Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
73,243
result(s) for
"Windows operating system"
Sort by:
MEGA X: Molecular Evolutionary Genetics Analysis across Computing Platforms
by
Knyaz, Christina
,
Kumar, Sudhir
,
Tamura, Koichiro
in
Bioinformatics
,
Computation
,
Data analysis
2018
The Molecular Evolutionary Genetics Analysis (Mega) software implements many analytical methods and tools for phylogenomics and phylomedicine. Here, we report a transformation of Mega to enable cross-platform use on Microsoft Windows and Linux operating systems. Mega X does not require virtualization or emulation software and provides a uniform user experience across platforms. Mega X has additionally been upgraded to use multiple computing cores for many molecular evolutionary analyses. Mega X is available in two interfaces (graphical and command line) and can be downloaded from www.megasoftware.net free of charge.
Journal Article
042 Scottish code red audit report 2015–2017
2019
The Scottish Transfusion and Laboratory Support in Trauma (TLST) group previously audited all National Code Red activations between June 1st 2013 and October 31st 2015, generating a number of recommendations to be adopted to optimise the transfusion support given to patients following major trauma in Scotland. A repeat audit was undertaken for all patients for whom a Code Red was activated between 1st November 2015 and 31st December 2017.A clinical and transfusion lead for each centre entered anonymised data onto a secure electronic database (REDCAP; http://www.project-redcap.org) the server of which is held within the University of Edinburgh. This database was maintained by the Edinburgh study team. Each of Scotland’s pre-hospital trauma teams who take patients to hospitals where Code Red Policy is in place, and the receiving hospitals, agreed to enter data into the National Code Red audit for all patients for whom a Code Red was activated during the study period. The project was deemed a service evaluation by the South East Scotland Research Ethics committee (Ref: NR/1408AB11) and therefore did not require full ethics submission. The project was also registered with each hospital’s clinical effectiveness/governance teams where available, and a favourable Caldicott opinion was obtained.Abstract 042 Figure 1Flow chart showing transfusion events and outcomes of code red patientsAbstract 042 Figure 2Ratio of the mean number of concentrated red cells (CRC) and fresh frozen plasma (FFP) transfused to code red patients at 30 minute intervalsAbstract 042 Table 166 activations (24 South-East of Scotland, 32 West, 10 East). Mean age 45 years, 88% male patients. 93% of Code Red patients received blood components with a 300% increase in pre-hospital transfusion (48 patients; 73%); median time from 999 call to Code Red activation reduced to 37 minutes from 70 minutes; 78% patients received pre-hospital TXA (improved from 70%). CRC:FFP ratios improved in comparison to 2013–15. Survival to discharge increased (63% to 66%) despite increased ISS.Code Red practice has improved since our last audit. There are still improvements to be made in TXA administration and time to blood products.
Journal Article
Stress testing of Docker containers running on a Windows operating system
2022
At the moment, Docker technology is becoming more prevalent in the Windows environment. The pertinent topic in this regard is how Docker containers running on the Windows operating system would behave in the event of a resource deficit. The article discusses circumstances in which there is insufficient processor or RAM to service all running containers. It is proposed to employ stress and volume testing to investigate the stability and reliability of Docker containers. The purpose of stress testing is to determine how the system behaves when the load on the application is greatly increased in comparison to what was initially expected. By delivering enormous amounts of data for processing, volume testing is accomplished. To assess container performance during stress testing, a Prometheus-based technology stack is used. Docker containers running in a Windows system have been shown to operate predictably under extreme load conditions. As the processor load increases, the performance of the containerized program drops proportionately to the decrease in processor time allocated. When there is insufficient RAM to run all containers, Docker uses virtual memory to dynamically distribute memory amongst containers. If a container's execution is halted due to a lack of available RAM on the system, the container's execution is terminated. Other containers continue to function normally.
Journal Article
Exploring Windows 8 for Dummies
2012,2013
Get up to speed on Windows 8! Exploring Windows 8 For Dummies packs 168 pages of magazine-style articles, lavish illustrations, and great tips into an eye-catching publication that shows you how to use the new Windows 8 operating system from start to finish. Explore new features, like the touchscreen-style interface, a big change from the classic Windows look and feel. Ideal for the reader who is already familiar with the Windows operating system, but just needs the basics on the move to Windows 8, you'll also discover new apps, new ways to handle traditional tasks, and much more. Helps readers get up to speed quickly and get the most out of the new Windows 8 operating systemBreaks down Windows 8 features and functions into a series of magazine-style spreads that offer full-color illustrations and step-by-step instructionOffers a value-priced helping hand to readers who want the basics of Windows 8Covers new Windows 8 features, getting e-mail and getting online, organizing pictures, exploring the app market, networking, printing, troubleshooting, and more Explore Windows 8 and enjoy the ride with this fun and unique new guide.
QuickFigures: A toolkit and ImageJ PlugIn to quickly transform microscope images into scientific figures
2021
Publications involving fluorescent microscopy images generally contain many panels with split channels, merged images, scale bars and label text. Similar layouts of panels are used when displaying other microscopy images, electron micrographs, photographs, and other images. Assembling and editing these figures with even spacing, consistent font, text position, accurate scale bars, and other features can be tedious and time consuming. In order to save time, I have created a toolset and ImageJ Plugin called QuickFigures. QuickFigures includes many helpful features that streamline the process of creating, aligning, and editing scientific figures. Those features include tools that automatically create split channel figures from a region of interest (“Quick Figure” button and “Inset Tool”), layouts that make it easy to rearrange panels, multiple tools to align objects, and “Figure Format” menu options that help a user ensure that large numbers of figures have consistent appearance. QuickFigures was compared to previous tools by measuring the amount of time needed for a user to create a figure using each software (QuickFigures, OMERO.figure. EZFig, FigureJ and PowerPoint). QuickFigures significantly reduced the amount of time required to create a figure. The toolsets were also compared by checking each software against a list of features. QuickFigures had the most extensive set of features. Therefore, QuickFigures is an advantageous alternative to traditional methods of constructing scientific figures. After a user has saved time by creating their work in QuickFigures, the figures can be exported to a variety of formats including PowerPoint, PDF, SVG, PNG, TIFF and Adobe Illustrator. Export was successfully tested for each file format and object type. Exported objects and text are editable in their target software, making them suitable for sharing with collaborators. The software is free, open source and can be installed easily.
Journal Article
System Center 2016 Virtual Machine Manager Cookbook
by
Levchenko, Roman
,
CARDOSO, Edvaldo Alessandro
in
COMPUTERS / Computer Science
,
Information technology-Management
,
Microsoft System center configuration manager
2018,2024
Microsoft System Center Virtual Machine Manager (SCVMM) focuses on efficiency with multiple features to help administrators consolidate physical servers within a centrally virtualized environment. This book will allow you to implement the Microsoft System Center family of components effectively and efficiently.
Noise Reduction and Localization Accuracy in a Mobile Magnetoencephalography System
by
Smith, Vanessa
,
Bardouille, Timothy
,
Vajda, Elias
in
Accuracy
,
Computer software industry
,
cylindrical shield
2024
Magnetoencephalography (MEG) non-invasively provides important information about human brain electrophysiology. The growing use of optically pumped magnetometers (OPM) for MEG, as opposed to fixed arrays of cryogenic sensors, has opened the door for innovation in system design and use cases. For example, cryogenic MEG systems are housed in large, shielded rooms to provide sufficient space for the system dewar. Here, we investigate the performance of OPM recordings inside of a cylindrical shield with a 1 × 2 m2 footprint. The efficacy of shielding was measured in terms of field attenuation and isotropy, and the value of post hoc noise reduction algorithms was also investigated. Localization accuracy was quantified for 104 OPM sensors mounted on a fixed helmet array based on simulations and recordings from a bespoke current dipole phantom. Passive shielding attenuated the vector field magnitude to 50.0 nT at direct current (DC), to 16.7 pT/√Hz at power line, and to 71 fT/√Hz (median) in the 10–200 Hz range. Post hoc noise reduction provided an additional 5–15 dB attenuation. Substantial field isotropy remained in the volume encompassing the sensor array. The consistency of the isotropy over months suggests that a field nulling solution could be readily applied. A current dipole phantom generating source activity at an appropriate magnitude for the human brain generated field fluctuations on the order of 0.5–1 pT. Phantom signals were localized with 3 mm localization accuracy, and no significant bias in localization was observed, which is in line with performance for cryogenic and OPM MEG systems. This validation of the performance of a small footprint MEG system opens the door for lower-cost MEG installations in terms of raw materials and facility space, as well as mobile imaging systems (e.g., truck-based). Such implementations are relevant for global adoption of MEG outside of highly resourced research and clinical institutions.
Journal Article
Detection of asbestos-based cement rooftops in conflict-affected settings using EnMAP hyperspectral data: a research article
2025
In volatile, conflict-affected regions, rapidly mapping asbestos-cement rooftops is critical to mitigate health risks from airborne fibres. Over a 4-month field campaign (Nov 2023–Apr 2024), we partnered with the Israel Space Agency and Ministry of Environmental Protection to acquire disturbance-free field spectra at multiple Kibbutzim, Moshavim and cities, using an ASD FieldSpec 4 High-Res with both the SoilPro® apparatus and contact probe to build a comprehensive spectral library (Sup Figs.
5
–
14
). Leveraging EnMAP Level 2A hyperspectral imagery (17 May 2024), we applied MNF noise reduction, precise co-registration, and cloud/shadow masking before executing eight supervised classifiers; Linear Spectral Unmixing, Support Vector Machine, Spectral Angle Mapper, Adaptive Coherence Estimator, Mahalanobis Distance, Maximum Likelihood, Spectral Information Divergence, and Matched Filtering, in an iterative filtering cascade. Exhaustive ground-truth surveys across villages and cities achieved an 86% positive match rate despite urban complexity and security-driven coordinate restrictions. This integrative workflow combining rigorous field calibration, multi-algorithm spectral filtering, and exhaustive validation, demonstrates that orbit-based hyperspectral data can reliably map asbestos hazards at scale, guiding timely emergency response and long-term remediation in high-risk settings.
Journal Article
Testing Real-Time Applications on Windows 10 IOT Using the Nyquist Theory
by
Zarlis, M.
,
Nasution, Beny B.
,
Syahputa, Zulfahmi
in
Minicomputers
,
Operating systems
,
Real time
2019
Raspberry Pi is a mini-computer that is provided to carry out activities quickly and precisely, but Raspberry Pi was created to not be able to do the real-time system with the support of Windows 10 IoT operating system, so the real-time system can be done on Raspberry Pi. The real-time applied in the application needs to be tested with the Nyquist theory. The purpose of this study was to get real-time system measurements available on Windows 10 IoT. This test is done using the Nyquist theory by calculating the results of measurements on mp3 streaming performed on Windows 10 IoT.
Journal Article
Retrieving and Identifying Remnants of Artefacts on Local Devices Using Sync.com Cloud
by
Ninggal, Mohd Izuan Hafez
,
Ahmed, Abdulghani Ali
,
Farhan, Khalid
in
cloud company services
,
Cloud computing
,
cloud forensics
2025
Most current research in cloud forensics is focused on tackling the challenges encountered by forensic investigators in identifying and recovering artifacts from cloud devices. These challenges arise from the diverse array of cloud service providers as each has its distinct rules, guidelines, and requirements. This research proposes an investigation technique for identifying and locating data remnants in two main stages: artefact collection and evidence identification. In the artefacts collection stage, the proposed technique determines the location of the artefacts in cloud storage and collects them for further investigation in the next stage. In the evidence identification stage, the collected artefacts are investigated to identify the evidence relevant to the cybercrime currently being investigated. These two stages perform an integrated process for mitigating the difficulty of locating the artefacts and reducing the time of identifying the relevant evidence. The proposed technique is implemented and tested by applying a forensics investigation algorithm on Sync.com cloud storage using the Microsoft Windows 10 operating system.
Journal Article