Warning: file_put_contents(cache/omni_107342ad95b233ba611c258dadc17f50.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Advances in Energy System Optimization
Proceedings of the 2nd International Symposium on Energy System Optimization...
View Book →
Think Data Structures
Algorithms and Information Retrieval in Java...
View Book →Improvement of voltage profile for large scale power system using soft computing approach
In modern power system operation, control, and planning, reactive power as part of power system component is very important in order to supply electrical load such as an electric motor. However, the r...
View Book →
Algorithms for Decision Making
...
View Book →
Computer Aided Verification
31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part I...
View Book →
Social Media Mining
An Introduction...
View Book →
Algorithmic Graph Theory and Sage
...
View Book →
Foundations of Software Science and Computation Structures
22nd International Conference, FOSSACS 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings...
View Book →
Problem Solving with Algorithms and Data Structures
...
View Book →MCIP Mining Crop Image Data On Pysparkdataframe Using Feature Selection And Cluster Based Techniques
Crop-related problems such as pests and diseases in India lead to yearly losses exceeding $500 billion. Leaf blight is identified as the principal factor responsible for the substantial financial loss...
View Book →
The Future of Financial Systems in the Digital Age
Perspectives from Europe and Japan...
View Book →
Machine Learning Yearning
Technical Strategy for AI Engineers, In the Era of Deep Learning...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
Graph Databases For Beginners
The #1 Platform for Connected Data...
View Book →
A Graduate Course in Applied Cryptography
The indispensable tool used to protect information in computing systems...
View Book →
Foundations of Trusted Autonomy
...
View Book →
Mathematical Logic and Its Applications 2020
...
View Book →
Machine Learning for Cyber Physical Systems
Selected papers from the International Conference ML4CPS 2020...
View Book →
Software for Exascale Computing - SPPEXA 2016-2019
...
View Book →
Projection-Based Clustering through Self-Organization and Swarm Intelligence
Combining Cluster Analysis with the Visualization of High-Dimensional Data...
View Book →
Rhetorical Code Studies
Discovering Arguments in and around Code...
View Book →
Grokking Algorithms: An illustrated guide for programmers and other curious people
First published in 2016...
View Book →
Algorithms to Live By
First published in 2016...
View Book →
2D Game Development: From Zero to Hero
A compendium of the community knowledge on game design and development...
View Book →
Lithium-Ion Batteries
A Machine-Generated Summary of Current Research...
View Book →2. Steam Condesnser.full
Manufacturing industry today faces the challenge of having to develop high quality products faster and economically than ever before. Therefore optimization is seen as an innovative technique under ce...
View Book →
Teaching Multiplication with Lesson Study
Japanese and Ibero-American Theories for Mathematics Education...
View Book →3110 0114 1123 4244
This article proposes the modified KNN (K Nearest Neighbor) algorithm which receives a graph as its input data and is applied to the word categorization. The graph is more graphical for representing a...
View Book →
CS Unplugged
An enrichment and extension programme for primary-aged students...
View Book →
Teaching and Learning About Whole Numbers in Primary School
...
View Book →
Introduction to Data Science
Data Analysis and Prediction Algorithms with R...
View Book →
Finite Difference Computing with Exponential Decay Models
...
View Book →
Computer Networks
First published in 1981...
View Book →
Forecasting and Assessing Risk of Individual Electricity Peaks
...
View Book →
Artificial intelligence
First published in 1994...
View Book →
Systematic methods for knowledge acquisition and expert system development
Nine cooperating rule-based systems, collectively called AUTOCREW, were designed to automate functions and decisions associated with a combat aircraft's subsystem. The organization of tasks within eac...
View Book →Scaling up machine learning : parallel and distributed approaches
xvi, 475 p. : 26 cm...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →
Advances in Computers, Volume 49 (Advances in Computers)
First published in 1995...
View Book →
IMPROVE - Innovative Modelling Approaches for Production Systems to Raise Validatable Efficiency
Intelligent Methods for the Factory of the Future...
View Book →Optimal economic environmental power dispatch by using artificial bee colony algorithm
Today, most power plants worldwide use fossil fuels such as natural gas, coal, and oil as the primary resource for energy reproduction primarily. The new term for economic environmental power dispatch...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
Introduction to Embedded Systems
A Cyber-Physical Systems Approach...
View Book →
Data Structures and Algorithms Made Easy
First published in 2011...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →
Programming for Computations - MATLAB/Octave
A Gentle Introduction to Numerical Simulations with MATLAB/Octave...
View Book →The C-finite Ansatz Meets the Holonomic Ansatz
We show how the continuous Almkvist-Zeilberger algorithm can be used to efficiently discover and prove differential equations satisfied by generating functions of sequences defined as integrals of pow...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →
High-Performance Modelling and Simulation for Big Data Applications
Selected Results of the COST Action IC1406 cHiPSet...
View Book →
43
This paper proposes a Beamforming algorithm for simultaneous transmission of information and power in multi- antenna linear array system. Here we considered three node system in which transmitter and ...
View Book →
Digital signal processing
First published in 1992...
View Book →
Theory and Applications of Ordered Fuzzy Numbers
A Tribute to Professor Witold Kosiński...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
Optimization of Process Flowsheets through Metaheuristic Techniques
...
View Book →
Graph Databases
New Opportunities for Connected Data...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python...
View Book →Mascots '96 : 4th International Workshop on Modeling, Analysis and Simulation
1 online resource (312 pages)...
View Book →Clustering and Classification in Text Collections Using Graph Modularity
A new fast algorithm for clustering and classification of large collections of text documents is introduced. The new algorithm employs the bipartite graph that realizes the word-document matrix of the...
View Book →
Computer and Information Sciences
31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings...
View Book →
Discrete Mathematics and Its Applications
First published in 1988...
View Book →
Cavernous sinus tuberculoma mimicking a neoplasm: Case report, literature review, and diagnostic and
This article is from Surgical Neurology International , volume 4 . Abstract Background:: Cavernous sinus tuberculomas are extremely rare, but the increasing incidence worldwide of central nervous syst...
View Book →
Tensor Network Contractions
Methods and Applications to Quantum Many-Body Systems...
View Book →
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →
Ray Tracing Gems
High-Quality and Real-Time Rendering with DXR and Other APIs...
View Book →The mystery of knots : computer programming for knot tabulation
x, 396 p. : 23 cm...
View Book →
Foundations of Machine Learning
...
View Book →
Fundamental Approaches to Software Engineering
21st International Conference, FASE 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings...
View Book →
Programming Computer Vision with Python
Tools and algorithms for analyzing images...
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →
Modern Operating Systems
First published in 1992...
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →A generic classification-based method for segmentation of nuclei in 3D images of early embryos.
This article is from BMC Bioinformatics , volume 15 . Abstract Background: Studying how individual cells spatially and temporally organize within the embryo is a fundamental issue in modern developmen...
View Book →A Linear-time algorithm for minimax flow centers in trees
Paper whose purpose is to develop an efficient algorithm for the problem of the minimax flow centre, applications of which can be found in the military context and communications networks. The paper s...
View Book →
Automated Machine Learning
Methods, Systems, Challenges...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
Invitation to Computer Science
First published in 1995...
View Book →
Introduction to Algorithms
First published in 1990...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →
International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019...
View Book →Automatic urinary bladder detection from medical computed tomography scans using convolutional neura
This paper introduces a system for detecting and evaluating an algorithm that segments the urinary bladder in medical images obtained from contrast-less computed tomography (CT) scans of patients with...
View Book →
Natural Computing and Beyond
Winter School Hakodate 2011, Hakodate, Japan, March 2011 and 6th International Workshop on Natural Computing, Tokyo, Japan, March 2012, Proceedings...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
Autonomous Control for a Reliable Internet of Services
Methods, Models, Approaches, Techniques, Algorithms, and Tools...
View Book →
Computer science
First published in 1985...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →
Graph Algorithms
Practical Examples in Apache Spark and Neo4j...
View Book →
Computer networking
First published in 1900...
View Book →DeMAID/GA an Enhanced Design Manager's Aid for Intelligent Decomposition
Many companies are looking for new tools and techniques to aid a design manager in making decisions that can reduce the time and cost of a design cycle. One tool is the Design Manager's Aid for Intell...
View Book →
Cloud-Based Benchmarking of Medical Image Analysis
...
View Book →
Statistical Learning and Sequential Prediction
...
View Book →
Market Segmentation Analysis
Understanding It, Doing It, and Making It Useful...
View Book →
Tools and Algorithms for the Construction and Analysis of Systems
25th International Conference, TACAS 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings, Part ...
View Book →
The Art of SEO
Mastering Search Engine Optimization...
View Book →A condition-based distributed approach for secured privacy preservation of nodes in wireless sensor
The fast expansion of wireless sensor network-internet of things (WSN-IoT) in recent years has led to the adoption of a vital infrastructure. Adversaries who work together to carry out privacy-related...
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →Breast Cancer Classification Using Machine Learning
Manual determination of breast cancer takes a lot of time sometimes weeks or months and is perilous with a high pace of morbidity, mortality and can involve human error. an early assurance will help t...
View Book →On particle--like jets
Under which conditions does a jet appear as a particle--like signal from the hidden realm of quarks and gluons? Motivated by this question jet clustering conditions are formulated, in order to charact...
View Book →
Data structures and algorithms
First published in 1983...
View Book →