Author of the publication

EEG Markers for Characterizing Anomalous Activities of Cerebral Neurons in NAT (Neuronal Activity Topography) Method.

, , , , , and . IEEE Trans. Biomed. Engineering, 60 (8): 2332-2338 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Tanaka, Mieko
add a person with the name Tanaka, Mieko
 

Other publications of authors with the same name

Normalized power variance change between pre-ictal and ictal phase of an epilepsy patient using NAT analysis: A case study., , , , , , , , , and 1 other author(s). EMBC, page 437-440. IEEE, (2013)EEG Markers for Characterizing Anomalous Activities of Cerebral Neurons in NAT (Neuronal Activity Topography) Method., , , , , and . IEEE Trans. Biomed. Engineering, 60 (8): 2332-2338 (2013)Human Random Generation and Its Applications.. ICSOFT (PL/DPS/KE), page 396-399. INSTICC Press, (2008)Extracting Quarterly Trends of Tokyo Stock Market by Means of RMT-PCA., , and . KES, volume 243 of Frontiers in Artificial Intelligence and Applications, page 2028-2036. IOS Press, (2012)Can Random Generation Measure the Human Brain?. ICONIP, page 215-218. IOA Press, (1998)Finding a Prototype Form of Sustainable Strategies for the Iterated Prisoners Dilemma., and . HCI (15), volume 8018 of Lecture Notes in Computer Science, page 616-624. Springer, (2013)Statistical distribution of the sub-second price fluctuation in the latest arrowhead market., , and . KES, volume 126 of Procedia Computer Science, page 1029-1036. Elsevier, (2018)Market efficiency is truly enhanced in sub-second trading market., and . KES, volume 159 of Procedia Computer Science, page 544-551. Elsevier, (2019)Arbitrage chances and the non-Gaussian features of financial data., , and . CIFEr, page 237-242. IEEE, (2003)Personal ID System by Means of Random Input Passwords., , and . KES, volume 60 of Procedia Computer Science, page 1817-1825. Elsevier, (2015)