Zoom Shows | The Mouse and the Monster | 15:22 watch on Vshare.eu
 
Information of news

Topological Methods in Data Analysis and Visualization IV: Theory, Algorithms, and Applications

Category: E-Book

Topological Methods in Data Analysis and Visualization IV: Theory, Algorithms, and Applications

Topological Methods in Data Analysis and Visualization IV: Theory, Algorithms, and Applications By Hamish CarrChristoph GarthTino Weinkauf
English | PDF | 2017 | 355 Pages | ISBN : 3319446827 | 13.7 MB
This book presents contributions on topics ranging from novel applications of topological analysis for particular problems, through studies of the effectiveness of modern topological methods, algorithmic improvements on existing methods, and parallel computation of topological structures, all the way to mathematical topologies not previously applied to data analysis.
Download Now
Information of news
  • Views: 0
  • Author: ken_uit_9x
  • Date: Yesterday, 01:34

Research Methods in Applied Settings: An Integrated Approach to Design and Analysis

Category: E-Book

Research Methods in Applied Settings: An Integrated Approach to Design and Analysis

Research Methods in Applied Settings: An Integrated Approach to Design and Analysis by Jeffrey A. Gliner
English | August 10, 2016 | ISBN: 113885297X | 621 Pages | True PDF | 6.27 MB
This text teaches readers how to plan, conduct, and write a research project and select and interpret data through its integrated approach to quantitative research methods. Although not a statistics book, students learn to master which technique to use when and how to analyze and interpret results, making them better consumers of research. Organized around the steps of conducting a research project, this book is ideal for those who need to analyze journal articles. With teaching experience in various departments, the authors know how to address the research problems faced by behavioral and social sciences students. Independent sections and chapters can be read in any order allowing for flexibility in assigning topics.
Download Now
Information of news
  • Views: 0
  • Author: ken_uit_9x
  • Date: Yesterday, 00:22

Analysis and Design of Transmitarray Antennas

Category: E-Book

Analysis and Design of Transmitarray Antennas

Analysis and Design of Transmitarray Antennas
Morgan & Claypool | English | 2017 | ISBN-10: 1627058745 | 175 pages | PDF | 6.35 mb
by Ahmed H Abdelrahman (Author), Fan Yang (Author), Atef Z Elsherbeni (Author)
Download Now
Information of news
  • Views: 0
  • Author: ken_uit_9x
  • Date: 18-01-2018, 00:05

Robustness Analysis in Decision Aiding, Optimization, and Analytics

Category: E-Book

Robustness Analysis in Decision Aiding, Optimization, and Analytics

Robustness Analysis in Decision Aiding, Optimization, and Analytics by Michael Doumpos, Constantin Zopounidis, Evangelos Grigoroudis
English | 2016 | ISBN: 3319331191 | 321 Pages | PDF | 12.3 MB
This book provides a broad coverage of the recent advances in robustness analysis in decision aiding, optimization, and analytics.
Download Now
Information of news
  • Views: 0
  • Author: ken_uit_9x
  • Date: 18-01-2018, 00:02

Expressed Sequence Tags (ESTs): Generation and Analysis

Category: E-Book

Expressed Sequence Tags (ESTs): Generation and Analysis

Expressed Sequence Tags (ESTs): Generation and Analysis By John Parkinson
English | EPUB | 2009 | 332 Pages | ISBN : 1588297594 | 1.5 MB
Over the past two decades, expressed sequence tags (ESTs - single pass reads from randomly selected cDNAs), have proven to be a remarkably cost-effective route for the purposes of gene discovery.
Download Now
Information of news
  • Views: 0
  • Author: ken_uit_9x
  • Date: 16-01-2018, 00:23

Medical Device Use Error: Root Cause Analysis

Category: E-Book

Medical Device Use Error: Root Cause Analysis

Medical Device Use Error: Root Cause Analysis by Michael Wiklund, Andrea Dwyer, Erin Davis
English | 2015 | ISBN: 1498705790 | 267 Pages | PDF | 45.6 MB
Medical Device Use Error: Root Cause Analysis offers practical guidance on how to methodically discover and explain the root cause of a use error―a mistake―that occurs when someone uses a medical device.
Download Now
Information of news
  • Views: 0
  • Author: ken_uit_9x
  • Date: 15-01-2018, 14:02

Analysis and Design of the Power-Split Device for Hybrid Systems

Category: E-Book

Analysis and Design of the Power-Split Device for Hybrid Systems

Analysis and Design of the Power-Split Device for Hybrid Systems By Xiaohua Zeng, Jixin Wang
English | PDF | 2017 (2018 Edition) | 297 Pages | ISBN : 9811042705 | 13.98 MB
This book presents a comprehensive overview of power-split device (PSD) design. It discusses vehicle energy consumption characteristics, hybrid vehicle power request solutions, typical configurations, operating principle and simulation technology of PSD hybrid system, a multi-factor integrated parametric design method and a dynamic coordinated control method for PSD hybrid system.
Download Now
Information of news
  • Views: 0
  • Author: ken_uit_9x
  • Date: 15-01-2018, 00:13

Metal Casting Computer-Aided Design and Analysis: Computer Aided Design and Analysis

Category: E-Book

Metal Casting Computer-Aided Design and Analysis: Computer Aided Design and Analysis

Metal Casting: Computer-Aided Design and Analysis by B. Ravi
English | 30 Jun. 2011 | ISBN: 8120327268 | 168 Pages | PDF | 10.97 MB
Download Now
Information of news
  • Views: 0
  • Author: Bo0mB0om
  • Date: 14-01-2018, 12:14

Hitler's Wave-Breaker Concept An Analysis of the German End Game in the Baltic

Category: E-Book


Hitler's Wave-Breaker Concept An Analysis of the German End Game in the Baltic

Henrik Lunde, "Hitler's Wave-Breaker Concept: An Analysis of the German End Game in the Baltic"
2013 | ISBN-10: 1612001610 | 289 pages | EPUB | 2 MB

Download Now
Information of news

O'Reilly - Operating System Forensic Analysis

Category: Tutorial

O'Reilly - Operating System Forensic Analysis

O'Reilly - Operating System Forensic Analysis
English | Size: 783.36 MB
Category: Tutorial

Files, email messages, and social media posts all contain valuable information for digital forensic investigators when searching for evidence of a crime or intrusions into a computer system or network, but there's also a wealth of information to be gleaned from a computer's operating system. This includes user data, configuration settings, and a significant trail of user activities. Today, there are a number of tools available to extract and analyze this information.
Download Now
Prev Next