Warning: file_put_contents(cache/omni_33289c3e8d515ed0d560661d4bcc2aeb.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →
Fundamentals of Biomechanics
Equilibrium, Motion, and Deformation...
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →CIA Reading Room cia-rdp96-00789r002900330001-4: LONG-RANGE COMPREHENSIVE PLAN
Approved For Release 2000/08/08 : CIA-RDP96-00789R002900330001-4 STRA GATE DEFENSE INTELLIGENCE AGENCY DT-S-1035-SL LOfG-HAl1GE COIIIPAEHEIISIVE Min (U) BRSIC RPPHORCH 28 JUKE 1991 9#Ei~E~ STAR GATE A...
View Book →CIA Reading Room cia-rdp96-00788r001100010003-7: PROCEEDINGS LETTERS
PROCEED1NQC ppf d For Release 2000/178/07: CIA-RDP96-00788RO01100010003.7 ., dissertation, ETS. Ing Telecomunicacion, Madrid, 1973. S. Yoshizawa, "Some properties of randomly connected networks of neu...
View Book →An Extended Kerr-Schild Ansatz
We present an analysis of the vacuum Einstein equations for a recently proposed extension of the Kerr-Schild ansatz that includes a spacelike vector field as well as the usual Kerr-Schild null vector....
View Book →
Language Technologies for the Challenges of the Digital Age
27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings...
View Book →
Interface Oral Health Science 2016
Innovative Research on Biosis–Abiosis Intelligent Interface...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
Spectral and High Order Methods for Partial Differential Equations ICOSAHOM 2018
Selected Papers from the ICOSAHOM Conference, London, UK, July 9-13, 2018...
View Book →
Biodiversity and Health in the Face of Climate Change
...
View Book →Global transcriptional analysis reveals surface remodeling of Anaplasma marginale in the tick vector
This article is from Parasites & Vectors , volume 7 . Abstract Background: Pathogens dependent upon vectors for transmission to new hosts undergo environment specific changes in gene transcription dep...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →Microbial contamination of manually reprocessed, ready to use ECG lead wire in intensive care units.
This article is from GMS hygiene and infection control , volume 8 . Abstract Background: A number of studies have shown that non-critical medical devices can be contaminated with pathogens, including ...
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →
International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019...
View Book →
Foundations of Quantum Theory
From Classical Concepts to Operator Algebras...
View Book →
Effect of overexpressing nhaA and nhaR on sodium tolerance and lactate production in Escherichia col
This article is from Journal of Biological Engineering , volume 7 . Abstract Background: Like other bacteria, Escherichia coli must carefully regulate the intracellular concentration of sodium ion (Na...
View Book →
Programming Computer Vision with Python
Tools and algorithms for analyzing images...
View Book →
Bayesian Methods in the Search for MH370
...
View Book →
Introduction to Data Science
Data Analysis and Prediction Algorithms with R...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →
D-branes on AdS flux compactifications
We study D-branes in N=1 flux compactifications to AdS_4. We derive their supersymmetry conditions and express them in terms of background generalized calibrations. Basically because AdS has a boundar...
View Book →
Foundations of Machine Learning
...
View Book →A novel esterase gene cloned from a metagenomic library from neritic sediments of the South China Se
This article is from Microbial Cell Factories , volume 10 . Abstract Background: Marine microbes are a large and diverse group, which are exposed to a wide variety of pressure, temperature, salinity, ...
View Book →Effects of temperature and photoperiod on daily activity rhythms of Lutzomyia longipalpis (Diptera:
This article is from Parasites & Vectors , volume 7 . Abstract Background: Insect vectors have been established as models in Chronobiology for many decades, and recent studies have demonstrated a clos...
View Book →A GMM supervector approach for spoken Indian language identification for mismatch utterance length
Gaussian mixture model-universal background model (GMM UBM) supervectors are used to identify spoken Indian languages. The supervectors are calculated from short-time MFCC, its first and sec derivativ...
View Book →
Variant Construction from Theoretical Foundation to Applications
...
View Book →
Supersymmetric Nonlinear Sigma Model in AdS_5
We construct the supersymmetric nonlinear sigma model in a fixed AdS_5 background. We use component fields and find that the complex bosons must be the coordinates of a hyper-Kahler manifold that admi...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
Problems in Classical Electromagnetism
157 Exercises with Solutions...
View Book →
Majorana zero modes
We derive the zero mode solutions for a Majorana fermion in the background of a cosmic string and contrast it with the zero mode solution for a (neutral) Dirac fermion. A Majorana zero mode carries no...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →Pion in the Holographic Model with 5D Yang-Mills Fields
We study pion in the holographic model of Hirn and Sanz which contains two Yang-Mills fields defined in the background of the sliced AdS space. The infrared boundary conditions imposed on these fields...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →
Representation Learning for Natural Language Processing
...
View Book →Exact String Solutions in Nontrivial Backgrounds
We show how the classical string dynamics in $D$-dimensional gravity background can be reduced to the dynamics of a massless particle constrained on a certain surface whenever there exists at least on...
View Book →
Health of People, Health of Planet and Our Responsibility
Climate Change, Air Pollution and Health...
View Book →
Ambisonics
A Practical 3D Audio Theory for Recording, Studio Production, Sound Reinforcement, and Virtual Reality...
View Book →
Spatial Thinking in Planning Practice
An Introduction to GIS...
View Book →
Ionospheric Multi-Spacecraft Analysis Tools
Approaches for Deriving Ionospheric Parameters...
View Book →Cosmology in a certain vector-tensor theory of gravitation
We study relevant cosmological topics in the framework of a certain vector-tensor theory of gravitation (hereafter VT). This theory is first compared with the so-called extended electromagnetism (EE)....
View Book →
Software for Exascale Computing - SPPEXA 2016-2019
...
View Book →
Linear Selection Indices in Modern Plant Breeding
...
View Book →
Optimizing HPC Applications with Intel Cluster Tools
Hunting Petaflops...
View Book →
First report of Babesia gibsoni in Central America and survey for vector-borne infections in dogs fr
This article is from Parasites & Vectors , volume 7 . Abstract Background: Although many vector-borne diseases are important causes of morbidity and mortality in dogs in tropical areas and potential z...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →
Newtonian limit of nonlocal cosmology
We study the consequences of the $f(R/\Box)$ gravity models for the Solar system and the large scale structure of the universe. The spherically symmetric solutions can be used to obtain bounds on the ...
View Book →
"We are supposed to take care of it": a qualitative examination of care and repair behaviour of long
This article is from Malaria Journal , volume 13 . Abstract Background: The longevity of long-lasting insecticidal nets (LLIN) under field conditions has important implications for malaria vector cont...
View Book →
Fractional Graph Theory
A Rational Approach to the Theory of Graphs...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →
Sensitivity Analysis: Matrix Methods in Demography and Ecology
...
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →
Relativistic Conservation Laws on Curved Backgrounds and the Theory of Cosmological Perturbations
We first consider the Lagrangian formulation of general relativity for perturbations with respect to a background spacetime. We show that by combining Noether's method with Belinfante's "symmetrizatio...
View Book →
Anisotropy Across Fields and Scales
...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →
Kappa-symmetry of superstring sigma model and generalized 10d supergravity equations
We determine the constraints imposed on the 10d target superspace geometry by the requirement of classical kappa-symmetry of the Green-Schwarz superstring. In the type I case we find that the backgrou...
View Book →
Statistics with Julia
Fundamentals for Data Science, Machine Learning and Artificial Intelligence...
View Book →
Algorithmic Graph Theory and Sage
...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python 3.6...
View Book →