Warning: file_put_contents(cache/omni_19542a656bc5fcec45cd882e980b4756.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
NASA Technical Reports Server (NTRS) 20050137707: An Approach to V&V of Embedded Adaptive Systems
Rigorous Verification and Validation (V&V) techniques are essential for high assurance systems. Lately, the performance of some of these systems is enhanced by embedded adaptive components in order to...
View Book →DTIC ADA063312: Program Documentation for the Helmet-Mounted-Display Processor Flight Software,
The flight software executes in the Helmet-Mounted-Display Processor (HMDP) to provide vector-graphic displays that may be viewed on a helmet-mounted display (HMD), or a heads-up display (HUD). There ...
View Book →
Leptonic widths of heavy quarkonia: S-Wave QCD/NRQCD matching coefficients for the electromagnetic v
We construct the S-wave part of the electromagnetic vector annihilation current to O(alpha_s v^2)$ on the lattice for heavy quarks whose dynamics are described by the NRQCD action, where v is the non-...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →DTIC ADA012548: A Single Ship/Multiple Cruise Missile Engagement Model for Fleet Air Defense Plannin
A mathematical model of an engagement between a Navy ship and a number of anti-ship cruise missiles is described. The model is designed to be used in Navy planning activities involving ship/cruise mis...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
Developing Graphics Frameworks with Python and OpenGL
...
View Book →
International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →The Dynamical Composite Higgs
We present a simple microscopic realization of a pseudo-Nambu-Goldstone (pNGB) boson Higgs scenario arising from the breaking of $SO(5) \rightarrow SO(4)$. The Higgs constituents are explicitly identi...
View Book →
Biodiversity and Health in the Face of Climate Change
...
View Book →
Explaining Dark Matter and $B$ Decay Anomalies with an $L_\mu - L_\tau$ Model
We present a dark sector model based on gauging the $L_\mu - L_\tau$ symmetry that addresses anomalies in $b \rightarrow s \mu^+ \mu^-$ decays and that features a particle dark matter candidate. The d...
View Book →
Problems in Classical Electromagnetism
157 Exercises with Solutions...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python 3.6...
View Book →
Bayesian Methods in the Search for MH370
...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
NASA Technical Reports Server (NTRS) 20160005060: Microgravity Simulation Facility (MSF)
The Microgravity Simulator Facility (MSF) at Kennedy Space Center (KSC) was established to support visiting scientists for short duration studies utilizing a variety of microgravity simulator devices ...
View Book →Are Y(4260) and {\rm Z$_2^{+}$(4250)} ${\rm D_1D}$ or ${\rm D_0D^{*}}$ Hadronic Molecules?
In this work, we have investigated whether Y(4260) and ${\rm Z^{+}_2(4250)}$ could be ${\rm D_1D}$ or ${\rm D_0D^{*}}$ molecules in the framework of meson exchange model. The off-diagonal interaction ...
View Book →
Foundations of Quantum Theory
From Classical Concepts to Operator Algebras...
View Book →
Optimizing HPC Applications with Intel Cluster Tools
Hunting Petaflops...
View Book →
Foundations of Machine Learning
...
View Book →
Ambisonics
A Practical 3D Audio Theory for Recording, Studio Production, Sound Reinforcement, and Virtual Reality...
View Book →
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →
Composition and stability of hybrid stars with hyperons and quark color-superconductivity
The recent measurement of a $1.97\pm 0.04$ solar-mass pulsar places a stringent lower bound on the maximum mass of compact stars and therefore challenges the existence of any agents that soften the eq...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →
Reconstruction of an Inductive Velocity Field Vector from Doppler Motions and a Pair of Solar Vector
We outline a general methodology to infer the inductive velocity field vector in solar active regions. For the first time, both the field-aligned and the cross-field velocity components are reconstruc...
View Book →
Charmless B decays to a scalar meson and a vector meson
The hadronic charmless B decays into a scalar meson and a vector meson are studied within the framework of QCD factorization. The main results are: (i) The decay rates for the $f_0(980)K^{*-}$ and $f_...
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →
Software for Exascale Computing - SPPEXA 2016-2019
...
View Book →
Variant Construction from Theoretical Foundation to Applications
...
View Book →
Linear Selection Indices in Modern Plant Breeding
...
View Book →
Introduction to Data Science
Data Analysis and Prediction Algorithms with R...
View Book →
DTIC ADA124282: The Effect of Random Steering Vector Errors in the Applebaum Adaptive Array.
This report examines the effect of random errors in the steering vector of an Applebaum adaptive array. Each component of the steering vector is assumed to have a random error component uncorrelated b...
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →
Supersymmetric codimension-two branes and U(1)_R mediation in 6D gauged supergravity
We construct a consistent supersymmetric action for brane chiral and vector multiplets in a six-dimensional chiral gauged supergravity. A nonzero brane tension can be accommodated by allowing for a br...
View Book →
Spatial Thinking in Planning Practice
An Introduction to GIS...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →A Diphoton Resonance from Bulk RS
Recent LHC data hinted at a 750 GeV mass resonance that decays into two photons. A significant feature of this resonance is that its decays to any other Standard Model particles would be too low to be...
View Book →NASA Technical Reports Server (NTRS) 20050169187: Concept Designed and Developed for Distortion- Tol
Engine Control Future aircraft turbine engines, both commercial and military, must be able to successfully accommodate expected increased levels of steady-state and dynamic engine-face distortion. Adv...
View Book →
Spectral and High Order Methods for Partial Differential Equations ICOSAHOM 2018
Selected Papers from the ICOSAHOM Conference, London, UK, July 9-13, 2018...
View Book →Doublet-Triplet Splitting and Fermion Masses with Extra Dimensions
The pseudo-Goldstone boson mechanism for the ``doublet-triplet splitting'' problem of the grand unified theory can be naturally implemented in the scenario with extra dimensions and branes. The two SU...
View Book →
Programming Computer Vision with Python
Tools and algorithms for analyzing images...
View Book →
Representation Learning for Natural Language Processing
...
View Book →Charmless $B_{u,d,s}\to VT$ decays in perturbative QCD approach
Motivated by the experimental data, we study charmless $B_{u,d,s}\to VT$ ($V$ and $T$ denote light vector and tensor mesons respectively) decays in the perturbative QCD approach. The predictions of br...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →Leptonic widths of heavy quarkonia: QCD/NRQCD matching for the electromagnetic current at O(α_s v^2
We construct the S-wave part of the electromagnetic vector annihilation current to $O(\alpha_s v^2)$, where $v$ is the non-relativistic quark velocity, for heavy quarks whose dynamics are described by...
View Book →
Fundamentals of Biomechanics
Equilibrium, Motion, and Deformation...
View Book →String Consistency, Heavy Exotics, and the 750 GeV Diphoton Excess at the LHC: Addendum
We study models with heavy exotics that account for the LHC $750$ GeV diphoton excess in light of current vector-like quark bounds. Utilizing only exotics that may appear in three-stack and four-stack...
View Book →
Sensitivity Analysis: Matrix Methods in Demography and Ecology
...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
Interface Oral Health Science 2016
Innovative Research on Biosis–Abiosis Intelligent Interface...
View Book →
Ionospheric Multi-Spacecraft Analysis Tools
Approaches for Deriving Ionospheric Parameters...
View Book →
Health of People, Health of Planet and Our Responsibility
Climate Change, Air Pollution and Health...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →
Fractional Graph Theory
A Rational Approach to the Theory of Graphs...
View Book →
Algorithmic Graph Theory and Sage
...
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →
Statistics with Julia
Fundamentals for Data Science, Machine Learning and Artificial Intelligence...
View Book →
Anisotropy Across Fields and Scales
...
View Book →
Language Technologies for the Challenges of the Digital Age
27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings...
View Book →DTIC ADA443574: Machine Learning in Intrusion Detection
Detection of anomalies in data is one of the fundamental machine learning tasks. Anomaly detection provides the core technology for a broad spectrum of security-centric applications. In this dissertat...
View Book →