Warning: file_put_contents(cache/omni_14c173c4110d3754ccf402d77b71833f.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →
Health of People, Health of Planet and Our Responsibility
Climate Change, Air Pollution and Health...
View Book →
Problems in Classical Electromagnetism
157 Exercises with Solutions...
View Book →Diabetic Retinopathy Screening In Human Eyes Using Image Processing and Segmentation
Diabetic Retinopathy is a complication in which the retina of the eye gets damaged due to secretion of fluid from blood vessels to retina, It may also cause vision loss. It occurs due to damage of blo...
View Book →
Representation Learning for Natural Language Processing
...
View Book →
Fractional Graph Theory
A Rational Approach to the Theory of Graphs...
View Book →
Spectral and High Order Methods for Partial Differential Equations ICOSAHOM 2018
Selected Papers from the ICOSAHOM Conference, London, UK, July 9-13, 2018...
View Book →Hybrid logistic regression support vector model to enhance prediction of bipolar disorder
Bipolar disorder has become one of the major mental health issues due to stressed life around the world. This is the major reason for suicides these days as these people are unable to convey their fee...
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →
Biodiversity and Health in the Face of Climate Change
...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →
Sensitivity Analysis: Matrix Methods in Demography and Ecology
...
View Book →
Language Technologies for the Challenges of the Digital Age
27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →covid-and-related-literature
INSTITUTE FOR CORONAVIRUS EMERGENCE NONPROFIT INTELLIGENCE The Spartacus Letter — Rev. 2 (2021-09-28) | Spartacus https://archive.org/details/books-buecher-literature/2021-09-28_covid-19-the_spartac...
View Book →
A hybrid approach of pattern recognition to detect marine animals
Acquiring up-to-date knowledge about various animals will have a significant impact on effectively managing species within the ecosystem. Manually identifying animals and their traits continues to be ...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →
A review of convolutional neural network-based computer-aided lung nodule detection system
Worldwide, lung cancer is the major cause of death and rapidly spreads. Lung tissue that is benign does not grow significantly, but lung tissue that is malignant grows rapidly and attacks the body, po...
View Book →
Foundations of Machine Learning
...
View Book →
Spatial Thinking in Planning Practice
An Introduction to GIS...
View Book →
Algorithmic Graph Theory and Sage
...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python 3.6...
View Book →
Ionospheric Multi-Spacecraft Analysis Tools
Approaches for Deriving Ionospheric Parameters...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →
Optimizing HPC Applications with Intel Cluster Tools
Hunting Petaflops...
View Book →xerox :: smalltalk :: Summary of Smalltalk Message Forms and Intentions Aug74
From the bitsavers.org collection, a scanned-in computer-related document. xerox :: smalltalk :: Summary of Smalltalk Message Forms and Intentions Aug74...
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →
Variant Construction from Theoretical Foundation to Applications
...
View Book →
Plant microRNA-Target Interaction Identification Model Based on the Integration of Prediction Tools
This article is from PLoS ONE , volume 9 . Abstract Background: Confident identification of microRNA-target interactions is significant for studying the function of microRNA (miRNA). Although some com...
View Book →Detecting and Mitigating DDoS Attacks The Role of AI and Machine Learning
The growing frequency and complexity of Distributed Denial of Service DDoS attacks have necessitated more dynamic and intelligent cybersecurity solutions. This paper explores the transformative role o...
View Book →
Programming Computer Vision with Python
Tools and algorithms for analyzing images...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →
Feature selection to improve distributed denial of service detection accuracy using hybrid N-Gram he
Distributed denial of service (DDoS) attacks servers and computers in various ways, such as flooding traffic. There are three DDoS detection methods, namely anomaly-based, pattern-based and heuristic-...
View Book →A new proactive feature selection model based on the enhanced optimization algorithms to detect DRDo
Cyberattacks have grown steadily over the last few years. The distributed reflection denial of service (DRDoS) attack has been rising, a new variant of distributed denial of service (DDoS) attack. DRD...
View Book →
Bayesian Methods in the Search for MH370
...
View Book →
Ambisonics
A Practical 3D Audio Theory for Recording, Studio Production, Sound Reinforcement, and Virtual Reality...
View Book →An Interruption Discovery Structure Depend on Cluster Centres and Adjacent Neighbours
The aim of an interruption discovery structure (IDS) is to notice various types of hateful network transfer and computer usage, which cannot be detected by a straight firewall. Many IDS have been urba...
View Book →Computer-aided detection system for masses in automated whole breast ultrasonography: development an
This article is from Ultrasonography , volume 33 . Abstract Purpose:: The aim of this study was to evaluate the performance of a proposed computer-aided detection (CAD) system in automated breast ultr...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →
Linear Selection Indices in Modern Plant Breeding
...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →
Software for Exascale Computing - SPPEXA 2016-2019
...
View Book →
International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019...
View Book →
Fundamentals of Biomechanics
Equilibrium, Motion, and Deformation...
View Book →On the Fundamental Limits of Adaptive Sensing
Suppose we can sequentially acquire arbitrary linear measurements of an n-dimensional vector x resulting in the linear model y = Ax + z, where z represents measurement noise. If the signal is known to...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →
Anisotropy Across Fields and Scales
...
View Book →
Introduction to Data Science
Data Analysis and Prediction Algorithms with R...
View Book →
Statistics with Julia
Fundamentals for Data Science, Machine Learning and Artificial Intelligence...
View Book →
Sentence embedding to improve rumour detection performance model
Recently, most individuals have preferred accessing the most recent news via social media platforms like Twitter as their primary source of information. Moreover, Twitter enables users to post and dis...
View Book →
Interface Oral Health Science 2016
Innovative Research on Biosis–Abiosis Intelligent Interface...
View Book →
NASA Technical Reports Server (NTRS) 20130011220: Mixture-Tuned, Clutter Matched Filter for Remote D
Mapping localized spectral features in large images demands sensitive and robust detection algorithms. Two aspects of large images that can harm matched-filter detection performance are addressed simu...
View Book →
Foundations of Quantum Theory
From Classical Concepts to Operator Algebras...
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →
Physics for scientists and engineers
First published in 1990...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →sovereign-frequency-archive
<!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>THE SOVEREIGN FREQUENCY...
View Book →