Warning: file_put_contents(cache/omni_ec220574ac30798e62e1f5033e7e5201.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Prediction of Survival with Alternative Modeling Techniques Using Pseudo Values.
This article is from PLoS ONE , volume 9 . Abstract Background: The use of alternative modeling techniques for predicting patient survival is complicated by the fact that some alternative techniques c...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →Why stop at two tops? Search for exotic production of top quarks in final states with same-sign lept
An analysis is presented of events containing jets including at least one $b$-tagged jet, sizable missing transverse momentum, and at least two charged leptons including a pair of the same electric ch...
View Book →
Spatial Thinking in Planning Practice
An Introduction to GIS...
View Book →
The Big Data Agenda
Data Ethics and Critical Data Studies...
View Book →
Ambisonics
A Practical 3D Audio Theory for Recording, Studio Production, Sound Reinforcement, and Virtual Reality...
View Book →
Big Data in Context
Legal, Social and Technological Insights...
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →
Data Collection in Fragile States
Innovations from Africa and Beyond...
View Book →The life cycle of Trypanosoma (Nannomonas) congolense in the tsetse fly.
This article is from Parasites & Vectors , volume 5 . Abstract Background: The tsetse-transmitted African trypanosomes cause diseases of importance to the health of both humans and livestock. The life...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
Multimedia Big Data Computing for IoT Applications
Concepts, Paradigms and Solutions...
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →
Critical Data Literacy
Strategies to Effectively Interpret and Evaluate Data Visualizations...
View Book →An expanded model of HIV cell entry phenotype based on multi-parameter single-cell data.
This article is from Retrovirology , volume 9 . Abstract Background: Entry of human immunodeficiency virus type 1 (HIV-1) into the host cell involves interactions between the viral envelope glycoprote...
View Book →
Data Protection for the Hybrid Cloud
Microsoft System Center...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
The Data Journalism Handbook
How Journalists Can Use Data to Improve the News...
View Book →
Representation Learning for Natural Language Processing
...
View Book →Southern rice black-streaked dwarf virus (SRBSDV) directly affects the feeding and reproduction beha
This article is from Virology Journal , volume 11 . Abstract Background: Southern rice black-streaked dwarf virus (SRBSDV) is a recently discovered member of the genus Fijivirus and it is transmitted ...
View Book →
Large-Scale Cognitive Assessment
Analyzing PIAAC Data...
View Book →
Projection-Based Clustering through Self-Organization and Swarm Intelligence
Combining Cluster Analysis with the Visualization of High-Dimensional Data...
View Book →
Bayesian Methods in the Search for MH370
...
View Book →
What Is Data Science?
The future belongs to the companies and people that turn data into products...
View Book →
Foundations of Machine Learning
...
View Book →Ecology of Rhodnius robustus Larrousse, 1927 (Hemiptera, Reduviidae, Triatominae) in Attalea palm tr
This article is from Parasites & Vectors , volume 7 . Abstract Background: The rising number of acute cases of Chagas disease in the State of Pará, reported in the past two decades, has been associat...
View Book →Top scoring pairs for feature selection in machine learning and applications to cancer outcome predi
This article is from BMC Bioinformatics , volume 12 . Abstract Background: The widely used k top scoring pair (k-TSP) algorithm is a simple yet powerful parameter-free classifier. It owes its success ...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →Byte Magazine Volume 02 Number 02 - Usable Systems
Foreground p.12 SWEET AUTO LINE [theme Software] [author Nico] p.34 BUILD THIS ECONOMY FLOPPY DISK INTERFACE [theme Mass Storage Systems] [author Welles] p.54 AUDIBLE INTERRUPTS FOR HUMANS [theme Huma...
View Book →
Programming Computer Vision with Python
Tools and algorithms for analyzing images...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →
Data-Driven Policy Impact Evaluation
How Access to Microdata is Transforming Policy Design...
View Book →Scalar-Tensor-Vector Gravity Theory
A covariant scalar-tensor-vector gravity theory is developed which allows the gravitational constant $G$, a vector field coupling $\omega$ and the vector field mass $\mu$ to vary with space and time. ...
View Book →
Socioeconomic Inequality and Educational Outcomes
Evidence from Twenty Years of TIMSS...
View Book →
Language Technologies for the Challenges of the Digital Age
27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings...
View Book →
Anisotropy Across Fields and Scales
...
View Book →
Learning Neo4j
Run blazingly fast queries on complex graph datasets with the power of the Neo4j graph database...
View Book →Mapping the social network: tracking lice in a wild primate (Microcebus rufus) population to infer s
This article is from BMC Ecology , volume 12 . Abstract Background: Studies of host-parasite interactions have the potential to provide insights into the ecology of both organisms involved. We monitor...
View Book →
Graph Databases
New Opportunities for Connected Data...
View Book →
Spationomy
Spatial Exploration of Economic Data and Methods of Interdisciplinary Analytics...
View Book →
Introduction to Data Science
Data Analysis and Prediction Algorithms with R...
View Book →
SQL Server Execution Plans, 3rd Edition
For SQL Server 2008 through to 2017 and Azure SQL Database...
View Book →Enriching for correct prediction of biological processes using a combination of diverse classifiers.
This article is from BMC Bioinformatics , volume 12 . Abstract Background: Machine learning models (classifiers) for classifying genes to biological processes each have their own unique characteristic...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →
Variant Construction from Theoretical Foundation to Applications
...
View Book →
Protein-RNA interface residue prediction using machine learning: an assessment of the state of the a
This article is from BMC Bioinformatics , volume 13 . Abstract Background: RNA molecules play diverse functional and structural roles in cells. They function as messengers for transferring genetic inf...
View Book →
New Horizons for a Data-Driven Economy
A Roadmap for Usage and Exploitation of Big Data in Europe...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →
Migrating SQL Server Databases to Azure
Microsoft Azure Essentials...
View Book →
Security Infrastructure Technology for Integrated Utilization of Big Data
Applied to the Living Safety and Medical Fields...
View Book →
Molecular Analysis of Aedes aegypti Classical Protein Tyrosine Phosphatases Uncovers an Ortholog of
This article is from PLoS ONE , volume 9 . Abstract Background: Protein Tyrosine Phosphatases (PTPs) are enzymes that catalyze phosphotyrosine dephosphorylation and modulate cell differentiation, grow...
View Book →
Statistics with Julia
Fundamentals for Data Science, Machine Learning and Artificial Intelligence...
View Book →
10. Principle of Constancy and Finiteness of the Speed of Gravitational Interaction and Dark Matter.
Theoretical neutrino mass value of 1.616 * 10^(-37) kg or 9.065 * 10^(-2) eV, which is consistent with the earlier made boundary predictions. Therefore, we are waiting for experimental confirmation :)...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
Fraud Malware Detection in Google Play Store
Android mobile applications become an simple target for the attacker because of its open source background. Also user' lack of knowledge the process of installing and usage of the apps. To categorize ...
View Book →
The Definitive Guide to Graph Databases
for the RDBMS Developer...
View Book →
Intel Trusted Execution Technology for Server Platforms
A Guide to More Secure Datacenters...
View Book →
Data Information Literacy
Librarians, Data, and the Education of a New Generation of Researchers...
View Book →
Search for the production of single vector-like and excited quarks in the $Wt$ final state in $pp$ c
A search for vector-like quarks and excited quarks in events containing a top quark and a $W$ boson in the final state is reported here. The search is based on $20.3 {fb}^{-1}$ of proton--proton colli...
View Book →
The Elements of Data Analytic Style
A guide for people who want to analyze data...
View Book →
Software for Exascale Computing - SPPEXA 2016-2019
...
View Book →
Graph Databases For Beginners
The #1 Platform for Connected Data...
View Book →
Data Science with Microsoft SQL Server 2016
...
View Book →
Managing Cloud Native Data on Kubernetes
Architecting Cloud Native Data Services Using Open Source Technology...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →
Ionospheric Multi-Spacecraft Analysis Tools
Approaches for Deriving Ionospheric Parameters...
View Book →
Problem Solving with Algorithms and Data Structures
...
View Book →
NASA Technical Reports Server (NTRS) 20230003120: Amino Acid Encoding for Deep Learning Applications
Background: The number of applications of deep learning algorithms in bioinformatics is increasing as they usually achieve superior performance over classical approaches, especially, when bigger train...
View Book →Selective extracellular vesicle-mediated export of an overlapping set of microRNAs from multiple cel
This article is from BMC Genomics , volume 13 . Abstract Background: MicroRNAs (miRNAs) are a class of small RNA molecules that regulate expression of specific mRNA targets. They can be released from ...
View Book →Classification Accuracies of Physical Activities Using Smartphone Motion Sensors.
This article is from Journal of Medical Internet Research , volume 14 . Abstract Background: Over the past few years, the world has witnessed an unprecedented growth in smartphone use. With sensors su...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →
Real-time Linked Dataspaces
Enabling Data Ecosystems for Intelligent Systems...
View Book →