Warning: file_put_contents(cache/omni_f6bd8b6937acb46b8dcc597966eca028.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Weber Systems - CP/M Simplified (1st Edition)
CP/M® Simplified is a clear, practical guide to the CP/M microcomputer operating system. CP/M is probably the most widely used operating system for microcomputers. The following microcomputers can be...
View Book →PQTable: Non-exhaustive Fast Search for Product-quantized Codes using Hash Tables
In this paper, we propose a product quantization table (PQTable); a fast search method for product-quantized codes via hash-tables. An identifier of each database vector is associated with the slot of...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →
Algorithmic Graph Theory and Sage
...
View Book →
Spatial Thinking in Planning Practice
An Introduction to GIS...
View Book →
NASA Technical Reports Server (NTRS) 20230003120: Amino Acid Encoding for Deep Learning Applications
Background: The number of applications of deep learning algorithms in bioinformatics is increasing as they usually achieve superior performance over classical approaches, especially, when bigger train...
View Book →
Linear Selection Indices in Modern Plant Breeding
...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →MACHINE LEARNING-BASED BEHAVIORAL ANALYSIS FRAMEWORK FOR EFFICIENT KEYLOGGER DETECTION
Keylogger malware poses a serious cybersecurity threat by secretly recording user keystrokes and transmitting sensitive information such as passwords, financial data, and personal messages to unauthor...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
Using Two Types of Computer Algebra Systems to Solve Maxwell Optics Problems
To synthesize Maxwell optics systems, the mathematical apparatus of tensor and vector analysis is generally employed. This mathematical apparatus implies executing a great number of simple stereotyped...
View Book →
Biodiversity and Health in the Face of Climate Change
...
View Book →Quasiclassical theory of superconductivity: a multiple interface geometry
The purpose of the paper is to suggest a new method which allows one to study multiple coherent reflection/transmissions by partially transparent interfaces (e.g. in multi-layer mesoscopic structures ...
View Book →Statistically Significant Detection of Linguistic Change
We propose a new computational approach for tracking and detecting statistically significant linguistic shifts in the meaning and usage of words. Such linguistic shifts are especially prevalent on the...
View Book →
International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019...
View Book →
Problems in Classical Electromagnetism
157 Exercises with Solutions...
View Book →
Expression of single-chain variable fragments fused with the Fc-region of rabbit IgG in Leishmania t
This article is from Microbial Cell Factories , volume 13 . Abstract Background: In recent years the generation of antibodies by recombinant methods, such as phage display technology, has increased th...
View Book →
NASA Technical Reports Server (NTRS) 19780018835: Basic linear algebra subprograms for FORTRAN usage
A package of 38 low level subprograms for many of the basic operations of numerical linear algebra is presented. The package is intended to be used with FORTRAN. The operations in the package are dot ...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →Initiation aux méthodes vectorielles et aux applications géométriques et dynamiques de l'analy
First published in 1945...
View Book →
The Theory and Fundamentals of Bioimpedance Analysis in Clinical Status Monitoring and Diagnosis of
This article is from Sensors (Basel, Switzerland) , volume 14 . Abstract Bioimpedance analysis is a noninvasive, low cost and a commonly used approach for body composition measurements and assessment ...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →
Representation Learning for Natural Language Processing
...
View Book →
Apache Solr 3 Enterprise Search Server
First published in 2011...
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →
Fundamentals of Biomechanics
Equilibrium, Motion, and Deformation...
View Book →
Leçons de calcul vectoriel à l'usage des élèves de mathématiques élémentaires et spé
First published in 1931...
View Book →
Variant Construction from Theoretical Foundation to Applications
...
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
Anisotropy Across Fields and Scales
...
View Book →
Foundations of Machine Learning
...
View Book →
Fractional Graph Theory
A Rational Approach to the Theory of Graphs...
View Book →Fraud Malware Detection in Google Play Store
Android mobile applications become an simple target for the attacker because of its open source background. Also user' lack of knowledge the process of installing and usage of the apps. To categorize ...
View Book →
Enhancing learner performance prediction on online platforms using machine learning algorithms
E-learning has emerged as a prominent educational method, providing accessible and flexible learning opportunities to students worldwide. This study aims to comprehensively understand and categorize l...
View Book →
Statistics with Julia
Fundamentals for Data Science, Machine Learning and Artificial Intelligence...
View Book →Octonions, G_2 Symmetry, Generalized Self-Duality and Supersymmetries in Dimensions D \le 8
We establish N=(1/8,1) supersymmetric Yang-Mills vector multiplet with generalized self-duality in Euclidian eight-dimensions with the original full SO(8) Lorentz covariance reduced to SO(7). The key ...
View Book →
Bayesian Methods in the Search for MH370
...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →
Introduction to Data Science
Data Analysis and Prediction Algorithms with R...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →
Initiation aux méthodes vectorielles et aux applications géométriques de l'analyse à l'usage
First published in 1921...
View Book →
Interface Oral Health Science 2016
Innovative Research on Biosis–Abiosis Intelligent Interface...
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →On-chip based power estimation for CMOS VLSI circuits using support vector machine
Power estimation has a major impact on the reliability of very-large-scale integration (VLSI) circuits. As a results power estimation is highly needed in VLSI circuits at the early stages. One of the ...
View Book →
Language Technologies for the Challenges of the Digital Age
27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings...
View Book →
Foundations of Quantum Theory
From Classical Concepts to Operator Algebras...
View Book →
Programming Computer Vision with Python
Tools and algorithms for analyzing images...
View Book →
A New Class of Backward Stochastic Partial Differential Equations with Jumps and Applications
We formulate a new class of stochastic partial differential equations (SPDEs), named high-order vector backward SPDEs (B-SPDEs) with jumps, which allow the high-order integral-partial differential ope...
View Book →
Ambisonics
A Practical 3D Audio Theory for Recording, Studio Production, Sound Reinforcement, and Virtual Reality...
View Book →
Ionospheric Multi-Spacecraft Analysis Tools
Approaches for Deriving Ionospheric Parameters...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
Sensitivity Analysis: Matrix Methods in Demography and Ecology
...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →
Spectral and High Order Methods for Partial Differential Equations ICOSAHOM 2018
Selected Papers from the ICOSAHOM Conference, London, UK, July 9-13, 2018...
View Book →
Optimizing HPC Applications with Intel Cluster Tools
Hunting Petaflops...
View Book →
The digital traces of bubbles: feedback cycles between socio-economic signals in the Bitcoin economy
What is the role of social interactions in the creation of price bubbles? Answering this question requires obtaining collective behavioural traces generated by the activity of a large number of actors...
View Book →Compressing Deep Convolutional Networks using Vector Quantization
Deep convolutional neural networks (CNN) has become the most promising method for object recognition, repeatedly demonstrating record breaking results for image classification and object detection in ...
View Book →
Software for Exascale Computing - SPPEXA 2016-2019
...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python 3.6...
View Book →Impact Of International Trade On Indonesia's Consume Of Renewable Energy
This research intends to look into the exports percent of GDP, imports percent of GDP, and percentage of renewable energy in the GDP's total energy usage. This study uses data from 1999 to 2019 It was...
View Book →Initiation aux me thodes vectorielles et aux applications ge ome triques et dynamiques de l'analyse,
First published in 1926...
View Book →
Health of People, Health of Planet and Our Responsibility
Climate Change, Air Pollution and Health...
View Book →
An Interruption Discovery Structure Depend on Cluster Centres and Adjacent Neighbours
The aim of an interruption discovery structure (IDS) is to notice various types of hateful network transfer and computer usage, which cannot be detected by a straight firewall. Many IDS have been urba...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →