 Washington, D.C. : United States. Dept. of Energy. ; Oak Ridge, Tenn. : distributed by the Office of Scientific and Technical Information, U.S. Dept. of Energy, 1996
 Description
 Book — 1 online resource (17 p. ) : digital, PDF file.
 Summary

For many years, ECG`s and vector cardiograms have been the tools of choice for noninvasive diagnosis of cardiac conduction problems, such as found in reentrant tachycardia or WolffParkinsonWhite (WPW) syndrome. Through skillful analysis of these skinsurface measurements of cardiac generated electric currents, a physician can deduce the general location of heart conduction irregularities. Using a combination of highfidelity geometry modeling, advanced mathematical algorithms and massively parallel computing, Sandia`s approach would provide much more accurate information and thus allow the physician to pinpoint the source of an arrhythmia or abnormal conduction pathway.
 Online
 Kaxiras, Stefanos.
 1st ed.  San Rafael, Calif (1537 Fourth Street, San Rafael, CA 94901 USA) : Morgan & Claypool Publishers, 2008.
 Description
 Book — 1 electronic text (xi, 207 p.) : ill.
 Summary

 Introduction Modeling, Simulation, and Measurement Using Voltage and Frequency Adjustments to Manage Dynamic Power Optimizing Capacitance and Switching Activity to Reduce Dynamic Power Managing Static (Leakage) Power Conclusions.
 (source: Nielsen Book Data)
(source: Nielsen Book Data)
 Vienna : International Atomic Energy Agency, 2021.
 Description
 Book — 1 online resource : illustrations
 Summary

 Intro
 1. INTRODUCTION
 Background
 Objective
 Scope
 Structure
 2. Basic Concepts and Relationships
 Nuclear security and computer security
 Facility functions, computer security levels and computer security zones
 Computer security risk management
 Competing demands of simplicity, efficiency and computer security
 Conceptual nuclear facility zone model
 Computer security measures
 Computer based systems and digital assets (including SDAs)
 Cyberattack
 Interface with safety
 3. General Considerations for Computer Security
 Identification of facility functions
 Protection of sensitive information and digital assets
 Risk informed approach
 Risk assessment and management
 Computer security levels based on a graded approach
 4. Facility Computer Security Risk Management
 Objective of facility computer security risk management
 Outline of facility computer security risk management
 Inputs to facility computer security risk management
 Phases of facility computer security risk management
 Scope definition
 Facility characterization
 Identification of facility functions
 Intrinsic significance of facility functions
 Potential effects of compromise of a system on facility function
 Interdependencies between facility functions
 Necessary timeliness and accuracy for facility function interdependencies
 Target identification
 Documentation of facility functions
 Threat characterization
 Sources of threat information
 Facility specific threat characterization
 Additional considerations for insider threats
 Specification of computer security requirements
 Computer security policy and computer security programme
 Assignment of systems performing facility functions to computer security levels
 Defensive computer security architecture specification
 Requirements in the DCSA specification to apply a graded approach
 Requirements in the DCSA specification to apply defence in depth
 Trust model
 Relationship with system computer security risk management
 performed for each system
 Assurance activities
 Evaluation
 Verification
 Validation
 Scenario identification and development
 Facility computer security risk management output
 5. System Computer Security Risk Management
 General considerations
 Overview
 System computer security risk management process
 Overall defensive computer security architecture requirements for computer security
 Definition of system boundaries
 Definition and construction of computer security zones
 Identification of digital assets
 System computer security architecture, including digital asset analysis
 Verification of the system computer security risk assessment
 System computer security risk management report
 Oak Ridge, Tenn. : distributed by the Office of Scientific and Technical Information, U.S. Dept. of Energy, 1961
 Description
 Book — Pages: 132 : digital, PDF file.
 Summary

A kinetic model of the primary loop of a multipass pressurized water reactor power plant is developed to evaluate, by analog computer techniques, the transient response characteristics under conditions of steam generator load and reactor control rod perturbations. Using the 2pass 28 Mw(t) SM2 reactor as a typical plant, transient behavior patterns are illustrated and examined for a variety of load inputs, variations in plant constants, and analog model simplifications. (auth)
 Online
 Weinheim ; New York : VCH, c1995.
 Description
 Book — 343 p.
 Summary

 Part 1 3DQSAR  the integration of QSAR with molecular modelling: chemometrics and molecular modelling3D QSAR methodsGOLPE  philosophy and applications in 3D QSAR. Part 2 Rational use of chemical and sequence databases: molecular similarity analysis  applications in drug discovery
 clustering of chemical structure databases for compound selection
 receptor mapping and phylogenetic clustering. Part 3 Advanced statistical techniques: continuum regression  a new algorithm for the prediciton of biological activity
 molecullar taxonomy by correspondence factorial analysis (CFA)
 analysis of embedded data  knearest neighbour and single class distinction
 quantitative analysis of structureactivityclass relationships by (Fuzzy) adaptive least squares
 alternating conditional expectations in QSAR. Part 4 Neural networks and expert systems in molecular design: neural networks  a tool for drug design
 rule induction applied to the derivation of quantitative structureactivity relationships.
 (source: Nielsen Book Data)
(source: Nielsen Book Data)
SAL3 (offcampus storage)
SAL3 (offcampus storage)  Status 

Stacks  Request (opens in new tab) 
RS418 .A38 1995  Available 
 Higgins, R. V. (Ralph V.), 1903
 Washington, D.C. : U.S. Dept. of the Interior, Bureau of Mines, 1963.
 Description
 Book — ii, 71 pages : illustrations ; 27 cm.
Green Library
Green Library  Status 

Some records bound together  
See full record for details  
Find it US Federal Documents  
I 28.23:6305  Unknown 
 Comninos, Peter, 1949
 London : Springer, ©2006.
 Description
 Book — 1 online resource (xx, 547 pages) : illustrations Digital: text file.PDF.
 Summary

 Vector Algebra Survival Kit Some Basic Definitions and Notation Multiplication of a Vector by a Scalar Vector Addition Position Vectors and Free Vectors The Vector Equation of a Line Linear Dependence / Independence of Vectors Vector Bases The Components of a Vector Multiplication of a Vector by a Scalar Vector Addition Vector Equality Orthogonal, Orthonormal and RightHanded Vector Bases Cartesian Bases and Cartesian Coordinates The Length of a Vector The Scalar Product of Vectors The Scalar Product Expresses in Terms of its Components Properties and Applications of the Scalar Product The Direction Ratios and Direction Cosines of a Vector The Vector Product of Two Vectors The Vector Product Expressed in Terms of its Components Properties of the Vector Product Triple Produces of Vectors The Components of a Vector Relative to a Nonorthogonal Basis The Decomposition of a Vector According to a Basis The Vector Equation of the Line Revisited The Vector Equation of the Place Some Applications of Vector Algebra in Analytical Geometry Summary of Vector Algebra Axioms and Rules A Simple Vector Algebra C Library Matrix Algebra Survival Kit The Definition of a Matrix Square Matrices Diagonal Matrices The Identity Matrix The Zero or Null Matrix The Transpose of a Matrix Symmetric and Antisymmetric Matrices Triangular Matrices Scalar Matrices Equality of Matrices Matrix Operations The Minor of a Matrix The Determinant of a Matrix The Computational Rules of Determinants The Cofactor of an Element of a Matrix and the Cofactor Matrix The Ajoint Matrix or Adjugate Matrix The Reciprocal or Inverse of a Matrix A Theorem on Invertible Matrices and their Determinants Axioms and Rules of Matrix Inversion Solving a System of Linear Simultaneous Equations Orthogonal Matrices Two Theorems on Vector by Matrix Multiplication The Row / Column Reversal Matrix Summary of Matrix Algebra Axioms and Rules A Simple Matrix Algebra C Library Vector Spaces or Linear Spaces The Definition of a Scalar Field The Definition of a Vector Space Linear Combinations of Vectors Linear Dependence and Linear Independence of Vectors Spans and Bases of a Vector Space Transformations between Bases Transformations between Orthonormal Bases An Alternative Notation for Change of Basis Transformations TwoDimensional Transformations The Definition of a 2D Transformation The Concatenation of Transformations 2D Graphics Transformations 2D Primitive Transformations 2D Composite Transformations The Sign of the Angles in Transformations Some Important Observations The Matrix Representation of 2D Transformations The Matrix Representation of Primitive Transformations Some Transformation Matrix Properties The Concatenation of Transformation Matrices Local Frame and Global Frame Transformations Transformations of the Frame of Reference or Coordinate System The Viewing Transformation Homogeneous Coordinates A Simple C Library for 2D Transformations TwoDimensional Clipping Clipping a 2D Point to a Rectangular Clipping Boundary Clipping a 2D Line Segment to a Rectangular Clipping Boundary The Cohen and Sutherland 2D LineClipping Algorithm 2D Polygon Clipping References ThreeDimensional Transformations Primitive 3D Transformations The Global and Local Frames of Reference A.
 (source: Nielsen Book Data)
(source: Nielsen Book Data)
 Description
 Book
 Online
Media Center
Media Center  Status 

Find it Microfiche collection  
408067  Inlibrary use 
 Plemenos, Dimitri.
 Berlin ; Heidelberg : Springer, ©2009.
 Description
 Book — 1 online resource Digital: text file.PDF.
 Summary

 Tools for Intelligent Computer Graphics. Intelligent scene modeling. Scene understanding. Virtual World Exploration. Improvements and applications. Viewpoint Complexity in Radiosity. Scene understanding and human intelligence.
 (source: Nielsen Book Data)
(source: Nielsen Book Data)
71. Mathematical and computer programming techniques for computer graphics [electronic resource] [2006]
 Comninos, Peter, 1949
 London : Springer, c2006.
 Description
 Book — xx, 547 p. : ill.
 Summary

 Vector Algebra Survival Kit Some Basic Definitions and Notation Multiplication of a Vector by a Scalar Vector Addition Position Vectors and Free Vectors The Vector Equation of a Line Linear Dependence / Independence of Vectors Vector Bases The Components of a Vector Multiplication of a Vector by a Scalar Vector Addition Vector Equality Orthogonal, Orthonormal and RightHanded Vector Bases Cartesian Bases and Cartesian Coordinates The Length of a Vector The Scalar Product of Vectors The Scalar Product Expresses in Terms of its Components Properties and Applications of the Scalar Product The Direction Ratios and Direction Cosines of a Vector The Vector Product of Two Vectors The Vector Product Expressed in Terms of its Components Properties of the Vector Product Triple Produces of Vectors The Components of a Vector Relative to a Nonorthogonal Basis The Decomposition of a Vector According to a Basis The Vector Equation of the Line Revisited The Vector Equation of the Place Some Applications of Vector Algebra in Analytical Geometry Summary of Vector Algebra Axioms and Rules A Simple Vector Algebra C Library Matrix Algebra Survival Kit The Definition of a Matrix Square Matrices Diagonal Matrices The Identity Matrix The Zero or Null Matrix The Transpose of a Matrix Symmetric and Antisymmetric Matrices Triangular Matrices Scalar Matrices Equality of Matrices Matrix Operations The Minor of a Matrix The Determinant of a Matrix The Computational Rules of Determinants The Cofactor of an Element of a Matrix and the Cofactor Matrix The Ajoint Matrix or Adjugate Matrix The Reciprocal or Inverse of a Matrix A Theorem on Invertible Matrices and their Determinants Axioms and Rules of Matrix Inversion Solving a System of Linear Simultaneous Equations Orthogonal Matrices Two Theorems on Vector by Matrix Multiplication The Row / Column Reversal Matrix Summary of Matrix Algebra Axioms and Rules A Simple Matrix Algebra C Library Vector Spaces or Linear Spaces The Definition of a Scalar Field The Definition of a Vector Space Linear Combinations of Vectors Linear Dependence and Linear Independence of Vectors Spans and Bases of a Vector Space Transformations between Bases Transformations between Orthonormal Bases An Alternative Notation for Change of Basis Transformations TwoDimensional Transformations The Definition of a 2D Transformation The Concatenation of Transformations 2D Graphics Transformations 2D Primitive Transformations 2D Composite Transformations The Sign of the Angles in Transformations Some Important Observations The Matrix Representation of 2D Transformations The Matrix Representation of Primitive Transformations Some Transformation Matrix Properties The Concatenation of Transformation Matrices Local Frame and Global Frame Transformations Transformations of the Frame of Reference or Coordinate System The Viewing Transformation Homogeneous Coordinates A Simple C Library for 2D Transformations TwoDimensional Clipping Clipping a 2D Point to a Rectangular Clipping Boundary Clipping a 2D Line Segment to a Rectangular Clipping Boundary The Cohen and Sutherland 2D LineClipping Algorithm 2D Polygon Clipping References ThreeDimensional Transformations Primitive 3D Transformations The Global and Local Frames of Reference A.
 (source: Nielsen Book Data)
(source: Nielsen Book Data)
 Dube, Roger.
 Hoboken, N.J. : Wiley, c2008.
 Description
 Book — xxiii, 227 p. : ill. ; 25 cm.
 Summary

 1. The Elements of Computer Security.
 2. Cryptography Approaches and Attacks.
 3. Key Generation and Distribution Approaches and Attacks.
 4. The Qualities of Workable Security Solutions.
 5. Secure Coprocessors.
 6. Secure bootstrap Loading.
 7. Secure Memory Management and Trusted Execution Technology.
 8. The Trusted Platform Module.
 9. FieldProgrammable Gate Arrays.
 10. HardwareBased Authentication.
 11. A Closer Look At Biometrics.
 12. Tokens: Something You Have.
 13. Location Technologies.
 14. Putting It All Together. Glossary. Index.
 (source: Nielsen Book Data)
(source: Nielsen Book Data)
 Oak Ridge, Tenn. : distributed by the Office of Scientific and Technical Information, U.S. Dept. of Energy, 1967
 Description
 Book — 1 online resource (Pages: 5 ) : digital, PDF file.
 Online
 Argonne, Ill. : Argonne National Laboratory ; Oak Ridge, Tenn. : distributed by the Office of Scientific and Technical Information, U.S. Dept. of Energy, 1978
 Description
 Book — 1 online resource (Pages: 22 ) : digital, PDF file.
 Summary

The study of the bile acid constituents of serum, bile, urine, and stool of patients exhibiting liver disease has increased in importance with the availability of newer methods for their detection and identification. A cogent question for study has been whether specific bile acids are toxic and thus are the cause of liver disease, or whether they accumulate as a result of diseaseinduced alteration in metabolism. Examining a wide variety of clinical samples, we have observed that many patients with diagnosed cholestasis show the presence of atypical bile acids due to metabolic aberrations in either the side chain or in the steroid ring. Because cholestasis represents a spectrum of diseases with differing metabolic and/or anatomic defects and because our studies cover a variety of cholestatic states, we have sought to establish a correlation between the presence of these atypical bile acids and the disease state. The complexity of the bile acid mixtures to be examined requires that gas chromatographicmass spectrometriccomputer techniques be used to provide a reliable analysis. It is believed that atypical bile acids can be readily identified by GC/CI mass spectrometry with great sensitivity. It is also believed that such bile acid analysis may prove useful to the study and diagnosis of liver disease. Present data suggest that the identification of atypical bile acids in biological samples may enable differentiation between different types of intrahepatic cholestasis. Such analyses may prove useful to distinguish specific diseases, such as Byler's disease (and Byler'slike cholestasis) from other types of cholestasis and may distinguish diseases involving mitochondrial defects. Finally, the presence of atypical bile acids may indicate, by the particular compounds formed, where and what kind of damage occurs in a disease and may ultimately establish if these atypical bile acids are a cause or effect of the liver damage.
 Online
 Heidelberg : Springer, [2013?]
 Description
 Book — 1 online resource (x, 282 pages) : illustrations (some color) Digital: text file.PDF.
 Summary

 Pigment Network Detection and Analysis / Maryam Sadeghi, Paul Wighton, Tim K. Lee, David McLean, Harvey Lui and M. Stella Atkins
 Pattern Analysis in Dermoscopic Images / Aurora Sáez, Begoña Acha and Carmen Serrano
 A BagofFeatures Approach for the Classification of Melanomas in Dermoscopy Images: The Role of Color and Texture Descriptors / Catarina Barata, Margarida Ruela, Teresa Mendonça and Jorge S. Marques
 Automatic Diagnosis of Melanoma Based on the 7Point Checklist / Gabriella Fabbrocini, Valerio De Vita, Sara Cacciapuoti, Giuseppe Di Leo [and 4 others]
 Dermoscopy Image Processing for Chinese / Fengying Xie, Yefen Wu, Zhiguo Jiang and Rusong Meng
 Automated Detection of Melanoma in Dermoscopic Images / Jose Luis García Arroyo and Begoña García Zapirain
 Melanoma Decision Support Using LightingCorrected Intuitive Feature Models / Robert Amelard, Jeffrey Glaister, Alexander Wong and David A. Clausi
 Texture Information in Melanocytic Skin Lesion Analysis Based on Standard Camera Images / Pablo G. Cavalcanti and Jacob Scharcanski
 Recovering Skin Reflectance and Geometry for Diagnosis of Melanoma / Jiuai Sun, Zhao Liu, Yi Ding and Melvyn Smith
 Melanoma Diagnosis with Multiple Decision Trees / Yu Zhou and Zhuoyi Song.
 Liddell, Heather Mary.
 Bristol. Eng. : Adam Hilger, 1981.
 Description
 Book — 194 p. : ill. ; 25 cm.
 Online
SAL3 (offcampus storage)
SAL3 (offcampus storage)  Status 

Stacks  Request (opens in new tab) 
TS513 .L5  Available 
 Grey, John M.
 [Stanford, Calif.] 1975.
 Description
 Book — x,149 leaves. illus.
 Online
SAL3 (offcampus storage), Special Collections
SAL3 (offcampus storage)  Status 

Stacks  Request (opens in new tab) 
3781 1975 G  Available 
Special Collections  Status 

University Archives  Request via Aeon (opens in new tab) 
03781 1975 G  Inlibrary use 
 Cyganek, Bogusław.
 Chichester, West Sussex, U.K. : Wiley, 2009.
 Description
 Book — xx, 483 p., [8] p. of plates : ill. (some col.) ; 25 cm.
 Summary

 Preface. Acknowledgements. Notation and Abbreviations. Part I. 1 Introduction. 1.1 Stereopair Images and Depth Perception. 1.2 3D Vision Systems. 1.3 3D Vision Applications. 1.4 Contents Overview: The 3D Vision Task in Stages. 2 Brief History of Research on Vision. 2.1 Abstract. 2.2 Retrospective of Vision Research. 2.3 Closure. Part II. 3 2D and 3D Vision Formation. 3.1 Abstract. 3.2 Human Visual System. 3.3 Geometry and Acquisition of a Single Image. 3.4 Stereoscopic Acquisition Systems. 3.5 Stereo Matching Constraints. 3.6 Calibration of Cameras. 3.7 Practical Examples. 3.8 Appendix: Derivation of the Pinhole Camera Transformation. 3.9 Closure. 4 Lowlevel Image Processing for Image Matching. 4.1 Abstract. 4.2 Basic Concepts. 4.3 Discrete Averaging. 4.4 Discrete Differentiation. 4.5 Edge Detection. 4.6 Structural Tensor. 4.7 Corner Detection. 4.8 Practical Examples.
 4.9 Closure. 5 Scalespace Vision. 5.1 Abstract. 5.2 Basic Concepts. 5.3 Constructing a Scalespace. 5.4 Multiresolution Pyramids. 5.5 Practical Examples. 5.6 Closure. 6 Image Matching Algorithms. 6.1 Abstract. 6.2 Basic Concepts. 6.3 Match Measures. 6.4 Computational Aspects of Matching. 6.5 Diversity of Stereo Matching Methods. 6.6 Areabased Matching. 6.7 Areabased Elastic Matching. 6.8 Featurebased Image Matching. 6.9 Gradientbased Matching. 6.10 Method of Dynamic Programming. 6.11 Graph Cut Approach. 6.12 Optical Flow. 6.13 Practical Examples. 6.14 Closure. 7 Space Reconstruction and Multiview Integration. 7.1 Abstract. 7.2 General 3D Reconstruction. 7.3 Multiview Integration. 7.4 Closure. 8 Case Examples. 8.1 Abstract. 8.2 3D System for VisionImpaired Persons. 8.3 Face and Body Modelling. 8.4 Clinical and Veterinary Applications. 8.5 Movie Restoration. 8.6 Closure. Part III. 9 Basics of the Projective Geometry. 9.1 Abstract. 9.2 Homogeneous Coordinates. 9.3 Point, Line and the Rule of Duality. 9.4 Point and Line at Infinity. 9.5 Basics on Conics. 9.6 Group of Projective Transformations. 9.7 Projective Invariants. 9.8 Closure. 10 Basics of Tensor Calculus for Image Processing. 10.1 Abstract. 10.2 Basic Concepts. 10.3 Change of a Base. 10.4 Laws of Tensor Transformations. 10.5 The Metric Tensor. 10.6 Simple Tensor Algebra. 10.7 Closure. 11 Distortions and Noise in Images. 11.1 Abstract. 11.2 Types and Models of Noise. 11.3 Generating Noisy Test Images. 11.4 Generating Random Numbers with Normal Distributions. 11.5 Closure. 12 Image Warping Procedures. 12.1 Abstract. 12.2 Architecture of the Warping System. 12.3 Coordinate Transformation Module. 12.4 Interpolation of Pixel Values. 12.5 The Warp Engine. 12.6 Software Model of the Warping Schemes. 12.7 Warp Examples. 12.8 Finding the Linear Transformation from Point Correspondences. 12.9 Closure. 13 Programming Techniques for Image Processing and Computer Vision. 13.1 Abstract. 13.2 Useful Techniques and Methodology. 13.3 Design Patterns. 13.4 Object Lifetime and Memory Management. 13.5 Image Processing Platforms. 13.6 Closure. 14 Image Processing Library. References. Index.
 (source: Nielsen Book Data)
(source: Nielsen Book Data)
Engineering Library (Terman)
Engineering Library (Terman)  Status 

Stacks  
TA1634 .C94 2009  Unknown 
 Higgins, R. V. (Ralph V.), 1903 author.
 [Washington, D.C.] : U.S. Department of the Interior, Bureau of Mines, 1966.
 Description
 Book — ii, 49 pages : illustrations ; 27 cm.
Green Library
Green Library  Status 

Find it US Federal Documents  
I 28.23:67606775  Unknown 
 Avaliação de técnicas de tratamento por computador de dados digitais MSSLANDSAT na discriminação litológica na Serra do Ramalho, Estado da Bahia.
 Paradella, Waldir Renato.
 [Sao Jose, Brazil] : Instituto de Pesquisas Espaciais, [1984]
 Description
 Book — 1 v. : ill. ; 28 cm.
 Online
Green Library
Green Library  Status 

Find it US Federal Documents  
NAS 1.26:174124  Unknown 
Articles+
Journal articles, ebooks, & other eresources
Guides
Course and topicbased guides to collections, tools, and services.