Flylib.com
256.
Previous page
Table of content
Next page
[Cover] [Abbreviated Contents] [Contents] [Index]
Page xi
CONTENTS
Part I
Fractals
Introduction
1.1.1 The Difference between Non-Fractal and Fractal Objects
4
1.1.2 The Sizes of the Features of Non-Fractal and Fractal Objects
6
1.1.3 The Properties of Fractals
8
Self-Similarity
1.2.1 Two Types of Self-Similarity
12
1.2.2 Examples of Self-Similarity in Space
14
1.2.3 Examples of Self-Similarity in Time
16
1.2.4 he Currents through Ion Channels Are Self-Similar in Time
18
1.2.5 The Open and Closed Times of Ion Channels Are Statistically Self-Similar
20
1.2.6 More Examples of Self-Similarity
22
1.2.7 Biological Implications of Self-Similarity
24
Scaling
1.3.1 Self-Similarity Implies a Scaling Relationship
28
1.3.2 Scaling Relationships
30
1.3.3 Example of a Power Law Scaling of a Spatial Object: The Length of the Coastline of Britain
32
1.3.4 Examples of Power Law Scalings of Spatial Objects: The Surfaces of Cell Membranes
34
1.3.5 Example of a Power Law Scaling of a Process in Time: Ion Channel Kinetics
36
1.3.6 The Physical Significance of the Scaling Relationship of Ion Channel Kinetics
38
1.3.7 More Examples of Scaling Relationships
40
1.3.8 Biological Implications of Scaling Relationships
42
[Cover] [Abbreviated Contents] [Contents] [Index]
Previous page
Table of content
Next page
Fractals and Chaos Simplified for the Life Sciences
ISBN: 0195120248
EAN: 2147483647
Year: 2005
Pages: 261
Authors:
Larry S. Liebovitch
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Object Types, Predicates, and Basic Constraints
Configuring, Manipulating, and Reusing ORM Models
Mapping ORM Models to Logical Database Models
Logical Database Model Reports
Other Features and Best Practices
Beginning Cryptography with Java
Message Digests, MACs, and HMACs
Distinguished Names and Certificates
CMS and S/MIME
SSL and TLS
Appendix B Algorithms Provided by the Bouncy Castle Provider
Oracle Developer Forms Techniques
Summary
Summary
Deficiencies in Forms Error-Message Handling
Inheritance
A Block Level Commit
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Counting Instances of Each Word in a Text File
Determining a Days Number Within a Given Year
Combining Two Paths into a Single Path
Filtering Values Outside a Given Range
Implementing Fixed-Point Numbers
101 Microsoft Visual Basic .NET Applications
Working with the .NET Framework
Advanced .NET Framework
Building Enterprise Services Applications
Securing Applications
Coding Conventions
Mapping Hacks: Tips & Tools for Electronic Cartography
Hacks 1-13
Hack 13. Add Maps to Excel Spreadsheets with MapPoint
Hack 20. Make 3-D Raytraced Terrain Models
Hacks 22-34
Hack 91. Build Interactive Web-Based Map Applications
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies