Warning: file_put_contents(cache/omni_0896cccb77b45e9a40bd46b68cf092e1.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Spectral and High Order Methods for Partial Differential Equations ICOSAHOM 2018
Selected Papers from the ICOSAHOM Conference, London, UK, July 9-13, 2018...
View Book →Low-Complexity Robust Adaptive Beamforming Algorithms Based on Shrinkage for Mismatch Estimation
In this paper, we propose low-complexity robust adaptive beamforming (RAB) techniques that based on shrinkage methods. The only prior knowledge required by the proposed algorithms are the angular sect...
View Book →
Non-Local Equivariant Star Product on the Minimal Nilpotent Orbit
We construct a unique G-equivariant graded star product on the algebra $S(g)/I$ of polynomial functions on the minimal nilpotent coadjoint orbit $\Omin$ of G where G is a complex simple Lie group and ...
View Book →
Modern methods in topological vector spaces
First published in 1978...
View Book →Born-Oppenheimer approximation for an atom in constant magnetic fields
We obtain a reduction scheme for the study of the quantum evolution of an atom in constant magnetic fields using the method developed by Martinez, Nenciu and Sordoni based on the construction of almos...
View Book →
Reduced-Rank DOA Estimation based on Joint Iterative Subspace Optimization and Grid Search
In this paper, we propose a novel reduced-rank algorithm for direction of arrival (DOA) estimation based on the minimum variance (MV) power spectral evaluation. It is suitable to DOA estimation with l...
View Book →DTIC AD0677101: A DECOMPOSITION METHOD FOR INTERVAL LINEAR PROGRAMMING
An interval linear program is (IP) maximize (c superscript t)x, subject to b- = or Ax = or b+ where the matrix A, vectors b-, b+, and c are given. If A has full row rank, the optimal solutions of (IP)...
View Book →Hydrodynamics and vector field theory
First published in 1962...
View Book →
Pest and vector control
First published in 2004...
View Book →
Programming Computer Vision with Python
Tools and algorithms for analyzing images...
View Book →
MonoGame Role-Playing Game Development Succinctly
...
View Book →
Foundations of Machine Learning
...
View Book →
Representation Learning for Natural Language Processing
...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python 3.6...
View Book →
Variant Construction from Theoretical Foundation to Applications
...
View Book →A powerful machine learning method for detecting phishing threats
Phishing threats exploit social engineering and deceptive web infrastructure to steal sensitive personal information, often by mimicking legitimate websites. With the proliferation of online services ...
View Book →
Optimization by Vector Space Methods
First published in 1968...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →DTIC ADA1023235: The Equivalence of Linearly Constrained Optimum Array Weight Vectors under Differen
The performance of arrays of receivers can be improved by optimisation of the weighting vectors used to form the output beams. Three optimisation criteria are considered: minimisation of total output ...
View Book →CIA Reading Room cia-rdp80-00809a000100140020-8: (SANITIZED)SOVIET PAPER ON BREMSSTRAHLUNG AND PAIR
Declassified in Part - Sanitized Copy Approved for Release 2014/06/20: CIA-RDP80-00809A000100140020-8 R Next 5 Page(s) In Document Denied Declassified in Part - Sanitized Copy Approved for Release 201...
View Book →
Efficiency and Sensitivity Analysis of Observation Networks for Atmospheric Inverse Modelling with E
The controllability of advection-diffusion systems, subject to uncertain initial values and emission rates, is estimated, given sparse and error affected observations of prognostic state variables. In...
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →
Software for Exascale Computing - SPPEXA 2016-2019
...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →
Enhanced vegetation encroachment detection along power transmission corridors using random forest al
Vegetation encroachment along power transmission corridors poses significant risks to infrastructure safety and reliability, necessitating effective monitoring and management strategies. This study in...
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →
Research Methods for the Digital Humanities
...
View Book →
Retrofitting Word Vectors to Semantic Lexicons
Vector space word representations are learned from distributional information of words in large corpora. Although such statistics are semantically informative, they disregard the valuable information ...
View Book →
The molecular biology of insect disease vectors
First published in 1997...
View Book →Numerical Analysis of Lamellar Gratings for Light-Trapping in Amorphous Silicon Solar Cells
In this paper, we calculate the material specific absorption accurately using a modal method by determining the integral of the Poynting vector around the boundary of a specific material. Given that t...
View Book →
Foundations of Quantum Theory
From Classical Concepts to Operator Algebras...
View Book →
Ambisonics
A Practical 3D Audio Theory for Recording, Studio Production, Sound Reinforcement, and Virtual Reality...
View Book →
Viral vectors for gene therapy
First published in 2011...
View Book →
Vector methods applied to differential geometry, mechanics and potential theory
First published in 1943...
View Book →
Bayesian Methods in the Search for MH370
...
View Book →
Optimizing HPC Applications with Intel Cluster Tools
Hunting Petaflops...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →
Improved determination of hadron matrix elements using the variational method
The extraction of hadron form factors in lattice QCD using the standard two- and three-point correlator functions has its limitations. One of the most commonly studied sources of systematic error is e...
View Book →
Brane Vector Phenomenology
Local oscillations of the brane world are manifested as masssive vector fields. Their coupling to the Standard Model can be obtained using the method of nonlinear realizations of the spontaneously bro...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →
Algorithms for Decision Making
...
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →
Biodiversity and Health in the Face of Climate Change
...
View Book →
An introduction to support vector machines
First published in 2000...
View Book →
Statistics with Julia
Fundamentals for Data Science, Machine Learning and Artificial Intelligence...
View Book →
Non-viral vectors for gene therapy
First published in 2005...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
Fractional Graph Theory
A Rational Approach to the Theory of Graphs...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →
Interface Oral Health Science 2016
Innovative Research on Biosis–Abiosis Intelligent Interface...
View Book →
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →
Problems in Classical Electromagnetism
157 Exercises with Solutions...
View Book →DTIC ADA097709: An Approach to Assessing the Seriousness of Error Types and the Predictability of Fu
Brown & Burton found 108 bugs in whole-number subtraction problems. Tatsuoka et. al., found 57 bugs in signed-number arithmetic. This study attempts to develop a method for quantifying these numerous ...
View Book →DTIC ADA1042072: On Optimal Operation of a Jointly Owned Enterprise.
An enterprise is owned jointly by m agents, the i-th agent's share being theta sub i 0 where the sum of theta sub i's = 1. The enterprise is able to produce some non-negative n-vector x of goods where...
View Book →
Linear Selection Indices in Modern Plant Breeding
...
View Book →Algorithm for calculating spectral intensity due to charged particles in arbitrary motion
An algorithm for calculating the spectral intensity of radiation due to the coherent addition of many particles with arbitrary trajectories is described. Direct numerical integration of the Lienard-Wi...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
Defense against the Black Arts
How Hackers Do What They Do and How to Protect against It...
View Book →
Engineering Mechanics: Statics
...
View Book →
Mobile Research Methods
Opportunities and challenges of mobile research methodologies...
View Book →
Anisotropy Across Fields and Scales
...
View Book →
Tensor and vector analysis
First published in 1998...
View Book →
Forecasting Aggregated Vector ARMA Processes
First published in 1987...
View Book →
Language Technologies for the Challenges of the Digital Age
27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings...
View Book →
Sensitivity Analysis: Matrix Methods in Demography and Ecology
...
View Book →DTIC ADA049530: On Feedback Stabilization of Time Varying Discrete Linear Systems.
Results are given for stabilizing time varying discrete linear systems by means of a feedback control stemming from a receding horizon concept and a minimum quadratic cost with a fixed terminal constr...
View Book →Random Sampling of Quantum States: A Survey of Methods
The numerical generation of random quantum states (RQS) is an important procedure for investigations in quantum information science. Here we review some methods that may be used for performing that ta...
View Book →
Situating Children of Migrants across Borders and Origins
A Methodological Overview...
View Book →
Research Methods for Social Justice and Equity in Education
...
View Book →Monitoring Temporal Properties using Interval Analysis
Verification of temporal logic properties plays a crucial role in proving the desired behaviors of continuous systems. In this paper, we propose an interval method that verifies the properties describ...
View Book →
Ionospheric Multi-Spacecraft Analysis Tools
Approaches for Deriving Ionospheric Parameters...
View Book →
Fundamentals of Biomechanics
Equilibrium, Motion, and Deformation...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →