Warning: file_put_contents(cache/omni_d8fb92b1b74c3bc177dd45ca375ff045.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Biodiversity and Health in the Face of Climate Change
...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →Large anisotropy of electron and hole g factors in infrared-emitting InAs/InAlGaAs self-assembled qu
A detailed study of the $g$-factor anisotropy of electrons and holes in InAs/In$_{0.53}$Al$_{0.24}$Ga$_{0.23}$As self-assembled quantum dots emitting in the telecom spectral range of $1.5-1.6$ $\mu$m ...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
Statistics with Julia
Fundamentals for Data Science, Machine Learning and Artificial Intelligence...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
Foundations of Machine Learning
...
View Book →
The Internet Myth
From the Internet Imaginary to Network Ideologies...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python 3.6...
View Book →Enhancing costumer churn prediction with stacking ensemble and stratified k-fold
In the era of rapid technological advancement, the telecommunications industry undergoes significant changes. Factors such as the speed of technological change, high customer expectations, and changin...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →
Spatial Thinking in Planning Practice
An Introduction to GIS...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
Sensitivity Analysis: Matrix Methods in Demography and Ecology
...
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →
CIA Reading Room cia-rdp96-00990r000100030008-5: REMOVAL OF REVERSIONARY RIGHTS IN CERTAIN LANDS
Declassified and Approved For Release 2014/02/26: CIA-RDP96-00990R000100030008-5 r ? Nat NOW" L_' filo., Ozt..4 August 4, 1988 CONGRESSIONAL RECORD ? SENATE S 10911 tor from Ohio has referred to have,...
View Book →
Internet of Things
Information Processing in an Increasingly Connected World...
View Book →A Comparative Study of Machine Learning Models for Telecom Customer Retention
Due to growing market saturation and cheap switching costs, client retention has become a crucial concern in todays fiercely competitive telecom sector. For telecom service providers, reliable Forecas...
View Book →
Algorithmic Graph Theory and Sage
...
View Book →
Bayesian Methods in the Search for MH370
...
View Book →
Ionospheric Multi-Spacecraft Analysis Tools
Approaches for Deriving Ionospheric Parameters...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →
High-Performance Modelling and Simulation for Big Data Applications
Selected Results of the COST Action IC1406 cHiPSet...
View Book →
Language Technologies for the Challenges of the Digital Age
27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings...
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →
The Taxpayer Magazine 039 CTF
Vol. 7 No. 6 of The Taxpayer Magazine. Topics discussed include: a 13-point list of the problems created by taxpayer subsidy of for-profit enterprises the money-pit that is the Atlantic Canada Opportu...
View Book →
Interface Oral Health Science 2016
Innovative Research on Biosis–Abiosis Intelligent Interface...
View Book →Cyber Polygon Report Results 2019
What is Cyber Polygon? Cyber Polygon is an international online exercise prioritising joint response to cyberthreats and the improvement of business cooperation in the fight against cybercrime...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →CIA Reading Room cia-rdp88-00733r000100150007-1: SCIENCE AND TECHNOLOGY PERSPECTIVES
Declassified in Part - Sanitized Copy Approved for Release 2012/06/04: CIA-RDP88-00733R000100150007-1 For Official Use Only 30 September 1986 Vol. 1, No. 9 Science and Technology Perspectives (Brazil)...
View Book →Loan-eligibility prediction for Airtime Credit Service Subscribers using Machine Learning: The case
Ethio telecom is largest telecommunication companies in Ethiopia. Ethio telecom begun airtime credit service in 2010 to its above 70 million mobile subscribers. The service aims to maintain customer r...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →
Optimizing HPC Applications with Intel Cluster Tools
Hunting Petaflops...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →
Big Data in Context
Legal, Social and Technological Insights...
View Book →
Fractional Graph Theory
A Rational Approach to the Theory of Graphs...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →
Foundations of Quantum Theory
From Classical Concepts to Operator Algebras...
View Book →
CyberParks – The Interface Between People, Places and Technology
New Approaches and Perspectives...
View Book →Classification of customer churn prediction model for telecommunication industry using analysis of v
Customer predictive analytics has shown great potential for effective churn models. Thriving in today's telecommunications industry, discerning between consumers who are likely to migrate to a competi...
View Book →
Programming Computer Vision with Python
Tools and algorithms for analyzing images...
View Book →
Autonomous Control for a Reliable Internet of Services
Methods, Models, Approaches, Techniques, Algorithms, and Tools...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →
Access Denied
The Practice and Policy of Global Internet Filtering...
View Book →The Taxpayer Magazine 067 CTF
The November-December edition of The Taxpayer Magazine. Highlights include: $9.6 million dollars in federal subsidies for golf courses - most of them in the Maritimes Western Economic Diversification'...
View Book →
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →Bradley Telcom Corp. Model 75L Hit Counter & Jitter Set Adapter instruction manual
Instruction manual for the Bradley Telcom Model 75L hit counter and jitter set adapter....
View Book →
Introduction to Data Science
Data Analysis and Prediction Algorithms with R...
View Book →
Access Controlled
The Shaping of Power, Rights, and Rule in Cyberspace...
View Book →
Computer and Information Sciences
31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings...
View Book →
Ambisonics
A Practical 3D Audio Theory for Recording, Studio Production, Sound Reinforcement, and Virtual Reality...
View Book →
Variant Construction from Theoretical Foundation to Applications
...
View Book →Broadband highly-efficient dielectric metadevices for polarization control
Metadevices based on dielectric nanostructured surfaces with both electric and magnetic Mie-type resonances have resulted in the best efficiency to date for functional flat optics with only one disadv...
View Book →
Linear Selection Indices in Modern Plant Breeding
...
View Book →
Problems in Classical Electromagnetism
157 Exercises with Solutions...
View Book →
Fundamentals of Biomechanics
Equilibrium, Motion, and Deformation...
View Book →
Novel High-Speed Polarization Source for Decoy-State BB84 Quantum Key Distribution over Free Space a
To implement the BB84 decoy-state quantum key distribution (QKD) protocol over a lossy ground-satellite quantum uplink requires a source that has high repetition rate of short laser pulses, long term ...
View Book →
Asterisk: The Future of Telephony
Join the Open Source PBX Revolution...
View Book →
Multiple-Aspect Analysis of Semantic Trajectories
First International Workshop, MASTER 2019, Held in Conjunction with ECML-PKDD 2019, Würzburg, Germany, September 16, 2019, Proceedings...
View Book →