Warning: file_put_contents(cache/omni_fc77ee025dcc2ed7bd49a50fe57b1228.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
DTIC ADA385354: Angiogenisis Targeted Gene Therapy
The growth of most solid tumors, including breast carcinoma, is highly dependent of the development of vascular structures to support the increasing need of the tumor for nutrients and oxygen, a proce...
View Book →
Foundations of Machine Learning
...
View Book →The role of disease cycles in the endemicity of infectious diseases
Vector-borne diseases with reservoir cycles are complex to understand because new infections come from contacts of the vector with humans and different reservoirs. In this scenario, the basic reproduc...
View Book →
DTIC ADA207272: Peptide Transport through the Blood-Brain Barrier
Most neuropeptides are incapable of entering brain from blood owing to the presence of unique anatomical structures in the brain capillary wall, which makes up the blood-brain barrier (BBB). Such neur...
View Book →
Coming to Terms with Superdiversity
The Case of Rotterdam...
View Book →Sensor and Sensorless Fault Tolerant Control for Induction Motors Using a Wavelet Index.
This article is from Sensors (Basel, Switzerland) , volume 12 . Abstract Fault Tolerant Control (FTC) systems are crucial in industry to ensure safe and reliable operation, especially of motor drives....
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
Satellite Earth Observations and Their Impact on Society and Policy
...
View Book →
Spatial Thinking in Planning Practice
An Introduction to GIS...
View Book →On Frobenius-destabilized rank-2 vector bundles over curves
Let X be a smooth projective curve of genus g \geq 2 over an algebraically closed field k of characteristic p > 0. Let M_X be the moduli space of semistable rank-2 vector bundles over X with trivial d...
View Book →Compute! Magazine Issue 012
Compute! Issue 12 - May, 1981. The Editor's Notes: It Talks Back ... And Well - The Editor's Notes: Introducing "Super-PET" - The Editor's Notes: News From The Atari Front - The Editor's Notes: That's...
View Book →Holographic droplets in p-wave insulator/superconductor transition
In the present paper, based on the notion of marginally stable modes of vector perturbations in the AdS soliton back ground we investigate the magnetic field effect on holographic $ p $- wave insulato...
View Book →
Socioeconomic Inequality and Educational Outcomes
Evidence from Twenty Years of TIMSS...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
Analysis of linear motor with symmetrical EMF vector for household elevator application
Linear permanent magnet synchronous motor (LPMSM) has emerged as a viable alternative to other linear motors for higher thrust lifting action. With the advancement of permanent magnets, LPMSM could co...
View Book →
Data Protection for the Hybrid Cloud
Microsoft System Center...
View Book →
Principles and Practice of Case-based Clinical Reasoning Education
A Method for Preclinical Students...
View Book →
Developing Backbone.js Applications
Building Better JavaScript Applications...
View Book →
Variant Construction from Theoretical Foundation to Applications
...
View Book →
Beaufighter Aces of World War 2 (Aircraft of the Aces)
First published in 2005...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →
Detection of weakly interacting light vector bosons by coherent scattering
We propose a novel experimental method to produce and detect weakly interacting light vector bosons using coherent processes in refractive media. A light vector boson would be produced by a laser phot...
View Book →
Interface Oral Health Science 2016
Innovative Research on Biosis–Abiosis Intelligent Interface...
View Book →
Proceedings of the National Conference on Roll-Back Malaria in Ethiopia
First published in 2000...
View Book →National roll back malaria strategic plan
First published in 2005...
View Book →
Preparing for Life in a Digital World
IEA International Computer and Information Literacy Study 2018 International Report...
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →
Fundamentals of Biomechanics
Equilibrium, Motion, and Deformation...
View Book →DTIC ADA1050729: Military Geodesy and Geospace Science. Unit Three
This lecture course provides a full-year introduction to Military Geodesy and Geospace Science. Throughout the presentation a military perspective is maintained which links Mapping, Charting, and Geod...
View Book →DTIC ADP010836: The RF PRISM Concept for Pushing Forward the Antenna Size Barrier in Space Based Rad
RF PRISM is a new space antenna concept where an array is fed through a mesh of points on the antenna back face with RE signals transmitted (or received) by another satellite called illuminator and us...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →
Illiberal Trends and Anti-EU Politics in East Central Europe
...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →DTIC ADA1050727: Military Geodesy and Geospace Science. Unit Three
This lecture course provides a full-year introduction to Military Geodesy and Geospace Science. Throughout the presentation a military perspective is maintained which links Mapping, Charting, and Geod...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
Nuclear Back-end and Transmutation Technology for Waste Disposal
Beyond the Fukushima Accident...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →
Non-Uniqueness of Quantized Yang-Mills Theories
We consider quantized Yang-Mills theories in the framework of causal perturbation theory which goes back to Epstein and Glaser. In this approach gauge invariance is expressed by a simple commutator re...
View Book →
Foundations of Quantum Theory
From Classical Concepts to Operator Algebras...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →
Ionospheric Multi-Spacecraft Analysis Tools
Approaches for Deriving Ionospheric Parameters...
View Book →
Ambisonics
A Practical 3D Audio Theory for Recording, Studio Production, Sound Reinforcement, and Virtual Reality...
View Book →
Ethnic Identity, Social Mobility and the Role of Soulmates
...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →
Sensitivity Analysis: Matrix Methods in Demography and Ecology
...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
Remote Capture
Digitising Documentary Heritage in Challenging Locations...
View Book →
Language Technologies for the Challenges of the Digital Age
27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings...
View Book →
Biodiversity and Health in the Face of Climate Change
...
View Book →
Optimizing HPC Applications with Intel Cluster Tools
Hunting Petaflops...
View Book →
Human Rights in Child Protection
Implications for Professional Practice and Policy...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →The Poor die young : housing and health in Third World cities
xxvi, 309 pages :...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →CIA Reading Room cia-rdp12-00036r000100170012-0: PRINTING AND PHOTOGRAPHY GROUP QUARTERLY MBO PROGRE
Declassified in Part - Sanitized Copy Approved for Release 2013/07/31 : CIA-RDP12-00036R000100170012-0 PRINTING AND PHOTOGRAPHY GROUP QUARTERLY MBO PROGRESS REPORT OBJECTIVE STATEMENT: Study Feasibili...
View Book →
What Can I Do Now? Guiding Users in a World of Automated Decisions
More and more processes governing our lives use in some part an automatic decision step, where -- based on a feature vector derived from an applicant -- an algorithm has the decision power over the fi...
View Book →
Programming Windows Store Apps with HTML, CSS, and JavaScript
...
View Book →
Problems in Classical Electromagnetism
157 Exercises with Solutions...
View Book →Accelerated expansion of the Universe driven by dynamic self-interaction
We establish a new model, which takes into account a dynamic (inertial) self-interaction of gravitating systems. The model is formulated by introduction of a new function depending on the square of th...
View Book →CIA Reading Room cia-rdp80t00246a025300270001-1: "THE NEUTRINO" BY M A MARKOV, PROF OF PHYSICS, JOIN
, -50X1 Declassified in Part - Sanitized Copy Approved for Release 2013/09/16: CIA-RDP80T00246A025300270001-1 ? 4 " -A 4 ????1411111 CENTRAL 1NTE1 tiocrAcr. AGE11CY This material contains infortnatial...
View Book →
Defense against the Black Arts
How Hackers Do What They Do and How to Protect against It...
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →
Bayesian Methods in the Search for MH370
...
View Book →
Linear Selection Indices in Modern Plant Breeding
...
View Book →
CIA Reading Room cia-rdp79b00873a001600010003-4: IMPROVED REAR PROJECTION VIEWING SYSTEMS
I A ?TAT ' Declassified in Part- Sanitized Copy Approved forRelease2012/09/11 : CIA-RDP79B00873A001600010003-4 , , 'W.V. ? 0.4 ./ Attention: John R. Gentlemen: 15 January 1965 We are sending you the e...
View Book →DTIC AD1037981: BULGARIA'S MULTI-VECTOR FOREIGN POLICY APPROACH TO SECURITY CHALLENGES IN EASTERN EU
The high tensions in Eastern Europe fomented by the Ukrainian crisis and Russia's annexation of Crimea came as the first surprising shock for the European security after the end of the Cold War. The s...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python 3.6...
View Book →