Warning: file_put_contents(cache/omni_608ffe8ee589f05686e1b057f71519d4.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →NON-LINEAR TRANSFORMATIONS AND WEAKLY SEMINORMED VECTOR SPACES: STRUCTURAL CHARACTERIZATION, STABILI
Weakly seminormed vector spaces provide a flexible analytical setting for situations in which the classical assumptions of normed and seminormed spaces are only partially valid. These spaces support w...
View Book →
Health of People, Health of Planet and Our Responsibility
Climate Change, Air Pollution and Health...
View Book →
DTIC ADA097418: Multiple Objective Evaluation and Choicemaking under Risk with partial Preference In
In this paper, we consider a single stage, multiattribute decision making problem under risk. Each outcome is associated with a vector of value scores. The set of value score vectors is partially orde...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →
Bayesian Methods in the Search for MH370
...
View Book →Net Burgers Density Vector Fields in Crystal Plasticity
First published in 2014...
View Book →
Problems in Classical Electromagnetism
157 Exercises with Solutions...
View Book →
International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019...
View Book →
Statistics with Julia
Fundamentals for Data Science, Machine Learning and Artificial Intelligence...
View Book →
Ionospheric Multi-Spacecraft Analysis Tools
Approaches for Deriving Ionospheric Parameters...
View Book →
Sensitivity Analysis: Matrix Methods in Demography and Ecology
...
View Book →
Spatial Thinking in Planning Practice
An Introduction to GIS...
View Book →Convex Polytopes: Extremal Constructions and f-Vector Shapes
These lecture notes treat some current aspects of two closely interrelated topics from the theory of convex polytopes: the shapes of f-vectors, and extremal constructions. The first lecture treats 3-d...
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →Genome-Wide RNAi Screen Identifies Broadly-Acting Host Factors That Inhibit Arbovirus Infection.
This article is from PLoS Pathogens , volume 10 . Abstract Vector-borne viruses are an important class of emerging and re-emerging pathogens; thus, an improved understanding of the cellular factors th...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →
Report of Dr. George Turner's experience of diphtheria, especially in its relations to lower animals
First published in 1887...
View Book →
Biodiversity and Health in the Face of Climate Change
...
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →
Ambisonics
A Practical 3D Audio Theory for Recording, Studio Production, Sound Reinforcement, and Virtual Reality...
View Book →
Foundations of Quantum Theory
From Classical Concepts to Operator Algebras...
View Book →
Foundations of Machine Learning
...
View Book →Alternative procedures for estimating vector autoregressions identified with long-run restrictions
First published in 2005...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →DTIC ADA286241: Examination of the Distribution of the Number of Component-Damage States
In live-fire testing, munitions are fired at armored vehicles. Results from this type of testing are critical components that were damaged in the encounter between the munition and the armored vehicle...
View Book →
Mathematical Modelling of Inelastic Deformation
First published in 1994...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →
Some personal observations made in Pennsylvania and in Texas regarding malarial fever and the anophe
First published in 1906...
View Book →Confinement, Diquarks and Goldstone's theorem
Determinations of the gluon propagator in the continuum and in lattice simulations are compared. A systematic truncation procedure for the quark Dyson-Schwinger and bound state Bethe-Salpeter equation...
View Book →
Algorithmic Graph Theory and Sage
...
View Book →
Variant Construction from Theoretical Foundation to Applications
...
View Book →
Spectral and High Order Methods for Partial Differential Equations ICOSAHOM 2018
Selected Papers from the ICOSAHOM Conference, London, UK, July 9-13, 2018...
View Book →
Anisotropy Across Fields and Scales
...
View Book →
Modeling Strategies for Large Dimensional Vector Autoregressions
First published in 2012...
View Book →DTIC ADA1026953: Potential Hardware and Software Improvements of Inertial Positioning and Gravity Ve
The paper discusses the potential incorporation of higher performance gyroscopes and accelerometers in the horizontal channels of Litton's local-level inertial positioning system and the resulting imp...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
Interface Oral Health Science 2016
Innovative Research on Biosis–Abiosis Intelligent Interface...
View Book →
Linear Selection Indices in Modern Plant Breeding
...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →
Chiral Anomalies In Field Theories
The role of the contribution from the fermion mass term in the axial vector Ward identity in generating the U(1) axial anomaly, both local and global, is elucidated. Gauge invariance requires the ferm...
View Book →
DTIC ADA1026959: Potential Hardware and Software Improvements of Inertial Positioning and Gravity Ve
The paper discusses the potential incorporation of higher performance gyroscopes and accelerometers in the horizontal channels of Litton's local-level inertial positioning system and the resulting imp...
View Book →
Translational regulation of Anopheles gambiae mRNAs in the midgut during Plasmodium falciparum infec
This article is from BMC Genomics , volume 13 . Abstract Background: Malaria is caused by Plasmodium parasites, which are transmitted via the bites of infected Anopheline mosquitoes. Midgut invasion i...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →
Developing Graphics Frameworks with Python and OpenGL
...
View Book →
Investigations on irrigation-mosquito problems
First published in 1952...
View Book →
Introduction to Data Science
Data Analysis and Prediction Algorithms with R...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →Impact of Climate-Adaptive Malaria Early Warning Systems vs. Standard Surveillance on Outbreak Prepa
Malaria remains a significant global health threat, especially in vulnerable communities where climate change is exacerbating transmission dynamics. Standard malaria surveillance systems, which rely o...
View Book →
Fundamentals of Biomechanics
Equilibrium, Motion, and Deformation...
View Book →Release of genetically engineered insects: a framework to identify potential ecological effects.
This article is from Ecology and Evolution , volume 3 . Abstract Genetically engineered (GE) insects have the potential to radically change pest management worldwide. With recent approvals of GE insec...
View Book →The Beta Spectrum of He⁶
First published in 1957...
View Book →Imported Malaria Cases and Fatality in East Africa: A Review (www.kiu.ac.ug)
Malaria remains a critical public health challenge in East Africa, with endemic transmission in many regions. Recent trends, however, show an alarming rise in imported malaria cases—wherein individu...
View Book →
Cosserat Theories: Shells, Rods and Points
First published in 2009...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python 3.6...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
Fractional Graph Theory
A Rational Approach to the Theory of Graphs...
View Book →
The influence of climate and socio-ecological factors on invasive mosquito vectors in the Northeaste
First published in 2017...
View Book →Search for Heavy Down-Type Vector-Like Quarks in the Lepton-Plus-Jets Final State in 8 TeV proton-pr
First published in 2015...
View Book →
Optimizing HPC Applications with Intel Cluster Tools
Hunting Petaflops...
View Book →
Diamond Orientation in Diamond Bits
First published in 1951...
View Book →
Representation Learning for Natural Language Processing
...
View Book →
Software for Exascale Computing - SPPEXA 2016-2019
...
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →DTIC ADA1026952: Potential Hardware and Software Improvements of Inertial Positioning and Gravity Ve
The paper discusses the potential incorporation of higher performance gyroscopes and accelerometers in the horizontal channels of Litton's local-level inertial positioning system and the resulting imp...
View Book →
Language Technologies for the Challenges of the Digital Age
27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →
Purity of the stratification by Newton polygons and Frobenius-periodic vector bundles
First published in 2013...
View Book →Supervised learning using support vector machine applied to sentiment analysis of teacher performanc
Satisfaction with teaching performance is an important measurement process in higher education institutions, for this reason, applying sentiment analysis to the opinions of university students through...
View Book →
DTIC ADA194477: The Gradient Method for Interface Tracking.
An algorithm is presented for advancing a propagating interface in a numerical simulation and it is applied to the problem of a chemical reaction front. The method identifies large gradients character...
View Book →Classical irregular block, N=2 pure gauge theory and Mathieu equation
Combining the semiclassical/Nekrasov-Shatashvili limit of the AGT conjecture and the Bethe/gauge correspondence results in a triple correspondence which identifies classical conformal blocks with twis...
View Book →
DTIC ADA424653: Image Guidance and Assessment of Radiation Induced Gene Therapy
Image guidance and assessment techniques are being developed for combined radiation/gene therapy, which utilizes a radiation-inducible gene promoter to cause expression of tumor necrosis factor alpha ...
View Book →The Pioneer anomaly: the measure of a topological phase defect of light in cosmology
It is shown that a wave vector representing a light pulse in an adiabatically evolving expanding space should develop, after a round trip (back and forth to the emitter) a geometric phase for helicity...
View Book →
Programming Computer Vision with Python
Tools and algorithms for analyzing images...
View Book →
Angular momentum conservation for dynamical black holes
Angular momentum can be defined by rearranging the Komar surface integral in terms of a twist form, encoding the twisting around of space-time due to a rotating mass, and an axial vector. If the axial...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →