Warning: file_put_contents(cache/omni_fb1f4c0ebc4ac2b7456af28486b8c64f.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
DTIC ADA128506: Mosquito Production and Associated Environmental and Chemical Parameters of Breeding
Larval surveillance techniques were employed to identify mosquito breeding sites in the vicinity of Lafayette, Indiana, and Purdue University. Emphasis was placed on the analyses of breeding waters co...
View Book →Support vector regression snow-depth retrieval algorithm using passive microwave remote sensing data
Snow cover is an informative indicator of climate change because it can affect local and regional surface energy and water balance, hydrological processes and climate, and ecosystem function. Passive ...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →
An introduction to support vector machines
First published in 2000...
View Book →Integration Of Probability Based Ridge Variation Information With Local Ridge Orientation For Finger
Fingerprints are commonly used in biometric systems. However, the authentication of these systems became an open challenge because fingerprints can easily be fabricated. In this paper, a hybrid featur...
View Book →
DTIC ADA049530: On Feedback Stabilization of Time Varying Discrete Linear Systems.
Results are given for stabilizing time varying discrete linear systems by means of a feedback control stemming from a receding horizon concept and a minimum quadratic cost with a fixed terminal constr...
View Book →
Fundamentals of Biomechanics
Equilibrium, Motion, and Deformation...
View Book →Non-Local Equivariant Star Product on the Minimal Nilpotent Orbit
We construct a unique G-equivariant graded star product on the algebra $S(g)/I$ of polynomial functions on the minimal nilpotent coadjoint orbit $\Omin$ of G where G is a complex simple Lie group and ...
View Book →
Mobile Research Methods
Opportunities and challenges of mobile research methodologies...
View Book →Monitoring Temporal Properties using Interval Analysis
Verification of temporal logic properties plays a crucial role in proving the desired behaviors of continuous systems. In this paper, we propose an interval method that verifies the properties describ...
View Book →Improved determination of hadron matrix elements using the variational method
The extraction of hadron form factors in lattice QCD using the standard two- and three-point correlator functions has its limitations. One of the most commonly studied sources of systematic error is e...
View Book →
Sensitivity Analysis: Matrix Methods in Demography and Ecology
...
View Book →
Low-Cost Methods for Molecular Characterization of Mutant Plants
Tissue Desiccation, DNA Extraction and Mutation Discovery: Protocols...
View Book →
Engineering Systems Dynamics, Modelling, Simulation, and Design
Lagrangian and Bond Graph Methods...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →
Forecasting and Assessing Risk of Individual Electricity Peaks
...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python 3.6...
View Book →
Hydrodynamics and vector field theory
First published in 1962...
View Book →
MonoGame Role-Playing Game Development Succinctly
...
View Book →
Representation Learning for Natural Language Processing
...
View Book →
Tensor and vector analysis
First published in 1998...
View Book →
Programming Computer Vision with Python
Tools and algorithms for analyzing images...
View Book →
Reduced-Rank DOA Estimation based on Joint Iterative Subspace Optimization and Grid Search
In this paper, we propose a novel reduced-rank algorithm for direction of arrival (DOA) estimation based on the minimum variance (MV) power spectral evaluation. It is suitable to DOA estimation with l...
View Book →
Sequence Analysis and Related Approaches
Innovative Methods and Applications...
View Book →
Linear Selection Indices in Modern Plant Breeding
...
View Book →
Spectral and High Order Methods for Partial Differential Equations ICOSAHOM 2018
Selected Papers from the ICOSAHOM Conference, London, UK, July 9-13, 2018...
View Book →
Algorithms for Decision Making
...
View Book →
Pest and vector control
First published in 2004...
View Book →
Compendium for Early Career Researchers in Mathematics Education
...
View Book →
Methodological Investigations in Agent-Based Modelling
With Applications for the Social Sciences...
View Book →DTIC ADA097709: An Approach to Assessing the Seriousness of Error Types and the Predictability of Fu
Brown & Burton found 108 bugs in whole-number subtraction problems. Tatsuoka et. al., found 57 bugs in signed-number arithmetic. This study attempts to develop a method for quantifying these numerous ...
View Book →A powerful machine learning method for detecting phishing threats
Phishing threats exploit social engineering and deceptive web infrastructure to steal sensitive personal information, often by mimicking legitimate websites. With the proliferation of online services ...
View Book →
The Privacy Engineer's Manifesto
Getting from Policy to Code to QA to Value...
View Book →
A brain-computer interface for potential non-verbal facial communication based on EEG signals relate
This article is from Frontiers in Neuroscience , volume 8 . Abstract Unlike assistive technology for verbal communication, the brain-machine or brain-computer interface (BMI/BCI) has not been establis...
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →
Model-Based Demography
Essays on Integrating Data, Technique and Theory...
View Book →
Optimizing HPC Applications with Intel Cluster Tools
Hunting Petaflops...
View Book →
Research Methods for Social Justice and Equity in Education
...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →
Anisotropy Across Fields and Scales
...
View Book →The Dynamical Functional Particle Method
We present a new algorithm which is named the Dynamical Functional Particle Method, DFPM. It is based on the idea of formulating a finite dimensional damped dynamical system whose stationary points ar...
View Book →
A Concise Guide to Market Research
The Process, Data, and Methods Using IBM SPSS Statistics...
View Book →
Ionospheric Multi-Spacecraft Analysis Tools
Approaches for Deriving Ionospheric Parameters...
View Book →CIA Reading Room cia-rdp80-00809a000100140020-8: (SANITIZED)SOVIET PAPER ON BREMSSTRAHLUNG AND PAIR
Declassified in Part - Sanitized Copy Approved for Release 2014/06/20: CIA-RDP80-00809A000100140020-8 R Next 5 Page(s) In Document Denied Declassified in Part - Sanitized Copy Approved for Release 201...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
Qualitative Research in European Migration Studies
...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
Foundations of Machine Learning
...
View Book →DTIC AD0677101: A DECOMPOSITION METHOD FOR INTERVAL LINEAR PROGRAMMING
An interval linear program is (IP) maximize (c superscript t)x, subject to b- = or Ax = or b+ where the matrix A, vectors b-, b+, and c are given. If A has full row rank, the optimal solutions of (IP)...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →
Research Methods for the Digital Humanities
...
View Book →
Predictive Modelling with Machine Learning for Sustainable Hybrid Energy System
In order to achieve sustainability and energy efficiency, hybrid energy systems must incorporate renewable energy sources. In order to maximize the performance of hybrid sustainable energy systems, th...
View Book →
Fractional Graph Theory
A Rational Approach to the Theory of Graphs...
View Book →
Modern methods in topological vector spaces
First published in 1978...
View Book →
Optimization by Vector Space Methods
First published in 1968...
View Book →
Bayesian Methods in the Search for MH370
...
View Book →
Data-Driven Policy Impact Evaluation
How Access to Microdata is Transforming Policy Design...
View Book →
The Ecological Scarcity Method for the European Union
A Volkswagen Research Initiative: Environmental Assessments...
View Book →
Situating Children of Migrants across Borders and Origins
A Methodological Overview...
View Book →
The molecular biology of insect disease vectors
First published in 1997...
View Book →INNOVATIVE MATHEMATICAL - COGNITIVE MODELS OF ARTIFICIAL INTELLIGENCE BASED ON THEORY OF DIFFERENTIA
An analysis of the problem of mass development of piece intelligence has been carried out. Direct scientific research related to the creation of differential models of piece intelligence has been carr...
View Book →
Enhanced vegetation encroachment detection along power transmission corridors using random forest al
Vegetation encroachment along power transmission corridors poses significant risks to infrastructure safety and reliability, necessitating effective monitoring and management strategies. This study in...
View Book →
Retrofitting Word Vectors to Semantic Lexicons
Vector space word representations are learned from distributional information of words in large corpora. Although such statistics are semantically informative, they disregard the valuable information ...
View Book →
Language Technologies for the Challenges of the Digital Age
27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings...
View Book →
Model-Based Engineering of Collaborative Embedded Systems
Extensions of the SPES Methodology...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
Advancing Human Assessment
The Methodological, Psychological and Policy Contributions of ETS...
View Book →
Research Methods in Psychology
American Edition...
View Book →
Biodiversity and Health in the Face of Climate Change
...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →
Defense against the Black Arts
How Hackers Do What They Do and How to Protect against It...
View Book →
Systematic Reviews in Educational Research
Methodology, Perspectives and Application...
View Book →
Viral vectors for gene therapy
First published in 2011...
View Book →
Differential Undercounts in the U.S. Census
Who is Missed?...
View Book →Numerical Analysis of Lamellar Gratings for Light-Trapping in Amorphous Silicon Solar Cells
In this paper, we calculate the material specific absorption accurately using a modal method by determining the integral of the Poynting vector around the boundary of a specific material. Given that t...
View Book →Vector methods applied to differential geometry, mechanics and potential theory
First published in 1943...
View Book →
Software for Exascale Computing - SPPEXA 2016-2019
...
View Book →DTIC ADA1042072: On Optimal Operation of a Jointly Owned Enterprise.
An enterprise is owned jointly by m agents, the i-th agent's share being theta sub i 0 where the sum of theta sub i's = 1. The enterprise is able to produce some non-negative n-vector x of goods where...
View Book →
Non-viral vectors for gene therapy
First published in 2005...
View Book →
Analyzing Qualitative Data with MAXQDA
Text, Audio, and Video...
View Book →
Engineering Mechanics: Statics
...
View Book →
Water Resource Systems Planning and Management
An Introduction to Methods, Models, and Applications...
View Book →
Rethinking Productivity in Software Engineering
...
View Book →
Numerical Methods for Ordinary Differential Equations
...
View Book →