Warning: file_put_contents(cache/omni_8bf5f4c088bcdf2134e80b1f97d389f1.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →
Biodiversity and Health in the Face of Climate Change
...
View Book →Calculus - Concepts and Contexts, Volume 1 - Featuring an Introduction to Vectors
First published in 2009...
View Book →
Generating and structuring terrain features on parallel vector architectures
First published in 1988...
View Book →De re Atari
First published in 1982...
View Book →
Foundations of Machine Learning
...
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →
Variant Construction from Theoretical Foundation to Applications
...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →
Foundations of Quantum Theory
From Classical Concepts to Operator Algebras...
View Book →
Fundamentals of Biomechanics
Equilibrium, Motion, and Deformation...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python 3.6...
View Book →
Breast Cancer Diagnostic System Based on MR images Using KPCA-Wavelet Transform and Support Vector M
Automated detection and accurate classification of breast tumors using magnetic resonance image (MRI) are very important for medical analysis and diagnostic fields. Over the last ten years, numbers of...
View Book →
Software for Exascale Computing - SPPEXA 2016-2019
...
View Book →
Programming Computer Vision with Python
Tools and algorithms for analyzing images...
View Book →Automatic Measurement of Physical Mobility in Get-Up-and-Go Test Using Kinect Sensor
Get-Up-and-Go Test is commonly used for assessing the physical mobility of the elderly by physicians. This paper presents a method for automatic analysis and classification of human gait in the Get-Up...
View Book →DTIC ADA410470: Medical Image Indexing and Compression Based on Vector Quantization: Image Retrieval
This paper addresses the problem of efficient image retrieval from a compressed image database, using information derived from the compression process. Images in the database are compressed applying t...
View Book →Short-Time feature vector based phonemic speech recognition with the aid of local context
First published in 1991...
View Book →DTIC ADA616486: A Parallel Neuromorphic Text Recognition System and Its Implementation on a Heteroge
Given the recent progress in the evolution of high-performance computing (HPC) technologies, the research in computational intelligence has entered a new era. In this paper, we present an HPC-based co...
View Book →DTIC ADA183370: Classification of Selected Radar Imagery Patterns Using a Binary Tree Classifier.
This report details the results of classifying radar imagery using a binary tree classifier. It was found that this classification algorithm works well with radar imagery, which would indicate a norma...
View Book →Optimizing affinity-based binary hashing using auxiliary coordinates
In supervised binary hashing, one wants to learn a function that maps a high-dimensional feature vector to a vector of binary codes, for application to fast image retrieval. This typically results in ...
View Book →Absence of nematic ordering transition in a diamond lattice: Application to $FeSc_2S_4$
Recent neutron scattering observations by Plumb et al. [1] reveal that the ground state of $FeSc_2S_4$ is magnetic with two distinct Fe environments, instead of a quantum spin liquid as had been previ...
View Book →Automated feature selection with a distinction sensitive learning vector quantizer
First published in 1994...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →A robust and efficient video representation for action recognition
This paper introduces a state-of-the-art video representation and applies it to efficient action recognition and detection. We first propose to improve the popular dense trajectory features by explici...
View Book →
International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019...
View Book →
Ambisonics
A Practical 3D Audio Theory for Recording, Studio Production, Sound Reinforcement, and Virtual Reality...
View Book →
Data mining techniques for the life sciences
First published in 2009...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →
Optimizing HPC Applications with Intel Cluster Tools
Hunting Petaflops...
View Book →Chiral approach to phi radiative decays
The radiative decays of the phi meson are known to be a good source of information about the a0(980) and f0(980) scalar mesons. We discuss these decays starting from a non-linear model Lagrangian whic...
View Book →
Spatial Thinking in Planning Practice
An Introduction to GIS...
View Book →
Heart disease prediction optimization using metaheuristic algorithms
This study explores metaheuristics hyperparameter tuning effectiveness in machine learning models for heart disease prediction. The optimized models are k-nearest neighbors (KNN) and support vector ma...
View Book →
Language Technologies for the Challenges of the Digital Age
27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings...
View Book →
An evolutionary- convolutional neural network for fake image detection
The fast development in deep learning techniques, besides the wide spread of social networks, facilitated fabricating and distributing images and videos without prior knowledge. This paper developed a...
View Book →
Health of People, Health of Planet and Our Responsibility
Climate Change, Air Pollution and Health...
View Book →
Problems in Classical Electromagnetism
157 Exercises with Solutions...
View Book →
Bayesian Methods in the Search for MH370
...
View Book →
Representation Learning for Natural Language Processing
...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →
Information computing and applications
First published in 2012...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →
Fractional Graph Theory
A Rational Approach to the Theory of Graphs...
View Book →
Data Communications and Networking
First published in 2000...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →
Statistics with Julia
Fundamentals for Data Science, Machine Learning and Artificial Intelligence...
View Book →DTIC ADP013722: Orthogonal Distance Fitting of Parametric Curves and Surfaces
Fitting of parametric curves and surfaces to a set of given data points is a relevant subject in various fields of science and engineering. In this paper, we review the current orthogonal distance fit...
View Book →
Linear Selection Indices in Modern Plant Breeding
...
View Book →
Sensitivity Analysis: Matrix Methods in Demography and Ecology
...
View Book →
Interface Oral Health Science 2016
Innovative Research on Biosis–Abiosis Intelligent Interface...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →
Introduction to Data Science
Data Analysis and Prediction Algorithms with R...
View Book →
Using MPI
First published in 1994...
View Book →Classification and Verification of Online Handwritten Signatures with Time Causal Information Theory
We present a new approach for online handwritten signature classification and verification based on descriptors stemming from Information Theory. The proposal uses the Shannon Entropy, the Statistical...
View Book →
Network patterns and strength of orbital currents in layered cuprates
In a frame of the $t-J-G$ model we derive the microscopical expression for the circulating orbital currents in layered cuprates using the anomalous correlation functions. In agreement with $\mu$-on sp...
View Book →Iterative Joint Beamforming Training with Constant-Amplitude Phased Arrays in Millimeter-Wave Commun
In millimeter-wave communications (MMWC), in order to compensate for high propagation attenuation, phased arrays are favored to achieve array gain by beamforming, where transmitting and receiving ante...
View Book →DTIC ADA242880: Front Detection with Doppler Radar
A technique to detect wind discontinuities associated with gust and synoptic fronts. It first transforms the Doppler velocity and reflectivity data into gradient vector fields by applying a series of ...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →
Parallel Programming in C with MPI and OpenMP
First published in 2003...
View Book →Invariant backpropagation: how to train a transformation-invariant neural network
In many classification problems a classifier should be robust to small variations in the input vector. This is a desired property not only for particular transformations, such as translation and rotat...
View Book →
Geometry of Killing spinors in neutral signature
We classify the supersymmetric solutions of minimal $N=2$ gauged supergravity in four dimensions with neutral signature. They are distinguished according to the sign of the cosmological constant and w...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
Renewable energy systems
First published in 2004...
View Book →
Spectral and High Order Methods for Partial Differential Equations ICOSAHOM 2018
Selected Papers from the ICOSAHOM Conference, London, UK, July 9-13, 2018...
View Book →
Physics for computer science students
First published in 1986...
View Book →
Modelling, Visualising and Summarising Documents with a Single Convolutional Neural Network
Capturing the compositional process which maps the meaning of words to that of documents is a central challenge for researchers in Natural Language Processing and Information Retrieval. We introduce a...
View Book →
Computer networking
First published in 1900...
View Book →DTIC ADA259210: High Range Resolution Radar Target Identification Using the Prony Model and Hidden M
Fully polarized Xpatch signatures are transformed to two left circularly polarized signals. These two signals are then filtered by a linear FM pulse compression ('chirp') transfer function, corrupted ...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →50 Mandalas for Stress-Relief Adult Coloring Book
First published in 2020...
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →
A primer of infinitesimal analysis
First published in 1998...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →
Algorithmic Graph Theory and Sage
...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →
Neuro-fuzzy and soft computing
First published in 1996...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
Ionospheric Multi-Spacecraft Analysis Tools
Approaches for Deriving Ionospheric Parameters...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →
Anisotropy Across Fields and Scales
...
View Book →