. Therefore, signature-based recognition methods with their theoretically exact matching feature are still relevant when creating information security systems such as network intrusion detection systems, antivirus, anti-spam, and wormcontainment systems. The real time multi-pattern string matching task has been a major performance bottleneck in such systems. To speed up the recognition process, developers use a reconfigurable hardware platform based on FPGA devices. Such platform provides almost software flexibility and near-ASIC performance. The most important component of a signature-based information security system in terms of efficiency is the recognition module, in which the multipattern matching task is directly solved. It must not only check each byte of input data at speeds of tens and hundreds of gigabits/sec against hundreds of thousand or even millions patterns of signature database, but also change its structure every time a new signature appears or the operating conditions of the protected system change. As a result of the analysis of numerous examples of the development of reconfigurable information security systems, three most promising approaches to the construction of hardware circuits of recognition modules were identified, namely, content-addressable memory based on digital comparators, Bloom filter and Aho–Corasick finite automata. A method for fast quantification of components of recognition module and the entire system was proposed. The method makes it possible to exclude resource-intensive procedures for synthesizing digital circuits on FPGAs when building complex reconfigurable information security systems and their components. To improve the efficiency of the systems under study, structural-level combinational methods are proposed, which allow combining into single recognition device several matching schemes built on different approaches and their modifications, in such a way that their advantages are enhanced and disadvantages are eliminated. In order to achieve the maximum efficiency of combining methods, optimization methods are used. The methods of: parallel combining, sequential cascading and vertical junction have been formulated and investigated. The principle of multi-level combining of combining methods is also considered and researched. Algorithms for the implementation of the proposed combining methods have been developed. Software has been created that allows to conduct experiments with the developed methods and tools. Quantitative estimates are obtained for increasing the efficiency of constructing recognition modules as a result of using combination methods. The issue of optimization of reconfigurable devices presented in hardware description languages is considered. A modification of the method of affine transformations, which allows parallelizing such cycles that cannot be optimized by other methods, was presented. In order to facilitate the practical application of the developed methods and tools, a web service using high-performance computer technologies of grid and cloud computing was considered. The proposed methods to increase efficiency of matching procedure can also be used to solve important problems in other fields of science as data mining, analysis of DNA molecules, etc. Keywords: information security, signature, multi-pattern matching, FPGA, structural combining, efficiency, optimization, hardware description language.
APA, Harvard, Vancouver, ISO, and other styles
22

Perakslis, Eric D., Martin Stanley, and Erin Brodwin. Digital Health. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197503133.001.0001.

Full text
Abstract:
Digital health has been touted as a true transformation of health care, but all medical interventions have associated risks that must be understood and quantified. The Internet has brought many advancements, which quickly jumped from our computers into our pockets via powerful and completely connected mobile devices that are now being envisioned as devices for medical diagnostics and care delivery. As health care struggles with cost, inequity, value, and rapid virtualization, solid models of benefit-risk determination, new regulatory approaches for biomedical products, and clear risk-based conversations with all stakeholders are essential. Detailed examination of emerging digital health technologies has revealed 10 categories of digital side effects or “toxicities” that must be understood, prevented when possible, and managed when not. These toxicities include cyberthreat, loss of privacy, cyberchondria and cyber addiction, threats to physical security, charlatanism, overdiagnosis and overtreatment, medical/user error, and the plague of medical misinformation. For digital health to realize its promise, these toxicities must be understood, measured, warned against, and managed as concurrent side effects, in the same fashion as any other medical side effect.
APA, Harvard, Vancouver, ISO, and other styles
23

Campbell, Ian W. Knowledge and the Ends of Empire. Cornell University Press, 2017. http://dx.doi.org/10.7591/cornell/9781501700798.001.0001.

Full text
Abstract:
This book investigates the connections between knowledge production and policy formation on the Kazak steppes of the Russian Empire. Hoping to better govern the region, tsarist officials were desperate to obtain reliable information about an unfamiliar environment and population. This created opportunities for Kazak intermediaries to represent themselves and their landscape to the tsarist state. Because tsarist officials were uncertain of what the steppe was, and disagreed on what could be made of it, Kazaks were able to be part of these debates, at times influencing the policies that were pursued. This book tells a story that highlights the contingencies of and opportunities for cooperation with imperial rule. Kazak intermediaries were at first able to put forward their own idiosyncratic views on whether the steppe was to be Muslim or secular, whether it should be a center of stock-raising or of agriculture, and the extent to which local institutions needed to give way to imperial institutions. It was when the tsarist state was most confident in its knowledge of the steppe that it committed its gravest errors by alienating Kazak intermediaries and placing unbearable stresses on pastoral nomads. From the 1890s on, when the dominant visions in St. Petersburg were of large-scale peasant colonization of the steppe and its transformation into a hearth of sedentary agriculture, the same local knowledge that Kazaks had used to negotiate tsarist rule was transformed into a language of resistance.
APA, Harvard, Vancouver, ISO, and other styles
24

Study of one- and two-dimensional filtering and deconvolution algorithms for a streaming array computer: Final report : [appendices]. [Washington, D.C: National Aeronautics and Space Administration, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Study of one- and two-dimensional filtering and deconvolution algorithms for a streaming array computer: Final report. [Washington, D.C: National Aeronautics and Space Administration, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography