Warning: file_put_contents(cache/omni_dc1529d27780ea4983756cd9467889a5.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Mathematical Analysis Volume 2 By I. I. Lyashko , A. K. Boyarchuk, Ya. G. Gai And A. F. Kalayda
Математический анализ. Ч.2 Вища школа, 1985 Ляшко И.И. и др. И.И. Ляшко , А.К. Боярчук , Я.Г. Гай , A.Ф. Калайда Математи...
View Book →
Biodiversity and Health in the Face of Climate Change
...
View Book →History of domestication and spread of Aedes aegypti - A Review.
This article is from Memórias do Instituto Oswaldo Cruz , volume 108 . Abstract The adaptation of insect vectors of human diseases to breed in human habitats (domestication) is one of the most import...
View Book →
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →CIA Reading Room 00355733: MAJOR DEVELOPMENTS IN THE SOVBLOC CYBERNETICS PROGRAMS IN 1965
Scientific and Technical Intelligence Report Approved for Release: 2018/01/31 C00355733 N9 6 Major Developments in the SovBloc Cybernetics Programs in 1965 IPS FIU copy DO N01 REMOVE 25 OCT 1966 OSI...
View Book →
The Models of Engaged Learning and Teaching
Connecting Sophisticated Thinking from Early Childhood to PhD...
View Book →
Foundations of Quantum Theory
From Classical Concepts to Operator Algebras...
View Book →The binary near-Earth asteroid (175706) 1996 FG3 - An observational constraint on its orbital evolut
Using our photometric observations taken between 1996 and 2013 and other published data, we derived properties of the binary near-Earth asteroid (175706) 1996 FG3 including new measurements constraini...
View Book →
Introduction to Data Science
Data Analysis and Prediction Algorithms with R...
View Book →
Design of face recognition based effective automated smart attendance system
The issue of automatic attendance marking has been successfully resolved in recent years through the utilization of standard biometric approaches. Although this strategy is automated and forward-think...
View Book →
Spatial Thinking in Planning Practice
An Introduction to GIS...
View Book →Vector Similarity Measures of Q-Linguistic Neutrosophic Variable Sets and Their Multi-Attribute Deci
Since language is used for thinking and expressing habits of humans in real life, the linguistic evaluation for an objective thing is expressed easily in linguistic terms/values. However, existing lin...
View Book →
Statistics with Julia
Fundamentals for Data Science, Machine Learning and Artificial Intelligence...
View Book →
sovereign-frequency-archive
<!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>THE SOVEREIGN FREQUENCY...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →
Early Algebra
Research into its Nature, its Learning, its Teaching...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →
Fractional Graph Theory
A Rational Approach to the Theory of Graphs...
View Book →
Optimizing HPC Applications with Intel Cluster Tools
Hunting Petaflops...
View Book →
Ionospheric Multi-Spacecraft Analysis Tools
Approaches for Deriving Ionospheric Parameters...
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →
Bayesian Methods in the Search for MH370
...
View Book →
Problems in Classical Electromagnetism
157 Exercises with Solutions...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python 3.6...
View Book →Application of Data Mining Methods in the Study of Crime Based on International Data Sources
The objective of this dissertation is to apply data mining methods in the comparative study of crime based on international data sources. Crime control is fundamental to the welfare, stability and dev...
View Book →
Linear Selection Indices in Modern Plant Breeding
...
View Book →
Interface Oral Health Science 2016
Innovative Research on Biosis–Abiosis Intelligent Interface...
View Book →CIA Reading Room cia-rdp93t01142r000100020004-7: THE ATLANTIC COUNCIL OF THE UNITED STATES AND THE I
_._._ . __ . ~ ~. 1 Approved For Release 2011/09/01 :CIA-RDP93T01142R000100020004-7 The Atlantic Council of the United States and the International Economic Studies Institute Occasional Paper Western ...
View Book →
Foundations of Machine Learning
...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
IEA International Computer and Information Literacy Study 2018 Assessment Framework
...
View Book →
Living Earth Community
Multiple Ways of Being and Knowing...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
Algorithmic Graph Theory and Sage
...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
Fundamentals Of Physics Extended, 10th Edition
The 10th edition of Halliday, Resnick and Walkers Fundamentals of Physics provides the perfect solution for teaching a 2 or 3 semester calculus-based physics course, providing instructors with a t...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →
Fundamentals of Biomechanics
Equilibrium, Motion, and Deformation...
View Book →
Variant Construction from Theoretical Foundation to Applications
...
View Book →
Generic uniqueness of the bias vector of mean payoff zero-sum games
Zero-sum mean payoff games can be studied by means of a nonlinear spectral problem. When the state space is finite, the latter consists in finding an eigenpair $(u,\lambda)$ solution of $T(u)=\lambda ...
View Book →
Early Geometrical Thinking in the Environment of Patterns, Mosaics and Isometries
...
View Book →The South African Response to COVID-19 - The Early Years
This book analyses the first two years of South Africa’s response to the COVID-19 epidemic, from its emergence in early 2020. Drawing on the perspectives of a range of public health experts, economi...
View Book →DTIC ADA326894: The Machine Nexus: Institutional Bias Against a Capabilities-Based Force.
The Department of Defense and Congress are currently conducting an extensive review of the U.S. Armed Forces for the purpose of determining the military capabilities that our nation will require in th...
View Book →
Programming Computer Vision with Python
Tools and algorithms for analyzing images...
View Book →
Language Technologies for the Challenges of the Digital Age
27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings...
View Book →NASA Technical Reports Server (NTRS) 19930015358: Applications of wavelet-based compression to multi
A data compression algorithm involving vector quantization (VQ) and the discrete wavelet transform (DWT) is applied to two different types of multidimensional digital earth-science data. The algorithm...
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →
Techniques Transfer /fangruida
The world's major technology research cutting-edge technology transfer project achievement for the global trading or invest in r&d cooperation High-tech, cutting-edge technology, more than 10 major R ...
View Book →
Sensitivity Analysis: Matrix Methods in Demography and Ecology
...
View Book →
More on measurable algebras and Rademacher systems with applications to analysis of Riesz spaces
We find necessary and sufficient conditions on a family $\mathcal{R} = (r_i)_{i \in I}$ in a Boolean algebra $\mathcal{B}$ under which there exists a unique positive probability measure $\mu$ on $\mat...
View Book →CIA Reading Room cia-rdp81-01030r000100210006-1: THREE-AXIS STABILIZED PLATFORM FOR THE V-2 MISSILE
c.; Declassified in Part - Sanitized Copy Approved for Release 2013/09/09: CIA-RDP81-01030R000100210006-1 fr -? CINTRAL. INTELLIGENCE ?AGE NCY INFORMATION REPORT ? RET SECURITY IbFORMATION This Docume...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →What's happening in the mathematical sciences
volumes : 26-28 cm...
View Book →
Ambisonics
A Practical 3D Audio Theory for Recording, Studio Production, Sound Reinforcement, and Virtual Reality...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →Vector Identity with Proof
First Edition (version 1.0) published online on 08 May 2009 This file shall be a good reference to vector identities and their proofs. The first main purpose of this file is to show that the the time ...
View Book →DTIC ADA455041: Scaling Performance of the Shallow Water Equations on the SUPRENUM-1 Supercomputer
We describe the implementation of a fluid dynamical benchmark on the 256 node SUPRENUM-1 parallel computer. The benchmark, the Shallow Water Equations, is frequently used as a model for both oceanogra...
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →
Non-Equilibrium Social Science and Policy
Introduction and Essays on New and Changing Paradigms in Socio-Economic Thinking...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →