Academic literature on the topic 'Counter data'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Counter data.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Counter data"

1

Dalton, Craig M., and Tim Stallmann. "Counter-mapping data science." Canadian Geographer / Le Géographe canadien 62, no. 1 (August 25, 2017): 93–101. http://dx.doi.org/10.1111/cag.12398.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Noakes, J. E., J. D. Spaulding, and R. J. Valenta. "Low-Level Liquid Scintillation Counter Array with Computerized Data Acquisition and Age Calculation Capabilities for 14C Dating." Radiocarbon 37, no. 2 (1995): 773–79. http://dx.doi.org/10.1017/s0033822200031325.

Full text
Abstract:
We describe a two-phase study directed toward background reduction of a manual liquid scintillation counter and the interfacing of electronics for counting to a computer data acquisition system. Counter background reduction is achieved with afterpulse electronics, a high-performance cocktail, an auxiliary detector/guard and a special sample vial holder. The data acquisition system is comprised of an electronic signal processor and sorter for operating up to eight counters simultaneously and interfacing to a computer with software for data storage, acquisitions and age dating calculations. We discuss low-background counter modifications, electronic signal processing and computer software for 14C age dating.
APA, Harvard, Vancouver, ISO, and other styles
3

Carmi, Israel. "Rehovot Radiocarbon Measurements III." Radiocarbon 29, no. 1 (1987): 100–114. http://dx.doi.org/10.1017/s0033822200043599.

Full text
Abstract:
This list contains results obtained between 1981 and 1985. Since the first description of the laboratory (Carmi, Noter & Schlesinger, 1971) the following changes were made. Two proportional counters are now used: 1) 0.5L volume, 0.865 ± 0.023 cpm background, 12.830 ± .134 cpm NBS oxalic acid standard (old); 2) 0.25L volume, 0.484 ± 0.023 cpm background, 6.185 ± .123 cpm NBS oxalic acid standard (old). The passive shield has been increased by 2cm of mercury next to the counters. For anticoincidence, a modular, hand-made gas counter is used. The laboratory was transferred to the ground floor of a 7-storey building. Data acquisition and processing are done with a sealer/buffer built at the institute and an IBM PC computer. Samples are filled into the counters and counted for ca 1000min at least twice. The sample preparation method and counter filling pressure have not been changed.
APA, Harvard, Vancouver, ISO, and other styles
4

Suda, Yuko. "Transatlantic Politics of Data Transfer: Extraterritoriality, Counter-Extraterritoriality and Counter-Terrorism." JCMS: Journal of Common Market Studies 51, no. 4 (March 7, 2013): 772–88. http://dx.doi.org/10.1111/jcms.12017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Van Der Plicht, Johannes, H. J. Streurman, and G. R. Schreuder. "A New Data Acquisition System for the Groningen Counters." Radiocarbon 34, no. 3 (1992): 500–505. http://dx.doi.org/10.1017/s003382220006375x.

Full text
Abstract:
A new GPIB/IEEE-488 based data acquisition system has been built for the Groningen proportional counter setup, consisting of 11 counters. The IEEE bus is connected to an XT-compatible host PC. A versatile computer program controls the data entry; the same program can be used offline for final calculations.
APA, Harvard, Vancouver, ISO, and other styles
6

Negrini, Francesco, Giulio Gasperini, Eleonora Guanziroli, Jacopo Antonino Vitale, Giuseppe Banfi, and Franco Molteni. "Using an Accelerometer-Based Step Counter in Post-Stroke Patients: Validation of a Low-Cost Tool." International Journal of Environmental Research and Public Health 17, no. 9 (May 2, 2020): 3177. http://dx.doi.org/10.3390/ijerph17093177.

Full text
Abstract:
Monitoring the real-life mobility of stroke patients could be extremely useful for clinicians. Step counters are a widely accessible, portable, and cheap technology that can be used to monitor patients in different environments. The aim of this study was to validate a low-cost commercial tri-axial accelerometer-based step counter for stroke patients and to determine the best positioning of the step counter (wrists, ankles, and waist). Ten healthy subjects and 43 post-stroke patients were enrolled and performed four validated clinical tests (10 m, 50 m, and 6 min walking tests and timed up and go tests) while wearing five step counters in different positions while a trained operator counted the number of steps executed in each test manually. Data from step counters and those collected manually were compared using the intraclass coefficient correlation and mean average percentage error. The Bland–Altman plot was also used to describe agreement between the two quantitative measurements (step counter vs. manual counting). During walking tests in healthy subjects, the best reliability was found for lower limbs and waist placement (intraclass coefficient correlations (ICCs) from 0.46 to 0.99), and weak reliability was observed for upper limb placement in every test (ICCs from 0.06 to 0.38). On the contrary, in post-stroke patients, moderate reliability was found only for the lower limbs in the 6 min walking test (healthy ankle ICC: 0.69; pathological ankle ICC: 0.70). Furthermore, the Bland–Altman plot highlighted large average discrepancies between methods for the pathological group. However, while the step counter was not able to reliably determine steps for slow patients, when applied to the healthy ankle of patients who walked faster than 0.8 m/s, it counted steps with excellent precision, similar to that seen in the healthy subjects (ICCs from 0.36 to 0.99). These findings show that a low-cost accelerometer-based step counter could be useful for measuring mobility in select high-performance patients and could be used in clinical and real-world settings.
APA, Harvard, Vancouver, ISO, and other styles
7

Williams, N. "Data boost to counter gender inequality." Current Biology 11, no. 24 (December 2001): R999—R1000. http://dx.doi.org/10.1016/s0960-9822(01)00607-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Levin, Aaron. "Antipsychotic Adherence Data Counter Common Belief." Psychiatric News 42, no. 5 (March 2, 2007): 24–25. http://dx.doi.org/10.1176/pn.42.5.0024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Haochao, Eddie C. L. Chan, Xiaonan Guo, Jiang Xiao, Kaishun Wu, and Lionel M. Ni. "Wi-Counter: Smartphone-Based People Counter Using Crowdsourced Wi-Fi Signal Data." IEEE Transactions on Human-Machine Systems 45, no. 4 (August 2015): 442–52. http://dx.doi.org/10.1109/thms.2015.2401391.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dwivedi, Sanjay, and Prabhat Pandey. "Analysis on Investigative Data Mining in the Counter-Terrorism, Technology and Transparency." Journal of Advances and Scholarly Researches in Allied Education 15, no. 5 (July 1, 2018): 167–72. http://dx.doi.org/10.29070/15/57656.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Counter data"

1

Dutrisac, James George. "Counter-Surveillance in an Algorithmic World." Thesis, Kingston, Ont. : [s.n.], 2007. http://hdl.handle.net/1974/711.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rankin, Jenny Grant. "Over-the-Counter Data's Impact on Educators' Data Analysis Accuracy." Thesis, Northcentral University, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=3575082.

Full text
Abstract:

There is extensive research on the benefits of making data-informed decisions, but research also contains evidence many educators incorrectly interpret student data. Meanwhile, the types of detailed labeling on over-the-counter medication have been shown to improve use of non-medication products, as well. However, data systems most educators use to analyze student data usually display data without supporting guidance concerning the data's proper analysis. In this dissertation, the data-equivalent to over-the-counter medicine is termed over-the-counter data: essentially, enlisting medical label conventions to pair data reports with straightforward verbiage on the proper interpretation of report contents. The researcher in this experimental, quantitative study explored the inclusion of such supports in data systems and their reports. The cross-sectional sampling of 211 educators of varied backgrounds and roles at nine elementary and secondary schools throughout California answered survey questions regarding student data reports with varied forms of analysis guidance. Respondents' data analyses were found to be 307% more accurate when a report footer was present, 205% more accurate when an abstract was present, and 273% more accurate when an interpretation guide was present. These findings and others were significant and fill a void in field literature by containing evidence that can be used to identify how data systems can increase data analysis accuracy by offering analysis support through labeling and supplemental documentation. Recommendations for future research include measuring the impact over-the-counter data has on data analysis accuracy when all supports are offered to educators in concert. Keywords: abstract, analysis, data, data-driven decision-making, DDDM, data-informed decision-making, data system, data warehouse, footer, ICT, interpretation guide, report.

APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Dapeng. "Towards developing a goal-driven data integration framework for counter-terrorism analytics." VCU Scholars Compass, 2019. https://scholarscompass.vcu.edu/etd/5986.

Full text
Abstract:
Terrorist attacks can cause massive casualties and severe property damage, resulting in terrorism crises surging across the world; accordingly, counter-terrorism analytics that take advantage of big data have been attracting increasing attention. The knowledge and clues essential for analyzing terrorist activities are often spread across heterogeneous data sources, which calls for an effective data integration solution. In this study, employing the goal definition template in the Goal-Question-Metric approach, we design and implement an automated goal-driven data integration framework for counter-terrorism analytics. The proposed design elicits and ontologizes an input user goal of counter-terrorism analytics; recognizes goal-relevant datasets; and addresses semantic heterogeneity in the recognized datasets. Our proposed design, following the design science methodology, presents a theoretical framing for on-demand data integration designs that can accommodate diverse and dynamic user goals of counter-terrorism analytics and output integrated data tailored to these goals.
APA, Harvard, Vancouver, ISO, and other styles
4

Domin, Annika. "Konzeption eines RDF-Vokabulars für die Darstellung von COUNTER-Nutzungsstatistiken." Master's thesis, Universitätsbibliothek Leipzig, 2015. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-179416.

Full text
Abstract:
Die vorliegende Masterarbeit dokumentiert die Erstellung eines RDF-basierten Vokabulars zur Darstellung von Nutzungsstatistiken elektronischer Ressourcen, die nach dem COUNTER-Standard erstellt wurden. Die konkrete Anwendung dieses Vokabulars bildet das Electronic Resource Management System (ERMS), welches momentan von der Universitätsbibliothek Leipzig im Rahmen des kooperativen Projektes AMSL entwickelt wird. Dieses basiert auf Linked Data, soll die veränderten Verwaltungsprozesse elektronischer Ressourcen abbilden können und gleichzeitig anbieterunabhängig und flexibel sein. Das COUNTER-Vokabular soll aber auch über diese Anwendung hinaus einsetzbar sein. Die Arbeit gliedert sich in die beiden Teile Grundlagen und Modellierung. Im ersten Teil wird zu nächst die bibliothekarische Notwendigkeit von ERM-Systemen herausgestellt und der Fokus der Betrachtung auf das Teilgebiet der Nutzungsstatistiken und die COUNTER-Standardisierung gelenkt. Anschließend werden die technischen Grundlagen der Modellierung betrachtet, um die Arbeit auch für nicht mit Linked Data vertraute Leser verständlich zu machen. Darauf folgt der Modellierungsteil, der mit einer Anforderungsanalyse sowie der Analyse des den COUNTER-Dateien zugrunde liegenden XML-Schemas beginnt. Daran schließt sich die Modellierung des Vokabulars mit Hilfe von RDFS und OWL an. Aufbauend auf angestellten Überlegungen zur Übertragung von XML-Statistiken nach RDF und der Vergabe von URIs werden anschließend reale Beispieldateien manuell konvertiert und in einem kurzen Test erfolgreich überprüft. Den Abschluss bilden ein Fazit der Arbeit sowie ein Ausblick auf das weitere Verfahren mit den Ergebnissen. Das erstellte RDF-Vokabular ist bei GitHub unter der folgenden URL zur Weiterverwendung hinterlegt: https://github.com/a-nnika/counter.vocab
APA, Harvard, Vancouver, ISO, and other styles
5

Jacobson, Jessica. "Using Single Propeller Performance Data to Predict Counter-Rotating Propeller Performance for a High Speed Autonomous Underwater Vehicle." Thesis, Virginia Tech, 2007. http://hdl.handle.net/10919/32753.

Full text
Abstract:
The use of counter-rotating propellers is often desirable for aerospace and ocean engineering applications. Counter-rotating propellers offer higher peak efficiencies, better off-design performance, and roll control capabilities. But counter-rotating propeller matching is a difficult and complex procedure. Although much research has been done on the design of optimal counter-rotating propeller sets, there has been less focus on predicting the performance of unmatched counter-rotating sets. In this study, it was desired to use off-the-shelf marine propellers to make a counter-rotating pair for a high speed autonomous underwater vehicle (AUV). Counter-rotating propellers were needed to provide roll control for the AUV. Pre-existing counter-rotating propeller design methods were not applicable because they all require inputs of complex propeller blade geometries. These geometries are rarely known for off-the-shelf propellers.

This study proposes a new method for predicting the counter-rotating performance of unmatched propeller sets. It is suggested here that propeller performance curves can be used to predict counter-rotating thrust and torque performance.

Propeller performance tests were run in the Virginia Tech Water Tunnel for a variety of small, off-the shelf propellers. The collected data was used to generate the propeller performance curves. The propellers were then paired up and tested as counter-rotating sets. A momentum theory based model was formulated that predicted counter-rotating performance using the propeller performance data. The counter-rotating data was used to determine the effectiveness of the method.

A solution was found that successfully predicted the counter-rotating performance of all of the tested propeller sets using six interaction coefficients. The optimal values of these coefficients were used to write two counter-rotating performance prediction programs. The first program takes the forward and aft RPMs and the flow speed as inputs, and predicts the generated thrust and torque. The second program takes the flow speed and the desired thrust as inputs and calculates the forward and aft RPM values that will generate the desired thrust while producing zero torque. The second program was used to determine the optimal counter-rotating set for the HSAUV.
Master of Science

APA, Harvard, Vancouver, ISO, and other styles
6

Avadhani, Umesh D. "Data processing in a small transit company using an automatic passenger counter." Thesis, Virginia Tech, 1986. http://hdl.handle.net/10919/45669.

Full text
Abstract:

This thesis describes the work done in the second stage of the implementation of the Automatic Passenger Counter (APC) system at the Roanoke Valley - Metro Transit Company. This second stage deals with the preparation of a few reports and plots that would help the transit managers in efficiently managing the transit system. The reports and plots give an evaluation of the system and service operations by which the decision makers can support their decisions.

For an efficient management of the transit system, data on ridership activity, running times schedule information, and fare revenue is required. From this data it is possible to produce management information reports and summary statistics.

The present data collection program at Roanoke Valleyâ Metro is carried by using checkers and supervisors to collect ridership and schedule adherence information using manual methods. The information needed for efficient management of transit operations is both difficult and expensive to obtain. The new APC system offers the management with a new and powerful tool that will enhance their capability to make better decisions when allocating the service needs. The data from the APC are essential for the transit propertys ongoing planning and scheduling activites. The management could easily quantify the service demands on a route or for the whole system as desired by the user.


Master of Science
APA, Harvard, Vancouver, ISO, and other styles
7

Vavassori, Luca. "SSC: Single-Shot Multiscale Counter. : Counting Generic Objects in Images." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-264236.

Full text
Abstract:
Counting object in pictures is a computer vision task that has been explored in the past years, achieving state-of-the-art results thanks to the rise of convolutional neural networks. Most of the work focused on specific and limited domains to predict the number of just one category in the likes of people, cars, cells, and animals. Little effort has been employed to investigate methods to count the instances of different classes at the same time. This thesis work explored the different approaches present in the literature to understand their strenghts and weaknesses and eventually improve the accuracy and reduce the inference time of models aimed to estimate the number of multiple elements. At first, new techniques have been applied on top of the previously proposed algorithms to lower the prediction error. Secondly, the possibility to adapt an object detector to the counting task avoiding the localization prediction has been investigated. As a result, a new model called Single-Shot Multiscale Counter has been proposed, based on the architecture of the Single-Shot Multibox Detector. It achieved a lower prediction error on the ground truth count by 11% (from an mRMSE of 0.42 to 0.35) and an inference time 16x to 20x faster compared to the models found in the literature (from 1.25s to 0.049s).
Att räkna objekt i bilder är en datorvisionsuppgift som har utforskats under de senaste åren och uppnått toppmoderna resultat tack vare ökningen av invändiga neurala nätverk. De flesta av arbetena fokuserade på specifika och begränsade domäner för att förutsäga antalet bara en kategori som människor, bilar, celler och djur. Liten ansträngning har använts för att undersöka metoder för att räkna förekomsten av olika klasser samtidigt. Detta avhandlingsarbete utforskade de olika metoder som finns i litteraturen för att förstå deras styrka och svagheter och så småningom förbättra noggrannheten och minska inferingstiden för modeller som syftar till att uppskatta antalet flera element. Först har nya tekniker tillämpats ovanpå de tidigare föreslagna algoritmerna för att sänka förutsägelsefelet. För det andra har möjligheten att anpassa en objektdetektor till räkneuppgiften för att undvika lokaliseringsförutsägelse undersökts. Som ett resultat har en ny modell som heter Single-Shot Multiscale Counter föreslagits, baserad på arkitekturen för Single-Shot Multibox Detector. Den uppnådde ett lägre förutsägelsefel på sanningsräkningen på marken med 11 % (från en mRMSE på 0,42 till 0,35) och en slutningstid 16x till 20x snabbare jämfört med modellerna som finns i litteraturen (från 1,25 till 0,049 sek).
APA, Harvard, Vancouver, ISO, and other styles
8

Hua, Nan. "Space-efficient data sketching algorithms for network applications." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44899.

Full text
Abstract:
Sketching techniques are widely adopted in network applications. Sketching algorithms “encode” data into succinct data structures that can later be accessed and “decoded” for various purposes, such as network measurement, accounting, anomaly detection and etc. Bloom filters and counter braids are two well-known representatives in this category. Those sketching algorithms usually need to strike a tradeoff between performance (how much information can be revealed and how fast) and cost (storage, transmission and computation). This dissertation is dedicated to the research and development of several sketching techniques including improved forms of stateful Bloom Filters, Statistical Counter Arrays and Error Estimating Codes. Bloom filter is a space-efficient randomized data structure for approximately representing a set in order to support membership queries. Bloom filter and its variants have found widespread use in many networking applications, where it is important to minimize the cost of storing and communicating network data. In this thesis, we propose a family of Bloom Filter variants augmented by rank-indexing method. We will show such augmentation can bring a significant reduction of space and also the number of memory accesses, especially when deletions of set elements from the Bloom Filter need to be supported. Exact active counter array is another important building block in many sketching algorithms, where storage cost of the array is of paramount concern. Previous approaches reduce the storage costs while either losing accuracy or supporting only passive measurements. In this thesis, we propose an exact statistics counter array architecture that can support active measurements (real-time read and write). It also leverages the aforementioned rank-indexing method and exploits statistical multiplexing to minimize the storage costs of the counter array. Error estimating coding (EEC) has recently been established as an important tool to estimate bit error rates in the transmission of packets over wireless links. In essence, the EEC problem is also a sketching problem, since the EEC codes can be viewed as a sketch of the packet sent, which is decoded by the receiver to estimate bit error rate. In this thesis, we will first investigate the asymptotic bound of error estimating coding by viewing the problem from two-party computation perspective and then investigate its coding/decoding efficiency using Fisher information analysis. Further, we develop several sketching techniques including Enhanced tug-of-war(EToW) sketch and the generalized EEC (gEEC)sketch family which can achieve around 70% reduction of sketch size with similar estimation accuracies. For all solutions proposed above, we will use theoretical tools such as information theory and communication complexity to investigate how far our proposed solutions are away from the theoretical optimal. We will show that the proposed techniques are asymptotically or empirically very close to the theoretical bounds.
APA, Harvard, Vancouver, ISO, and other styles
9

Eriksson, Tilda. "Change Detection in Telecommunication Data using Time Series Analysis and Statistical Hypothesis Testing." Thesis, Linköpings universitet, Matematiska institutionen, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-94530.

Full text
Abstract:
In the base station system of the GSM mobile network there are a large number of counters tracking the behaviour of the system. When the software of the system is updated, we wish to find out which of the counters that have changed their behaviour. This thesis work has shown that the counter data can be modelled as a stochastic time series with a daily profile and a noise term. The change detection can be done by estimating the daily profile and the variance of the noise term and perform statistical hypothesis tests of whether the mean value and/or the daily profile of the counter data before and after the software update can be considered equal. When the chosen counter data has been analysed, it seems to be reasonable in most cases to assume that the noise terms are approximately independent and normally distributed, which justies the hypothesis tests. When the change detection is tested on data where the software is unchanged and on data with known software updates, the results are as expected in most cases. Thus the method seems to be applicable under the conditions studied.
APA, Harvard, Vancouver, ISO, and other styles
10

Feng, Shiguang. "The Expressive Power, Satisfiability and Path Checking Problems of MTL and TPTL over Non-Monotonic Data Words." Doctoral thesis, Universitätsbibliothek Leipzig, 2016. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-208823.

Full text
Abstract:
Recently, verification and analysis of data words have gained a lot of interest. Metric temporal logic (MTL) and timed propositional temporal logic (TPTL) are two extensions of Linear time temporal logic (LTL). In MTL, the temporal operator are indexed by a constraint interval. TPTL is a more powerful logic that is equipped with a freeze formalism. It uses register variables, which can be set to the current data value and later these register variables can be compared with the current data value. For monotonic data words, Alur and Henzinger proved that MTL and TPTL are equally expressive and the satisfiability problem is decidable. We study the expressive power, satisfiability problems and path checking problems for MLT and TPTL over all data words. We introduce Ehrenfeucht-Fraisse games for MTL and TPTL. Using the EF-game for MTL, we show that TPTL is strictly more expressive than MTL. Furthermore, we show that the MTL definability problem that whether a TPTL-formula is definable in MTL is not decidable. When restricting the number of register variables, we are able to show that TPTL with two register variables is strictly more expressive than TPTL with one register variable. For the satisfiability problem, we show that for MTL, the unary fragment of MTL and the pure fragment of MTL, SAT is not decidable. We prove the undecidability by reductions from the recurrent state problem and halting problem of two-counter machines. For the positive fragments of MTL and TPTL, we show that a positive formula is satisfiable if and only it is satisfied by a finite data word. Finitary SAT and infinitary SAT coincide for positive MTL and positive TPTL. Both of them are r.e.-complete. For existential TPTL and existential MTL, we show that SAT is NP-complete. We also investigate the complexity of path checking problems for TPTL and MTL over data words. These data words can be either finite or infinite periodic. For periodic words without data values, the complexity of LTL model checking belongs to the class AC^1(LogDCFL). For finite monotonic data words, the same complexity bound has been shown for MTL by Bundala and Ouaknine. We show that path checking for TPTL is PSPACE-complete, and for MTL is P-complete. If the number of register variables allowed is restricted, we obtain path checking for TPTL with only one register variable is P-complete over both infinite and finite data words; for TPTL with two register variables is PSPACE-complete over infinite data words. If the encoding of constraint numbers of the input TPTL-formula is in unary notation, we show that path checking for TPTL with a constant number of variables is P-complete over infinite unary encoded data words. Since the infinite data word produced by a deterministic one-counter machine is periodic, we can transfer all complexity results for the infinite periodic case to model checking over deterministic one-counter machines.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Counter data"

1

Thuraisingham, Bhavani. Web Data Mining and Applications in Business Intelligence and Counter-Terrorism. London: Taylor and Francis, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Baccelli, F. Stationary ergodic Jackson networks: Results and counter-examples. Bristol [England]: Hewlett Packard, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Natow, Annette B. The most complete food counter. 2nd ed. New York: Pocket Books, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Miller, C. J. Euler analysis comparison with LDV data for a advanced counter-rotation propfan at cruise. [Washington, DC: National Aeronautics and Space Administration, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Skoudis, Ed. Counter hack: A step-by-step guide to computer attacks and effective defenses. Upper Saddle River, N.J: Prentice Hall PTR, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ed, Skoudis, and Liston Tom, eds. Counter hack reloaded: A step-by-step guide to computer attacks and effective defenses. 2nd ed. Upper Saddle River, NJ: Prentice Hall Professional Technical Reference, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Levy-Ryan, Ellen. Moored current meter data from the Atlantic north equatorial counter current near 6⁰ N 28⁰ W (March-October, 1984): Vol. XXXVII. Woods Hole, Mass: Woods Hole Oceanographic Institution, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kotlar, Kim Leslie. Predicting actions taken to counter economic sanctions: An examination of U.S. government financial data collection and its usefulness in determining if foreign governments anticipate economic sanctions : a case study of Iraq. Monterey, Calif: Naval Postgraduate School, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

United States. Agency for International Development. Bureau for Africa. Office of Sustainable Development. Country data profile: Orphans : 14 focus countries. Washington, D.C.]: U.S. Agency for International Development, Bureau for Africa, Office of Sustainable Development, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bangsund, Dean A. North Dakota county government expenditures, 1977-1986 data sets. Fargo, N.D: Dept. of Agricultural Economics, Agricultural Experiment Station, North Dakota State University, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Counter data"

1

Lehr, Peter. "Prediction and Postdiction: Real-Time Data Mining and Data Analytics." In Counter-Terrorism Technologies, 81–99. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-90924-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Demri, Stéphane. "Counter Systems for Data Logics." In Logics in Artificial Intelligence, 10. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15675-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

De Franceschi, Alberto. "Personal Data as Counter-Performance." In Services and Business Process Reengineering, 59–71. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3049-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Yao, and Yuntao Qian. "Semi-supervised Dynamic Counter Propagation Network." In Advanced Data Mining and Applications, 533–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11811305_59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Androulidakis, Iosif, and Fragkiskos – Emmanouil Kioupakis. "Interception of Computer Data." In Industrial Espionage and Technical Surveillance Counter Measurers, 23–36. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-28666-2_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cate, Fred H. "Legal Standards for Data Mining." In Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 393–420. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2006. http://dx.doi.org/10.1002/047178656x.ch20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ren, Pei, Hui Liu, and Fengyin Li. "Research on Friendvertising-Counter Technology in Big Data." In Machine Learning for Cyber Security, 283–89. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62460-6_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ammar, R. A., S. A. Demurjian, I. R. Greenshields, K. Pattipati, and S. Rajasekaran. "Analysis of Heterogeneous Data in Ultrahigh Dimensions." In Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 105–24. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2006. http://dx.doi.org/10.1002/047178656x.ch5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hoens, T. Ryan, and Nitesh V. Chawla. "Generating Diverse Ensembles to Counter the Problem of Class Imbalance." In Advances in Knowledge Discovery and Data Mining, 488–99. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13672-6_46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Meitei, Moirangthem Goldie, and Biswaraj Sen. "A Study on Few Approaches to Counter Security Breaches in MANETs." In Advances in Communication, Cloud, and Big Data, 105–16. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8911-4_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Counter data"

1

Xenopoulos, Peter, Harish Doraiswamy, and Claudio Silva. "Valuing Player Actions in Counter-Strike: Global Offensive." In 2020 IEEE International Conference on Big Data (Big Data). IEEE, 2020. http://dx.doi.org/10.1109/bigdata50022.2020.9378154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Larson, Jonathan, Bryan Tower, Duane Hadfield, Darren Edge, and Christopher White. "Using Web-Scale Graph Analytics to Counter Technical Support Scams." In 2018 IEEE International Conference on Big Data (Big Data). IEEE, 2018. http://dx.doi.org/10.1109/bigdata.2018.8621871.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Demri, Stephane, Diego Figueira, and M. Praveen. "Reasoning about Data Repetitions with Counter Systems." In 2013 Twenty-Eighth Annual IEEE/ACM Symposium on Logic in Computer Science (LICS 2013). IEEE, 2013. http://dx.doi.org/10.1109/lics.2013.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sharma, Rishi R., and Shilpi Sharma. "A novel Approach to counter Ransomwares." In 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence). IEEE, 2020. http://dx.doi.org/10.1109/confluence47617.2020.9058190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Farina, A., and L. Timmoneri. "Live data test of Electronic Counter Counter Measures (ECCM) on a multifunctional prototype radar." In 2016 IEEE Metrology for Aerospace (MetroAeroSpace). IEEE, 2016. http://dx.doi.org/10.1109/metroaerospace.2016.7573176.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Madhira, Kartik, and Aditya Shukla. "Pedestrian flow counter using image processing." In 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS). IEEE, 2017. http://dx.doi.org/10.1109/icecds.2017.8389782.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nie, Sanjun, and Duoyong Sun. "Research on counter-terrorism based on big data." In 2016 IEEE International Conference on Big Data Analysis (ICBDA). IEEE, 2016. http://dx.doi.org/10.1109/icbda.2016.7509788.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Carvalho, Bruno F., Caio C. M. Silva, Alessandra M. Silva, Fábio Buiati, and Rafael Timóteo. "Evaluation of an Arduino-based IoT Person Counter." In International Conference on Internet of Things and Big Data. SCITEPRESS - Science and and Technology Publications, 2016. http://dx.doi.org/10.5220/0005954601290136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Takahashi, Hiroki, Masato Kawase, and Noboru Ouchi. "Application of Trigger Counter Board for Synchronized Data." In Proceedings of the 2nd International Symposium on Science at J-PARC — Unlocking the Mysteries of Life, Matter and the Universe —. Journal of the Physical Society of Japan, 2015. http://dx.doi.org/10.7566/jpscp.8.012020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Xu, Feifei, Yuxiong Ji, and Lijun Sun. "Transit Service Design Using Automatic Passenger Counter Data." In 15th COTA International Conference of Transportation Professionals. Reston, VA: American Society of Civil Engineers, 2015. http://dx.doi.org/10.1061/9780784479292.140.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Counter data"

1

Bennett, E. F. A continuous mode data acquisition technique for proton recoil proportional counter neutron spectrometers. Office of Scientific and Technical Information (OSTI), March 1989. http://dx.doi.org/10.2172/6317399.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chu, Xuehao. A Guidebook For Using Automatic Passenger Counter Data for National Transit Database (NTD) Reporting. Tampa, FL: University of South Florida, December 2010. http://dx.doi.org/10.5038/cutr-nctr-rr-2010-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pou, Jose, Jeff Duffany, and Alfredo Cruz. Terrorist Activity Evaluation and Pattern Detection (TAE&PD) in Afghanistan: A Knowledge Discovery and Data Mining (KDDM) Approach for Counter-Terrorism. Fort Belvoir, VA: Defense Technical Information Center, August 2012. http://dx.doi.org/10.21236/ada581564.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hill, George. Liposome Delivery of a Potential Antidote for Mustard Exposure. An Overview and Integration of Data for Phase One Experiments by the Mustard Consortium, Regarding the Use of Antioxidants as a Counter Measure to Mustard. Fort Belvoir, VA: Defense Technical Information Center, October 2000. http://dx.doi.org/10.21236/ada394063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bertanha, Marinho, and Petra Moser. Spatial Errors in Count Data Regressions. Cambridge, MA: National Bureau of Economic Research, August 2014. http://dx.doi.org/10.3386/w20374.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Schaefer, Andrew, Jessica Carson, and Marybeth Mattingly. Data Snapshot: Poverty Estimates for New Hampshire Counties. University of New Hampshire Libraries, 2017. http://dx.doi.org/10.34051/p/2020.308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wraight, Sarah, Julia Hofmann, Justine Allpress, and Brooks Depro. Environmental justice concerns and the proposed Atlantic Coast Pipeline route in North Carolina. RTI Press, March 2018. http://dx.doi.org/10.3768/rtipress.2018.mr.0037.1803.

Full text
Abstract:
This report describes publicly available data sets and quantitative analysis that local communities can use to evaluate environmental justice concerns associated with pipeline projects. We applied these data and analytical methods to two counties in North Carolina (Northampton and Robeson counties) that would be affected by the proposed Atlantic Coast Pipeline (ACP). We compared demographic and vulnerability characteristics of census blocks, census block groups, and census tracts that lie within 1 mile of the proposed pipeline route with corresponding census geographies that lie outside of the 1-mile zone. Finally, we present results of a county-level analysis of race and ethnicity data for the entire North Carolina segment of the proposed ACP route. Statistical analyses of race and ethnicity data (US Census Bureau) and Social Vulnerability Index scores (University of South Carolina’s Hazards & Vulnerability Research Institute) yielded evidence of significant differences between the areas crossed by the pipeline and reference geographies. No significant differences were found in our analyses of household income and cancer risk data.
APA, Harvard, Vancouver, ISO, and other styles
8

DOE. Data Report Project Shoal Area, Churchill County, Nevada. Office of Scientific and Technical Information (OSTI), July 1998. http://dx.doi.org/10.2172/16837.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sato, Grace Sato, and Sarina Dayal Dayal. Investing in Indian Country: Bush Foundation Evaluates Its Data. New York, NY United States: GrantCraft, September 2019. http://dx.doi.org/10.15868/socialsector.35524.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gradín, Carlos. WIID Companion (March 2021): data selection. UNU-WIDER, March 2021. http://dx.doi.org/10.35188/unu-wider/wtn/2021-4.

Full text
Abstract:
This document is part of a series of technical notes describing the compilation of a new companion database that complements the World Income Inequality Database (WIID). It aims at facilitating the analysis of inequality as well as progress in achieving the global goal of reducing inequality within and across countries. This new dataset also includes an annual series reporting the income distribution at the percentile level for all citizens in the world, regardless of where they live, from 1950 to the present. This technical note describes the first stage in constructing the first version of the companion datasets: data selection. It provides an overview of the approach followed in the selection of the series from different sources with information on income distribution and inequality that best represent each country and period. It also discusses the general criteria used and their implementation, which are illustrated with a few country examples.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography