Warning: file_put_contents(cache/omni_864b7d26742abac661b60de8671f0f1f.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Fast high-resolution techniques applied to the Direction of Arrival (DOA) of signals problem
Subspace decomposition methods are a very useful technique to extract the signal information via Eigen-based estimators. Although these techniques are very accurate, they are usually expensive to upda...
View Book →RES: Regularized Stochastic BFGS Algorithm
RES, a regularized stochastic version of the Broyden-Fletcher-Goldfarb-Shanno (BFGS) quasi-Newton method is proposed to solve convex optimization problems with stochastic objectives. The use of stocha...
View Book →
Introduction to Data Science
Data Analysis and Prediction Algorithms with R...
View Book →
A Graduate Course in Applied Cryptography
The indispensable tool used to protect information in computing systems...
View Book →
Data Communications and Networking
First published in 2000...
View Book →
Problem Solving with Algorithms and Data Structures
...
View Book →
Structural Geology Algorithms
First published in 2011...
View Book →Algorithms for parallel and vector computations
First published in 1995...
View Book →
A parallel-vector algorithm for rapid structural analysis on high-performance computers
First published in 1990...
View Book →
Software for Exascale Computing - SPPEXA 2016-2019
...
View Book →
Advances in Energy System Optimization
Proceedings of the 2nd International Symposium on Energy System Optimization...
View Book →Impact of vector processors on algorithms
First published in 1979...
View Book →
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →
Automated Machine Learning
Methods, Systems, Challenges...
View Book →Support Vector Machines
First published in 2012...
View Book →
Tensor Network Contractions
Methods and Applications to Quantum Many-Body Systems...
View Book →A Description of the KCipher-2 Encryption Algorithm
This document describes the KCipher-2 encryption algorithm. KCipher-2 is a stream cipher with a 128-bit key and a 128-bit initialization vector. Since the algorithm for KCipher-2 was published in 2007...
View Book →The density of uncyclic matrices
An element $X$ in the algebra ${\rm M}(n,\mathbb{F})$ of all $n\times n$ matrices over a field $\mathbb{F}$ is said to be $f$-cyclic if the underlying vector space considered as an $\mathbb{F}[X]$-mod...
View Book →
Data structures and algorithm analysis in C
First published in 1993...
View Book →
A bibliography on parallel and vector numerical algorithms
First published in 1987...
View Book →
Machine Learning Yearning
Technical Strategy for AI Engineers, In the Era of Deep Learning...
View Book →
International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019...
View Book →
DTIC ADA526806: The Structure of Optimal Solutions to the Submodular Function Minimization Problem
In this paper, we study the structure of optimal solutions to the submodular function minimization problem. We introduce prime sets and pseudoprime sets as basic building block of minimizer sets, and ...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →Statistical mechanics approach to 1-bit compressed sensing
Compressed sensing is a technique for recovering a high-dimensional signal from lower-dimensional data, whose components represent partial information about the signal, utilizing prior knowledge on th...
View Book →
Forecasting and Assessing Risk of Individual Electricity Peaks
...
View Book →
Foundations of Machine Learning
...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
2D Game Development: From Zero to Hero
A compendium of the community knowledge on game design and development...
View Book →
Data Structures and Algorithms
Annotated Reference with Examples...
View Book →Bibliography on Parallel and Vector Numerical Algorithms
First published in 2018...
View Book →Mathematical Properties of a Class of Four-dimensional Neutral Signature Metrics
While the Lorenzian and Riemanian metrics for which all polynomial scalar curvature invariants vanish (the VSI property) are well-studied, less is known about the four-dimensional neutral signature me...
View Book →
Statistical Learning and Sequential Prediction
...
View Book →
Tools and Algorithms for the Construction and Analysis of Systems
25th International Conference, TACAS 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings, Part ...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →NASA Technical Reports Server (NTRS) 19920007094: Robust control of systems with real parameter unce
During this research period we have made significant progress in the four proposed areas: (1) design of robust controllers via H infinity optimization; (2) design of robust controllers via mixed H2/H ...
View Book →
More Algorithms for Provable Dictionary Learning
In dictionary learning, also known as sparse coding, the algorithm is given samples of the form $y = Ax$ where $x\in \mathbb{R}^m$ is an unknown random sparse vector and $A$ is an unknown dictionary m...
View Book →
Fractional Graph Theory
A Rational Approach to the Theory of Graphs...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →
Foundations of Trusted Autonomy
...
View Book →
Machine learning based detection of DDoS attacks in software defined network
Nowadays, software defined networking (SDN) offers benefits in the area so fautomation, elasticity, and resource consumption. However, evidenceis there that SDN controller may undergo certain defeat f...
View Book →
Computer and Information Sciences
31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings...
View Book →
Algorithms for Quadratic Matrix and Vector Equations
First published in 2011...
View Book →融入教育心理学的SBO算法
融入教育心理学的SBO算法 作者: 张雨婷 1 刘勇 1 作者单位: 1. 上海理工大学 管理学院 提交时间: 2022-05-10 摘要: 针对SBO(School Based Optimization)算法搜索...
View Book →Support Vector Machines and Evolutionary Algorithms for Classification
First published in 2014...
View Book →
Graph Databases For Beginners
The #1 Platform for Connected Data...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →
Think Data Structures
Algorithms and Information Retrieval in Java...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →
Graph Algorithms
Practical Examples in Apache Spark and Neo4j...
View Book →Document Clustering with K-tree
This paper describes the approach taken to the XML Mining track at INEX 2008 by a group at the Queensland University of Technology. We introduce the K-tree clustering algorithm in an Information Retri...
View Book →
Parallel structurally-symmetric sparse matrix-vector products on multi-core processors
We consider the problem of developing an efficient multi-threaded implementation of the matrix-vector multiplication algorithm for sparse matrices with structural symmetry. Matrices are stored using t...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →
Machine Learning for Cyber Physical Systems
Selected papers from the International Conference ML4CPS 2020...
View Book →Multi-Disease Detection with Doctor Recommendation System
AI and machine learning, from self-driving cars to health care, have turned out to be an indispensable tool for several industries. In medicine, the big availability of patient records now opens new p...
View Book →Squirrel cage induction motor predictive direct torque control based on multi-step delay compensatio
The squirrel cage induction motor direct torque control main problems due to torque and large stator flux pulsation. In this an improved model predictive direct torque control algorithm considering mu...
View Book →
Teaching and Learning About Whole Numbers in Primary School
...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →
Graph Databases
New Opportunities for Connected Data...
View Book →
Rhetorical Code Studies
Discovering Arguments in and around Code...
View Book →
Algorithmic Graph Theory and Sage
...
View Book →
Mathematical Logic and Its Applications 2020
...
View Book →
The Art of SEO
Mastering Search Engine Optimization...
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →Weighted $\ell_1$ Minimization for Sparse Recovery with Prior Information
In this paper we study the compressed sensing problem of recovering a sparse signal from a system of underdetermined linear equations when we have prior information about the probability of each entry...
View Book →
Computer Networks
First published in 1981...
View Book →Vectorization of linear discrete filtering algorithms
First published in 1977...
View Book →
Algorithms for Decision Making
...
View Book →A Robust Speaker Identification System
This paper is aimed to implement a robust speaker identification system. It is a software architecture which identifies the current talker out of a set of speakers. The system is emphasized on text-de...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →
Computer networking
First published in 1900...
View Book →
Fast multiresolution algorithms for matrix-vector multiplication
First published in 1992...
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →Ensemble stacking classifier model for prediction of diabetes
Diabetes, being a chronic condition, possesses the capacity to instigate a global healthcare catastrophe. This condition can be managed and potentially cured with prompt diagnosis and treatment. Integ...
View Book →
Optimization of Process Flowsheets through Metaheuristic Techniques
...
View Book →Generalized Network Tomography
For successful estimation, the usual network tomography algorithms crucially require i) end-to-end data generated using multicast probe packets, real or emulated, and ii) the network to be a tree root...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python 3.6...
View Book →
CS Unplugged
An enrichment and extension programme for primary-aged students...
View Book →
Programming Computer Vision with Python
Tools and algorithms for analyzing images...
View Book →A New QEA Based High Performance Sensorless Control of IM Drive
Quantum Evolutionary Algorithm (QEA) based proportional-integral (PI) controller tuning is used for getting fast speed response induction motor (IM) drive. A high performance simple sensorless control...
View Book →