Warning: file_put_contents(cache/omni_78714f3f7f8db9397e10761865b97947.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Efficient Spherical Harmonic Transforms aimed at pseudo-spectral numerical simulations
In this paper, we report on very efficient algorithms for the spherical harmonic transform (SHT). Explicitly vectorized variations of the algorithm based on the Gauss-Legendre quadrature are discussed...
View Book →Initiation aux me thodes vectorielles et aux applications ge ome triques et dynamiques de l'analyse,
First published in 1926...
View Book →Compressing Deep Convolutional Networks using Vector Quantization
Deep convolutional neural networks (CNN) has become the most promising method for object recognition, repeatedly demonstrating record breaking results for image classification and object detection in ...
View Book →
Language Technologies for the Challenges of the Digital Age
27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
New Horizons for a Data-Driven Economy
A Roadmap for Usage and Exploitation of Big Data in Europe...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
Performance Tuning with SQL Server Dynamic Management Views
...
View Book →
Innovative Models for Sustainable Development in Emerging African Countries
...
View Book →
The Theory and Fundamentals of Bioimpedance Analysis in Clinical Status Monitoring and Diagnosis of
This article is from Sensors (Basel, Switzerland) , volume 14 . Abstract Bioimpedance analysis is a noninvasive, low cost and a commonly used approach for body composition measurements and assessment ...
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →1. Electronics IJECE SECURE BIOMETRIC CRYPTOSYSTEM USING FINGERCODE Shanthini K
Biometric cryptosystems combine cryptographic security with Biometrics-base authentication. These authentication systems are more user-friendly and more reliable since biometric data cannot be lost, ...
View Book →
Sensitivity Analysis: Matrix Methods in Demography and Ecology
...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →
Quasiclassical theory of superconductivity: a multiple interface geometry
The purpose of the paper is to suggest a new method which allows one to study multiple coherent reflection/transmissions by partially transparent interfaces (e.g. in multi-layer mesoscopic structures ...
View Book →
pt. 1 Elementary principles in statistical mechanics. pt. 2. Dynamics. Vector analysis and multiple
No description available....
View Book →Vector analysis and multiple algebra
No description available....
View Book →The digital traces of bubbles: feedback cycles between socio-economic signals in the Bitcoin economy
What is the role of social interactions in the creation of price bubbles? Answering this question requires obtaining collective behavioural traces generated by the activity of a large number of actors...
View Book →
Apache Solr 3 Enterprise Search Server
First published in 2011...
View Book →
Biodiversity and Health in the Face of Climate Change
...
View Book →
Information Modelling and Knowledge Bases XX
Focuses on theoretical disciplines including cognitive science, artificial intelligence, logic, linguistics and analytical philosophy....
View Book →
Bayesian Methods in the Search for MH370
...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →Identification and Characterization of a Ginsenoside-Transforming ?-Glucosidase from Pseudonocardia
This article is from PLoS ONE , volume 9 . Abstract The ginsenoside Rg2(S), which is one of the pharmaceutical components of ginseng, is known to have neuroprotective, anti-inflammation, and anti-diab...
View Book →
Case Studies in Infrastructure Change Management
How Google Rebuilds the Jet While Flying It...
View Book →
Data-Driven Policy Impact Evaluation
How Access to Microdata is Transforming Policy Design...
View Book →AN INTRODUCTION TO DEEP LEARNING
Using model architectures, complex structures, or other techniques that are generated from a range of nonlinear transformations, such as neural networks, it is an area of machine learning that is base...
View Book →Expression of single-chain variable fragments fused with the Fc-region of rabbit IgG in Leishmania t
This article is from Microbial Cell Factories , volume 13 . Abstract Background: In recent years the generation of antibodies by recombinant methods, such as phage display technology, has increased th...
View Book →Impact Of International Trade On Indonesia's Consume Of Renewable Energy
This research intends to look into the exports percent of GDP, imports percent of GDP, and percentage of renewable energy in the GDP's total energy usage. This study uses data from 1999 to 2019 It was...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →
Don't Just Roll the Dice
A usefully short guide to software pricing...
View Book →
SLO Adoption and Usage in Site Reliability Engineering
...
View Book →Scientific Papers of J. Willard Gibbs: Dynamics. Vector analysis and multiple algebra. Electromagnet
No description available....
View Book →IBM Systems Journal
No description available....
View Book →
Bulletin (new Series) of the American Mathematical Society
No description available....
View Book →Design of Database Structures
Database systems; The database design process; Requirements formulation and analysis; Conceptual data modeling; Entity formulation and analysis; Attribute synthesis: an example of conceptual design; I...
View Book →
Fundamentals of Biomechanics
Equilibrium, Motion, and Deformation...
View Book →
Management of Research Infrastructures: A South African Funding Perspective
...
View Book →
Cohesion, Coherence and Temporal Reference from an Experimental Corpus Pragmatics Perspective
...
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →On-chip based power estimation for CMOS VLSI circuits using support vector machine
Power estimation has a major impact on the reliability of very-large-scale integration (VLSI) circuits. As a results power estimation is highly needed in VLSI circuits at the early stages. One of the ...
View Book →
MACHINE LEARNING-BASED BEHAVIORAL ANALYSIS FRAMEWORK FOR EFFICIENT KEYLOGGER DETECTION
Keylogger malware poses a serious cybersecurity threat by secretly recording user keystrokes and transmitting sensitive information such as passwords, financial data, and personal messages to unauthor...
View Book →
Linear Selection Indices in Modern Plant Breeding
...
View Book →
NASA Technical Reports Server (NTRS) 19780018835: Basic linear algebra subprograms for FORTRAN usage
A package of 38 low level subprograms for many of the basic operations of numerical linear algebra is presented. The package is intended to be used with FORTRAN. The operations in the package are dot ...
View Book →Leçons de calcul vectoriel à l'usage des élèves de mathématiques élémentaires et spé
First published in 1931...
View Book →
Firm Innovation and Productivity in Latin America and the Caribbean
The Engine of Economic Development...
View Book →Science
Vols. for 1911-13 contain the Proceedings of the Helminothological Society of Washington, ISSN 0018-0120, 1st-15th meeting....
View Book →
Record of the 1977 National Conference of the Institute for Software Engineering
No description available....
View Book →Standard Handbook for Electrical Engineers
No description available....
View Book →
Enhancing learner performance prediction on online platforms using machine learning algorithms
E-learning has emerged as a prominent educational method, providing accessible and flexible learning opportunities to students worldwide. This study aims to comprehensively understand and categorize l...
View Book →
China's Gas Development Strategies
...
View Book →
Models, Methods and Tools for Product Service Design
The Manutelligence Project...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →
Elements of Vector Analysis
No description available....
View Book →
Foundations of Quantum Theory
From Classical Concepts to Operator Algebras...
View Book →
An Interruption Discovery Structure Depend on Cluster Centres and Adjacent Neighbours
The aim of an interruption discovery structure (IDS) is to notice various types of hateful network transfer and computer usage, which cannot be detected by a straight firewall. Many IDS have been urba...
View Book →
Initiation aux méthodes vectorielles et aux applications géométriques de l'analyse à l'usage
First published in 1921...
View Book →
Building the Infrastructure for Cloud Security
A Solutions view...
View Book →
Foundations of Machine Learning
...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →
Impact of Information Society Research in the Global South
...
View Book →The Importance of Semi-Major Axis Knowledge in the Determination of Near-Circular Orbits
Modem orbit determination has mostly been accomplished using Cartesian coordinates. This usage has carried over in recent years to the use of GPS for satellite orbit determination. The unprecedented p...
View Book →
Time Predictions
Understanding and Avoiding Unrealism in Project Planning and Everyday Life...
View Book →The Scientific Papers of J. Willard Gibbs, Ph. D. Ll. D., Formerly Professor of Mathematical Physics
No description available....
View Book →
Ambisonics
A Practical 3D Audio Theory for Recording, Studio Production, Sound Reinforcement, and Virtual Reality...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →Business Process Management Workshops
LNBIP 99 and LNBIP 100 together constitute the thoroughly refereed proceedings of 12 international workshops held in Clermont-Ferrand, France, in conjunction with the 9th International Conference on B...
View Book →Fundamentals of Deep Learning
With the reinvigoration of neural networks in the 2000s, deep learning has become an extremely active area of research, one that’s paving the way for modern machine learning. In this practical book,...
View Book →NASA Technical Reports Server (NTRS) 20230003120: Amino Acid Encoding for Deep Learning Applications
Background: The number of applications of deep learning algorithms in bioinformatics is increasing as they usually achieve superior performance over classical approaches, especially, when bigger train...
View Book →Weber Systems - CP/M Simplified (1st Edition)
CP/M® Simplified is a clear, practical guide to the CP/M microcomputer operating system. CP/M is probably the most widely used operating system for microcomputers. The following microcomputers can be...
View Book →
Ionospheric Multi-Spacecraft Analysis Tools
Approaches for Deriving Ionospheric Parameters...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →
Interface Oral Health Science 2016
Innovative Research on Biosis–Abiosis Intelligent Interface...
View Book →
Optimizing HPC Applications with Intel Cluster Tools
Hunting Petaflops...
View Book →PQTable: Non-exhaustive Fast Search for Product-quantized Codes using Hash Tables
In this paper, we propose a product quantization table (PQTable); a fast search method for product-quantized codes via hash-tables. An identifier of each database vector is associated with the slot of...
View Book →Dynamics. Vector analysis and multiple algebra. Electromagnetic theory of light, etc
No description available....
View Book →
Physical Review
Vols. for 1903- include Proceedings of the American Physical Society....
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
Variant Construction from Theoretical Foundation to Applications
...
View Book →
Problems in Classical Electromagnetism
157 Exercises with Solutions...
View Book →Initiation aux méthodes vectorielles et aux applications géométriques et dynamiques de l'analy
First published in 1945...
View Book →
Social Inequality, Childhood and the Media
A Longitudinal Study of the Mediatization of Socialisation...
View Book →
Vector Analysis
No description available....
View Book →Statistically Significant Detection of Linguistic Change
We propose a new computational approach for tracking and detecting statistically significant linguistic shifts in the meaning and usage of words. Such linguistic shifts are especially prevalent on the...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python 3.6...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →
Library and Information Sciences
Trends and Research...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →A New Class of Backward Stochastic Partial Differential Equations with Jumps and Applications
We formulate a new class of stochastic partial differential equations (SPDEs), named high-order vector backward SPDEs (B-SPDEs) with jumps, which allow the high-order integral-partial differential ope...
View Book →