Warning: file_put_contents(cache/omni_deb227f10ea75aac54a33c61dbcbdc44.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Journal of the Optical Society of America and Review of Scientific Instruments
No description available....
View Book →
lotus_vector_156064
Lotus icon design colorful 3d style Free vector 142.65KB...
View Book →
International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019...
View Book →Bell Telephone System Technical Publications
No description available....
View Book →Library of Universal Knowledge
No description available....
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →
The International Cyclopaedia
No description available....
View Book →
Defense against the Black Arts
How Hackers Do What They Do and How to Protect against It...
View Book →Bell Telephone Laboratories Reprints
No description available....
View Book →
The International Cyclopedia
No description available....
View Book →Approximate Nearest Neighbor Search by Residual Vector Quantization.
This article is from Sensors (Basel, Switzerland) , volume 10 . Abstract A recently proposed product quantization method is efficient for large scale approximate nearest neighbor search, however, its ...
View Book →
Linear Selection Indices in Modern Plant Breeding
...
View Book →Siamese Network of Deep Fisher-Vector Descriptors for Image Retrieval
This paper addresses the problem of large scale image retrieval, with the aim of accurately ranking the similarity of a large number of images to a given query image. To achieve this, we propose a nov...
View Book →
Ambisonics
A Practical 3D Audio Theory for Recording, Studio Production, Sound Reinforcement, and Virtual Reality...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →Extreme Entropy Machines: Robust information theoretic classification
Most of the existing classification methods are aimed at minimization of empirical risk (through some simple point-based error measured with loss function) with added regularization. We propose to app...
View Book →
Problems in Classical Electromagnetism
157 Exercises with Solutions...
View Book →Parameter Estimation under Gaussian Model Uncertainties by Iterative Covariance Approximation
We propose a novel iterative algorithm for estimating a deterministic but unknown parameter vector in the presence of Gaussian model uncertainties. This iterative algorithm is based on a system model ...
View Book →
Fundamentals of Biomechanics
Equilibrium, Motion, and Deformation...
View Book →
Statistics with Julia
Fundamentals for Data Science, Machine Learning and Artificial Intelligence...
View Book →Bulletin of the National Research Council
No description available....
View Book →Vector Analysis
No description available....
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →Geometric Modeling and Mesh Generation from Scanned Images
Cutting-Edge Techniques to Better Analyze and Predict Complex Physical Phenomena Geometric Modeling and Mesh Generation from Scanned Images shows how to integrate image processing, geometric modeling,...
View Book →
Spectral and High Order Methods for Partial Differential Equations ICOSAHOM 2018
Selected Papers from the ICOSAHOM Conference, London, UK, July 9-13, 2018...
View Book →The International Cyclopædia
No description available....
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →Combined analysis of chromosomal instabilities and gene expression for colon cancer progression infe
This article is from Journal of Clinical Bioinformatics , volume 4 . Abstract Background: Copy number alterations (CNAs) represent an important component of genetic variations. Such alterations are re...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
Using distances between Top-n-gram and residue pairs for protein remote homology detection.
This article is from BMC Bioinformatics , volume 15 . Abstract Background: Protein remote homology detection is one of the central problems in bioinformatics, which is important for both basic researc...
View Book →Selected Papers ...: Directive antennas
No description available....
View Book →Self-Taught Hashing for Fast Similarity Search
The ability of fast similarity search at large scale is of great importance to many Information Retrieval (IR) applications. A promising way to accelerate similarity search is semantic hashing which d...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →
Byte Magazine Volume 00 Number 16 - Machine Readable Print
Foreground THE CYBERNETIC CRAYON p.24 [theme Graphics Systems] [author Dwyer-Sweer] p.139 [theme Portfolio of Explorations] [author Critchfield] p.30 THE BURIED GOLD IN THE SR-52 [theme Systems Progra...
View Book →
Anisotropy Across Fields and Scales
...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →Theoretical Mechanics
No description available....
View Book →
Biodiversity and Health in the Face of Climate Change
...
View Book →Compressing Deep Convolutional Networks using Vector Quantization
Deep convolutional neural networks (CNN) has become the most promising method for object recognition, repeatedly demonstrating record breaking results for image classification and object detection in ...
View Book →CIA Reading Room cia-rdp86-00513r000204820004-1: SCIENTIFIC ABSTRACT BEREZHNOY, I.V. - BEREZHNYY, Y.
"APPROVED FOR RELEASE: 06/08/2000 CIA-RDP86-00513R000204820004-1APPROVED FOR RELEASE: 06/08/2000 CIA-RDP86-00513R000204820004-1""APPROVED FOR RELEASE: 06/08/2000 CIA-RDP86-00513R000204820004-1AUTHOR:T...
View Book →
Introduction to Data Science
Data Analysis and Prediction Algorithms with R...
View Book →
Bayesian Methods in the Search for MH370
...
View Book →ACM SIGGRAPH '89 Course Notes
No description available....
View Book →
DTIC ADA512059: Multimodal Speaker Authentication using Nonacoustic Sensors
Many nonacoustic sensors are now available to augment user authentication. Devices such as the GEMS (glottal electromagnetic micro-power sensor), the EGG (electroglottograph), and the P-mic (physiolog...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
Programming Computer Vision with Python
Tools and algorithms for analyzing images...
View Book →A Routing Protocol for Packet Radio Networks
The authors present a new distance-vector routing protocol for a packet radio network. The new distributed routing protocol, Wireless Routing Protocol (WRP), works on the notion of second-to-last hop ...
View Book →Quantization based Fast Inner Product Search
We propose a quantization based approach for fast approximate Maximum Inner Product Search (MIPS). Each database vector is quantized in multiple subspaces via a set of codebooks, learned directly by m...
View Book →
Foundations of Quantum Theory
From Classical Concepts to Operator Algebras...
View Book →
Fractional Graph Theory
A Rational Approach to the Theory of Graphs...
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →
Algorithmic Graph Theory and Sage
...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →DTIC ADA454724: A New Biologically Motivated Framework for Robust Object Recognition
In this paper,we introduce a novel set of features for robust object recognition, which exhibits outstanding performances on a variety of object categories while being capable of learning from only a ...
View Book →
Language Technologies for the Challenges of the Digital Age
27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings...
View Book →Detection of acute stress caused by cognitive tasks based on physiological signals
We report on the development of an automated detector of acute stress based on physiological signals. Our detector discriminates between high and low levels of acute stress accumulated by students whe...
View Book →
Representation Learning for Natural Language Processing
...
View Book →
Health of People, Health of Planet and Our Responsibility
Climate Change, Air Pollution and Health...
View Book →
Spatial Thinking in Planning Practice
An Introduction to GIS...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python 3.6...
View Book →
Computer Graphics and Geometric Modeling
Joseph-Louis Lagrange (1736-1813), one of the greatest mathematicians of the 18th century, made important contributions to the theory of numbers and to analytical and celestial mechanics. His most imp...
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →
Software for Exascale Computing - SPPEXA 2016-2019
...
View Book →
Optimized ensemble modeling approach for student cumulative grade point average prediction using reg
This research focuses on developing models to accurately predict student’s cumulative grade point average (CGPA) in the early stages of their study to tackle the problem of dropout rates in educatio...
View Book →
Sensitivity Analysis: Matrix Methods in Demography and Ecology
...
View Book →From Node Embedding To Community Embedding
Most of the existing graph embedding methods focus on nodes, which aim to output a vector representation for each node in the graph such that two nodes being "close" on the graph are close too in the ...
View Book →
Variant Construction from Theoretical Foundation to Applications
...
View Book →Holistic Features For Real-Time Crowd Behaviour Anomaly Detection
This paper presents a new approach to crowd behaviour anomaly detection that uses a set of efficiently computed, easily interpretable, scene-level holistic features. This low-dimensional descriptor co...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →
Deep Bottleneck Features for Spoken Language Identification.
This article is from PLoS ONE , volume 9 . Abstract A key problem in spoken language identification (LID) is to design effective representations which are specific to language information. For example...
View Book →
Interface Oral Health Science 2016
Innovative Research on Biosis–Abiosis Intelligent Interface...
View Book →
Ionospheric Multi-Spacecraft Analysis Tools
Approaches for Deriving Ionospheric Parameters...
View Book →
Journal of the Optical Society of America
No description available....
View Book →
Optimizing HPC Applications with Intel Cluster Tools
Hunting Petaflops...
View Book →
An Elementary Treatise on Solid Geometry
No description available....
View Book →
Foundations of Machine Learning
...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →