Warning: file_put_contents(cache/omni_7fbac712239f0ff504bdde5000c4de1b.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Spectral and High Order Methods for Partial Differential Equations ICOSAHOM 2018
Selected Papers from the ICOSAHOM Conference, London, UK, July 9-13, 2018...
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →
Variant Construction from Theoretical Foundation to Applications
...
View Book →
Health of People, Health of Planet and Our Responsibility
Climate Change, Air Pollution and Health...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →An Interruption Discovery Structure Depend on Cluster Centres and Adjacent Neighbours
The aim of an interruption discovery structure (IDS) is to notice various types of hateful network transfer and computer usage, which cannot be detected by a straight firewall. Many IDS have been urba...
View Book →Detecting and Mitigating DDoS Attacks The Role of AI and Machine Learning
The growing frequency and complexity of Distributed Denial of Service DDoS attacks have necessitated more dynamic and intelligent cybersecurity solutions. This paper explores the transformative role o...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →
Statistics with Julia
Fundamentals for Data Science, Machine Learning and Artificial Intelligence...
View Book →Screening of hepatocyte proteins binding with C-terminally truncated surface antigen middle protein
This article is from Molecular Medicine Reports , volume 10 . Abstract The function of middle hepatitis B surface protein C-terminally truncated at amino acid position 167 (MHBst167) is not currently ...
View Book →
Feature selection to improve distributed denial of service detection accuracy using hybrid N-Gram he
Distributed denial of service (DDoS) attacks servers and computers in various ways, such as flooding traffic. There are three DDoS detection methods, namely anomaly-based, pattern-based and heuristic-...
View Book →
Computer Algebra Systems
Book Description The book represents a library of well-designed software, which well supplements the already available Maple software with the orientation towards the widest circle of the Maple users,...
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →
Sensitivity Analysis: Matrix Methods in Demography and Ecology
...
View Book →sovereign-frequency-archive
<!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>THE SOVEREIGN FREQUENCY...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →
Calculus, Multivariable, Student Solutions Manual
The new edition exhibits the same strengths from earlier editions including the Rule of Four, an emphasis on modeling, exposition that students can read and understand and a flexible approach to techn...
View Book →covid-and-related-literature
INSTITUTE FOR CORONAVIRUS EMERGENCE NONPROFIT INTELLIGENCE The Spartacus Letter — Rev. 2 (2021-09-28) | Spartacus https://archive.org/details/books-buecher-literature/2021-09-28_covid-19-the_spartac...
View Book →DTIC ADA526763: A Particle Filtering Approach to Joint Passive Radar Tracking and Target Classificat
In this thesis, we present a recursive Bayesian solution to the problem of joint tracking and classification for ground-based air surveillance. In our system, we specifically allow for complications d...
View Book →
Representation Learning for Natural Language Processing
...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
Sheaves on Graphs, Their Homological Invariants, and a Proof of the Hanna Neumann Conjecture
In this paper we establish some foundations regarding sheaves of vector spaces on graphs and their invariants, such as homology groups and their limits. We then use these ideas to prove the Hanna Neum...
View Book →
Interface Oral Health Science 2016
Innovative Research on Biosis–Abiosis Intelligent Interface...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →
Fundamentals of Biomechanics
Equilibrium, Motion, and Deformation...
View Book →Optical Computing
A source on the rapidly changing field of optical computing. Readers are taken through the relevant concepts of classical and Fourier optics, digital logic and digital image processing. In addition to...
View Book →
C++ Primer Answer Book
C++ programmers who use the "Answer Book" in conjunction with the "C++ Primer, 3rd Ed" will better understand the concepts of C++ by working through the exercises and gain new perspectives through the...
View Book →Machine Learning Based Implementation of Home Automation Using Smart Mirror AQIB ALI
When ordered, it may be folded in half quickly and effortlessly. IoT (Internet of Things) technology drives the Smart Mirror's functionality. Standard mirror functionality is included, in addition to ...
View Book →
Biodiversity and Health in the Face of Climate Change
...
View Book →A hybrid approach of pattern recognition to detect marine animals
Acquiring up-to-date knowledge about various animals will have a significant impact on effectively managing species within the ecosystem. Manually identifying animals and their traits continues to be ...
View Book →
DTIC ADA036441: Test and Evaluation of an Enroute System Terrain-Avoidance Function with the NAS A3d
This report describes the operational evaluation of an enroute system terrain-avoidance function in conjunction with the National Airspace System Enroute A3d2.1 system. Tests were conducted at the Nat...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →
The shuffle estimator for explainable variance in fMRI experiments
In computational neuroscience, it is important to estimate well the proportion of signal variance in the total variance of neural activity measurements. This explainable variance measure helps neurosc...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →
The Scientific Papers of John Couch Adams ...: Original papers published by the author during his li
No description available....
View Book →
Foundations of Machine Learning
...
View Book →
Ionospheric Multi-Spacecraft Analysis Tools
Approaches for Deriving Ionospheric Parameters...
View Book →
Linear Selection Indices in Modern Plant Breeding
...
View Book →Plant microRNA-Target Interaction Identification Model Based on the Integration of Prediction Tools
This article is from PLoS ONE , volume 9 . Abstract Background: Confident identification of microRNA-target interactions is significant for studying the function of microRNA (miRNA). Although some com...
View Book →
Core Web Programming
One-stop shopping for serious Web developers! The worldwide best seller for serious Web developers--now 100% updated! In-depth HTML 4/CSS, Java 2, Servlets, JSP, XML, and more! Industrial-strength cod...
View Book →
Language Technologies for the Challenges of the Digital Age
27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings...
View Book →Description of composite systems in the spectral integration technique: the gauge invariance and ana
The constraints followed from gauge invariance and analyticity are considered for the amplitudes of radiative transitions of composite systems when composite systems are treated in terms of spectral i...
View Book →Designing with Programmable Array Logic
No description available....
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
Software for Exascale Computing - SPPEXA 2016-2019
...
View Book →
The Scientific Papers of John Couch Adams
No description available....
View Book →
Electromagnetic Theory of Light
No description available....
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →
Fractional Graph Theory
A Rational Approach to the Theory of Graphs...
View Book →
Algorithmic Graph Theory and Sage
...
View Book →
Optimizing HPC Applications with Intel Cluster Tools
Hunting Petaflops...
View Book →
C++ Data Structures and Algorithm Design Principles
Get started with C++ programming by learning how to build applications using its data structures and algorithms Key FeaturesExplore data structures such as arrays, stacks, and graphs with real-world e...
View Book →
Graph Theory
This text offers the most comprehensive and up-to-date presentation available on the fundamental topics in graph theory. It develops a thorough understanding of the structure of graphs, the techniques...
View Book →Student Solutions Manual to Accompany Calculus Si Ngle and Multivariable, 3e
The Third Edition of CALCULUS reflects the strong consensus within the mathematics community for a new balance between the contemporary ideas of the original editions of this book and ideas and topics...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
Foundations of Quantum Theory
From Classical Concepts to Operator Algebras...
View Book →A new proactive feature selection model based on the enhanced optimization algorithms to detect DRDo
Cyberattacks have grown steadily over the last few years. The distributed reflection denial of service (DRDoS) attack has been rising, a new variant of distributed denial of service (DDoS) attack. DRD...
View Book →
International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019...
View Book →
Static Analysis
This volume constitutes the proceedings of the third International Workshop on Static Analysis (WSA`93), held in Padova, Italy, in September 1993. The objective of the international workshop series WS...
View Book →
Problems in Classical Electromagnetism
157 Exercises with Solutions...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python 3.6...
View Book →
Programming Computer Vision with Python
Tools and algorithms for analyzing images...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
Bayesian Methods in the Search for MH370
...
View Book →
Spatial Thinking in Planning Practice
An Introduction to GIS...
View Book →Algorithms in C++ Part 5
Describes the most important known methods for solving the graph processing problems that arise in computing applications. The algorithms address diagraphs, minimum spanning trees, shortest paths, and...
View Book →
Introduction to Data Science
Data Analysis and Prediction Algorithms with R...
View Book →
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →R Programming Insights Textbook
In today's data-driven world, the ability to analyze and interpret data is essential. R, a powerful and versatile programming language, has become a leading tool for data analysis, statistics, and vis...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →
Anisotropy Across Fields and Scales
...
View Book →
Ambisonics
A Practical 3D Audio Theory for Recording, Studio Production, Sound Reinforcement, and Virtual Reality...
View Book →