iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ APPLICATIONS
جزئیات خدمات ترجمه در ترجمه تخصصی
computing
localization
mcommerce
CUDA
software
applications
network security
network security
[]
[]
بخش 5
بخش 6
power
–
–
[]
[]
Metallurgy Extraction Extractive metallurgy is the practice of removing valuable
Metallurgy Extraction Extractive metallurgy is the practice of removing valuable
Estimating Mobile Application Energy
Int. J. Production Economics ] (]]]]) ]]]–]]]
Int. J. Production Economics ] (]]]]) ]]]–]]]
Expert Systems with Applications 40 (2013) 3872–3885
Expert Systems with Applications 40 (2013) 3872–3885
FutureGenerationComputerSystems29(2013)1408–1416
FutureGenerationComputerSystems29(2013)1408–1416
consuming servers which host products and services from a remote
consuming servers which host products and services from a remote
consuming servers which host products and services from a remote
consuming servers which host products and services from a remote
Amazon Web Services - Architecting for The Cloud: Best Practices January 2010
Embedded IT Security in Automotive
Embedded IT Security in Automotive
CompRef8 / Cloud Computing: A Practical Approach / Anthony Velte, Toby Velte & Robert Elsenpeter / 694-8
IEEE TRANSACTIONS ON HUMAN-MACHINE SYSTEMS, VOL. 43, NO. 1, JANUARY 2013 115
Enabling Effective Programming and Flexible Management of Efficient Body Sensor
Enabling Effective Programming and Flexible Management of Efficient Body Sensor
Embedded IT Security in Automotive
IIIT, Hyderabad
Int. J. Human-Computer Studies 72 (2014) 100–110
WSNs invariably operate in an unattendedmode and inmany scenarios it
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012
Contactless Payment Technology Options
P1: TIX/XYZ P2: ABC
LIANG_LAYOUT_Layout 2/25/14 3:37 PM Page 33
LIANG_LAYOUT_Layout 2/25/14 3:37 PM Page 33
Two Vulnerabilities in Android OS Kernel
Two Vulnerabilities in Android OS Kernel
Journal of Network and Computer Applications 37 (2014) 380–392
we propose an efficient query processing optimization based on ELM
we propose an efficient query processingoptimization based on ELM in
Sensing and Sensor Fundamentals Sensors utilize a wide spectrum of
Sensing and Sensor Fundamentals Sensors utilize a wide spectrum of
PART1
PART2
A wide range of applications has been proposed for sensor
Somaveh Jafari, et al International Journal of Computer and Electronics Research [Volume 3, Issue 3, June 2014]
public and private researchers have been looking at small and
DRA886TX
5 adds a number of features and improvements to the
The GeForce GTX 980 and 970 GPUs introduced today are
5 adds a number of features and improvements to the
نرم افزار توسعه دهندگان CUDA 6.5 عرضه شده توسط کمپانی NVIDIA
enhanced cellular fluorescence imaging The novel and burgeoning technique of
*†
2012 International Symposium on Pervasive Systems, Algorithms and Networks
With the rapid growth of emerging applications like social network
A Guide to ERP: Benefits,
Hype Cycle for Application Services This Hype Cycle focuses on
Hype Cycle for Application Services This Hype Cycle focuses on
Hype Cycle for Application Services This Hype Cycle focuses on
Hype Cycle for Application Services This Hype Cycle focuses on
Decision Support Systems 51 (2011) 176–189
DTD 5 ARTICLE IN PRESS
JURCA LAYOUT 5/22/07 12:51 PM Page 108
Expert Systems with Applications 41 (2014) 7653–7670
Journal of Enterprise Information Management
The Journal of Systems and Software 86 (2013) 3013– 3023
The Journal of Systems and Software 86 (2013) 3013– 3023
The Journal of Systems and Software 86 (2013) 3013– 3023
DTD 5 ARTICLE IN PRESS
Expert Systems with Applications 36 (2009) 2592–2602
NationalScienceReview
Computer Networks 70 (2014) 312–329
is an advanced technology for storing thermal energy that can
Local, national, and global applications of GIS in agriculture
ComputerStandards&Interfaces36(2014)423–434
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
CHAPTER
The Journal of Systems and Software 86 (2013) 3013– 3023
Perceived ease of use Perceived ease of use is defined
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
combines computers from multiple administrative domains to reach a common
Healthcare monitoring applications and wirelesssensor network prototypes
II. BIG DATA MANAGEMENT SYSTEM challenge. Moreover, simple distributed file systems men-
0 and later versions is quite different from that of
2011 Fourth International Conference on Intelligent Networks and Intelligent Systems
2011 Fourth International Conference on Intelligent Networks and Intelligent Systems
16th Euromicro Conference on Parallel, Distributed and Network-Based Processing 16th Euromicro Conference on Parallel, Distributed and Network-Based Processing
_.QXD 16/4/09 11:09 Page 163
Available online at www.sciencedirect.com
British Polymer Journal 20 (1988) 25-32
Consider expedited examination Prioritized Examination Accelerated Examination Program First Action
Consider expedited examination Prioritized Examination Accelerated Examination Program First Action
Consider expedited examination Prioritized Examination Accelerated Examination Program First Action
Consider expedited examination Prioritized Examination Accelerated Examination Program First Action
رایانش ابری
Opportunities and Challenges of Peer-to-Peer
Opportunities and Challenges of Peer-to-Peer
()
DRAFT CLOUD COMPUTING SYNOPSIS AND RECOMMENDATIONS
Embedded Linux in a Partitioned
2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
With an explosive growth of the mobile applications and emerging
With an explosive growth of the mobileapplications and emerging
Mobile photo sharingservice enables mobile users to upload images
2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
HindawiPublishingCorporation
Information Sciences xxx (2014) xxx–xxx
performance engineering materials that are on the precipice of widespread
performance engineering materials that are on the precipice of widespread
978-1-4673-5119-5/12/$31.00 c 2012 IEEE
978-1-4673-5119-5/12/$31.00 c 2012 IEEE
A listing of these exotic alloys appears in the Designations
تغذیه یاکود دهی انگور
Kuyoro S. O., Ibikunle F. & Awodele O.
The Home Needs an Operating System (and an App Store)
TELE 630 No. of Pages 18, Model 3G
280 6 Mobile Commerce and Ubiquitous Computing
Mobile C ommer c e and Ubiquitous
6.6 Location-Based Mobile Commerce and Mobile Social Networks 281
Mobile C ommer c e and Ubiquitous
6.6 Location-Based Mobile Commerce and Mobile Social Networks 281
6.6 Location-Based Mobile Commerce and Mobile Social Networks 281
Mobile C ommer c e and Ubiquitous
Mobile C ommer c e and Ubiquitous
Mobile C ommer c e and Ubiquitous
Mobile C ommer c e and Ubiquitous
is a nanocrystal made of semiconductor materials that is small
Ad Hoc Networks 10 (2012) 1497–1516
w
w w
w w
Preface
w w
اینترنت اشیا
اینترنت اشیا - قسمت اول
CISCO 7200VXR SERIES ROUTER
Responsive Web Design
that doubles the performance of the previous generation engine for
Introduction to Nanotechnology and Its Applications to Medicine Nanotechnology can
Introduction to Nanotechnology and Its Applications to Medicine Nanotechnology can
Introduction to Nanotechnology and Its Applications to Medicine Nanotechnology can
This chapter presents replication and snapshot technologies and how they
G Model
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Energy efficient and perceived QoS aware video routing over Wireless
Available online at www.sciencedirect.com
MiningBigData: CurrentStatus,andForecasttothe
MiningBigData: CurrentStatus,andForecasttothe
MiningBigData: CurrentStatus,andForecasttothe
MiningBigData: CurrentStatus,andForecasttothe
MiningBigData: CurrentStatus,andForecasttothe
MiningBigData: CurrentStatus,andForecasttothe
MiningBigData: CurrentStatus,andForecasttothe
MiningBigData: CurrentStatus,andForecasttothe
Z02_TURB9235_03_SE_WAP2.QXD 8/18/10 10:50 AM Page 1
Z02_TURB9235_03_SE_WAP2.QXD 8/18/10 10:50 AM Page 1
MiningBigData: CurrentStatus,andForecasttothe
214 Applications and Examples
2010 24th IEEE International Conference on Advanced Information Networking and Applications
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
IEEETRANSACTIONSON VOL. NO. AUGUST 1979 227
Fig
Fig
com era was the realisation that the business rules of
Laboratory
This chapter presents replication and snapshot technologies and how they
This chapter presents replication and snapshot technologies and how they
This chapter presents replication and snapshot technologies
SLA-Based Resource Provisioning for
2014 IEEE 10th World Congress on Services 2014 IEEE 10th World Congress on Services 2014 IEEE 10th World Congress on Services
Hutton: Fundamentals of 7. Applications in Heat Text © The McGraw−Hill
Agile, Dynamic Provisioning of Multi-tier Internet Applications
IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 16, NO. 1, FIRST QUARTER 2014 393
G Model
a valuable vehicle for the realization of intelligent systems is
2.2. Context in information systems
There is outstanding research that considers the modeling of contextual data in information systems:
3. An architecture for Context-Aware Fuzzy Databases
a valuable vehicle for the realization of intelligent systems is
2.2. Context in information systems
There is outstanding research that considers the modeling of contextual data in information systems:
3. An architecture for Context-Aware Fuzzy Databases
THE FREE BEGINNER’S
THE FREE BEGINNER’S
THE FREE BEGINNER’S
Hutton: Fundamentals of 7. Applications in Heat Text © The McGraw−Hill
Hutton: Fundamentals of 9. Applications in Solid Text © The McGraw−Hill
Hutton: Fundamentals of 9. Applications in Solid Text © The McGraw−Hill
THE FREE BEGINNER’S
148 Marketing Information Systems
CROSS-LAYER SCHEDULING IN CLOUD COMPUTING
WhereItCameFromandWhatItIs The World Wide Web is an Internet facility that
Hutton: Fundamentals of 9. Applications in Solid Text © The McGraw−Hill
journal of information security and applications 18 (2013) 130e137
CHAPTER 3
International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.3, May 2014
Grid: An Architectural Pattern
CHAPTER
MiningBigData: CurrentStatus,andForecasttothe
This international journal is devoted to the applications of educational
Prevention of Cross-Site Scripting Attacks
Abstract Efficient provisioning of resources is a challenging problem in
Abstract Efficient provisioning of resources is a challenging problem in
Abstract Efficient provisioning of resources is a challenging problem in
Abstract Efficient provisioning of resources is a challenging problem in
Subscriber access provided by UNIV OF MISSISSIPPI
Information Services, Geography 581
Solarwinds 3
J Supercomput
J Supercomput
Agile, Dynamic Provisioning of Multi-tier Internet Applications
J Supercomput
J Supercomput
This article was downloaded by: [Memorial University of Newfoundland]
This article was downloaded by: [Memorial University of Newfoundland]
Parallel Computing xxx (2014) xxx–xxx
way prefix tree data structure for strings matching We propose
way prefix tree data structure for strings matching We propose
way prefix tree data structure for strings matching We propose
Editors: Frédéric Thiesse • frederic.thiesse@unisg.ch
Building the Internet
Building the Internet
Integration of Wireless Sensor Networks and
Integration of Wireless Sensor Networks and
Journal of Network and Computer Applications 37 (2014) 380–392
CLOUD COMPUTING
the scientific applications of that time used relatively simple data
JID:YJCSS AID:2681 /FLA [m3G; v 1.93; Prn:19/03/2013; 15:42] P.1(1-13)
IBM IBM offers cloud computing services to help businesses of
IBM IBM offers cloud computing services to help businesses of
Available online at www.sciencedirect.com
E – Business Platform for Mobile Users
performance of the application at peak load was a single
James K. Carson
Sickle cell disease detection using 3D printed device and a
E – Business Platform for Mobile Users
Chapter 8
Beyond ERP
18 WEB OS DECEMBER 2005
10
IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 16, NO. 1, FIRST QUARTER 2014 61
10
Important design factors that must be carefully considered for UWB
Preface
Preface
CLOUD COMPUTING
HR Trends in Delivery Methods Inspection of this list gives
C l o u d C o m p u t i n g a t W o r k
C l o u d C o m p u t i n g a t W o r k
International Journal of Information Management 35 (2015) 672–678
Beyond ERP
J Internet Serv Appl (2010) 1: 7–18
Beyond ERP
Beyond ERP
s WackerChemie unveils new silicone 3D printing technology With over
Int. J. Production Economics 147 (2014) 340–350
an automated technique that tests Android apps via their Graphical
secure software as a service We document here an enterprise
3
Early adopters and new applications Cloud computing is still in
Early adopters and new applications Cloud computing is still in
4.1.1. Logistic and product lifetime managem ent
them. Note that not all IoT applications have currently the same
upsurges the capabilities of the hardware resources by optimal and
Then the resource everyone takes for granted is a major
3
s Edge keeps shedding share as users pick other browsers
Wearable Computing
Parallel Programming Paradigms and Frameworks in Big Data Era Ciprian
Environmental durability of adhesively bonded FRP/steel joints in civil
Machina Research
computers & security 43 (2014) 205e218
Business Horizons (2015) 58, 431—440
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Support of Project Management Methods by Project Management Information System
2. Wireless sensor network applications in smart grid
COMPUSOFT, An international journal of advanced computer technology, 3 (9), September-2014 (Volume-III, Issue-IX)
COMPUSOFT, An international journal of advanced computer technology, 3 (9), September-2014 (Volume-III, Issue-IX)
The Story of the
SoltanPoor
Cloud Computing:
TSplus White Paper
Journal of Network and Computer Applications 3 7 (20 1 4) 38 0 – 392
Journal of Network and Computer Applications 3 7 (20 1 4) 38 0 – 392
A comprehensive survey on vehicular Ad Hoc network
VEHICULAR AD HOC NETWORKS
A Scalable Peer-to-peer Lookup Protocol
12 Pump Characteristics and Applications
14 Pump Characteristics and Applications
18 Pump Characteristics and Applications
18 Pump Characteristics and Applications
Internet of Things:
Internet of Things:
Internet of Things:
2012 International Symposium on Pervasive Systems, Algorithms and Networks
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Software-Defined Cloud Computing: Architectural
helping build the smart business
Expert Systems with Applications 38 (2011) 5166–5177
Expert Systems with Applications 38 (2011) 5166–5177
Expert Systems with Applications 38 (2011) 5166–5177
Expert Systems with Applications 38 (2011) 5166–5177
AdaptingscientificcomputingproblemstocloudsusingMapReduce
AdaptingscientificcomputingproblemstocloudsusingMapReduce
AdaptingscientificcomputingproblemstocloudsusingMapReduce
Metal� OrganicFrameworksforAnalytical
Arnold Schwarzenegger
7. Conclusions and future research directions
7. Conclusions and future research directions
A Survey of Commercial Frameworks for
AnalyzingInter-ApplicationCommunicationinAndroid
AnalyzingInter-ApplicationCommunicationinAndroid
AnalyzingInter-ApplicationCommunicationinAndroid
Journal of Network and Computer Applications 48 (2015) 99–117
Journal of Network and Computer Applications 48 (2015) 99–117
Ambitious applications must fight OS
Ambitious applications must fight OS
Journal of Network and Computer Applications 47 (2015) 99–106
Journal of Network and Computer Applications 47 (2015) 99–106
Malware Protection Malware on person computers takes the forms of
Privacy and Confidentiality issues in Cloud Computing architectures 19
420 FUZZY SET THEORY-AND ITS APPLICATIONS
CHAPTER
Advances in Internet of Things, 2016, 6, 19-29
polymers are the most important and largest family of materials
6 IEEETRANSACTIONSONCLOUDCOMPUTING, VOL.4, NO.1, JANUARY-MARCH2016
Software-Defined Cloud Computing: Architectural
ISSN (Print) : 2320 – 3765
14 MICROWAVE FILTER STRUCTURES
IMPROVING RESOURCE EFFICIENCY IN CLOUD COMPUTING
G Model
Network and Complex Systems www.iiste.org
Surplus F air S c heduling: A P r opor ti onal-Share C PU Sc heduling A lgorithm for
Ab st ract par ty w eb sites typically do so by m apping m u ltiple w eb
Efficacy of scheduling heuristic
Ab st ract par ty w eb sites typically do so by m apping m u ltiple w eb
Efficacy of scheduling heuristic
is a category of cloud computing that provides a platform
is a category of cloud computing that provides a platform
is a category of cloud computing that provides a platform
is a category of cloud computing that provides a platform
describes any cloud service where consumers are able to access
describes any cloud service where consumers are able to access
Journal of Network and Computer Applications 34 (2011) 1–11
big data
FutureGenerationComputerSystems29(2013)84–106
Brett King, CEO of Moven, Host of Breaking Banks and Author of the book,
OWASP Papers Program
Biotechnology finds finds wide application in textiles and it will
1
Thermal Cameras Simply
,� %37���� 6-��� ��3� # � /��� �% ��-%$� %!� � �#��,�(�%"�� ,��"�� � (�"�%+/��� �
Thermal Cameras Simply
Thermal Camera With over 50 years of experience in the
abstract Isolation and resource control for cloud applications has traditionally been achieve through the use of virtual machines.
FE-13 (HFC-23 NFPA 2001 designation) is an efficient clean agent fire suppressant utilized in various environments that require fire protection while minimizing the risk of collateral damage from fires.
Bartłomiej Kołakowski
546 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
546 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
546 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
Introduction to Microsoft Windows Server 2016 Whether you are a
Introduction to Microsoft Windows Server 2016 Whether you are a
Proceedings of the 2015 International Conference on Industrial Engineering and Operations Management
Introduction to Microsoft Windows Server 2016 Whether you are a
Mobile Netw Appl
which confuses the issue of which messaging system an application
which confuses the issue of which messaging system an application
which confuses the issue of which messaging system an application
Information & Management 51 (2014) 260–269
Aligning RFID applications with supply chain strategies Many large retailers
Aligning RFID applications with supply chain strategies Many large retailers
International Journal of Control and Automation
Page 1 of 8
International Journal of Control and Automation
International Journal of Information Management 36 (2016) 748–758
Journal of Systems Architecture 60 (2014) 726–740
INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 2, ISSUE 7 152
Science of Computer Programming 102 (2015) 1–19
Applied Energy 137 (2015) 511–536
ISSN(Online) : 2319-8753
ARTICLE IN PRESS
Downloaded from http://iranpaper.ir
js was developed by Ryan Dahl in 2009 and its
Downloaded from http://iranpaper.ir
ARTICLE IN PRESS
GovernmentInformationQuarterly32(2015)473–487
0 technologies in local government a b s t r
FutureGenerationComputerSystems56(2016)684–700
PAPADIMITRATOS LAYOUT 10/19/09 12:36 PM Page 84
Internet Marketing
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 3 0 1 8 0 3 0 0 5
Introduction Firewall Planning and Design Processes
IoT Standards and Protocols An overview of protocols involved in
Named Data Networking for IoT:
Fixation and distribution of bacterial activity in sand to induce
Named Data Networking for IoT:
2016 IEEE First International Conference on Internet-of-Things Design and Implementation
Proceedings of the 50th Hawaii International Conference on System Sciences | 2017
EPO grants record number of European patents in 2016 Due
EPO grants record number of European patents in 2016 Due
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
CLEI ELECTRONIC JOURNAL, VOLUME 19, NUMBER 3, PAPER 1, DECEMBER 2016
Fortiweb and FortiAnalyzer Devices
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
JACC: BASIC TO TRANSLATIONAL SCIENCE VOL. -,NO. -,2016
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
finity construction beams for use in buildingsNew product range
SDN and Fog Computing Rapid increase in number and diversity
SDN and Fog Computing Rapid increase in number and diversity
3.3.3 Cloud
CHAPTER 2
CHAPTER 2
The Basics of
CHAPTER 2
middleware is an important enabler which provide communication among heterogeneous
Wireless Pers Commun
MAGIC Broker 2
a b s t r a c t Big data
The Future of the Internet
CHAPTER 2
commerce as an online mediated application combining Web 2.0
1
Chapter 1
CHAPTER 2
CHAPTER 2
CHAPTER 2
people in the pervasive environment can concentrate on their working
people in the pervasive environment can concentrate on their working
1 cost by dynamically maintaining minimum replicas among the 2
BOINC: A System for Public-Resource Computing and Storage
obr76817_ch07_270-306.indd Page 272 13/08/10 7:37 PM user-f501 /Users/user-f501/Desktop
for studying activity recognition in a naturalis-
for studying activity recognition in a naturalis-
CHAPTER1
4th IFAC Symposium on Telematics Applications
secures organizations with its wide range of product offerings at
FortiWeb Unprotected web applications are the easiest point of entry
Parallels RAS v16 Virtual application and desktop delivery can be
INTRODUCTION THE forward converter is a relatively simple and popular
INTRODUCTION THE forward converter is a relatively simple and popular
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 10, NO. 4, NOVEMBER 2014 2233
■
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 8 2 2 9 3 4 8 7
Downloaded from http://iranpaper.ir
FutureGenerationComputerSystems56(2016)684–700
Expert Systems with Applications 42 (2015) 679–690
are important parameters for engineering constructions and ecosystems in sedimentary
computers & security 44 (2014) 104e118
26 1 Introduction to Business Process Management
Public buildings consume a considerably high percentage of energy produced
to permanent stent implantation often results in restenosis or lumen
Section 2
Section 2
CUSTOM
CUSTOM
CUSTOM
CUSTOM
Accepted Manuscript
Accepted Manuscript
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 3 3 3 9 1 3 5 4
Iscah Migration Newsletter
Helmholtz Innovation Labs
Available online at www.sciencedirect.com
Voice information systems The appeal of the human voice as
Artificial intelligence will soon change how we conduct our daily
If you are looking for rich features with absolute simplicity
1
Al Nuaimi et al. Journal of Internet Services and Applications (2015) 6:25
Issues in Informing Science and Information Technology Volume 6, 2009
DELL EMC RECOVERPOINT Continuous Data Protection for Any Point in
Issues in Informing Science and Information Technology Volume 6, 2009
The Device Mesh
have been accepted as a new green chemical revolution which
2018 IEEE Conference on Multimedia Information Processing and Retrieval
Review
12.7.12 Antibiotics
Optical fibers with fiber counts ranging from 2 to 144
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
Cloud-FogInteroperabilityinIoT-enabledHealthcareSolutions
Cloud-FogInteroperabilityinIoT-enabledHealthcareSolutions
Expert Systems with Applications 39 (2012) 11303–11311
State of Requirements Engineering Research 315
State of Requirements Engineering Research 315
Expert Systems with Applications 39 (2012) 11303–11311
A COMPARISON OF FOG COMPUTING ANDRELATED COMPUTING PARADIGMS This section
Mobile Computing The advancement in fog and cloud computing is
isolatescloser dependencies between specific hardware architectureand software systems to achieve
Cloud Computing and Grid Computing 360-Degree Compared
546 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
546 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
Fog Data Analytics: A Taxonomy and Process Model Abstract
Contemporaneous and long-term effects of children’s public health
Contemporaneous and long-term effects of children’s public health
570 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2683200, IEEE Internet of
The concepts of health and health care are moving towards
1420
JournalofNetworkandComputerApplications128(2019)90–104
JournalofNetworkandComputerApplications128(2019)90–104
Polymer Optical Fibers
FutureGenerationComputerSystems34(2014)47–65
ALL YOU NEED TO KNOW ABOUT CONTACTORS لینک فایل What
healthcare
healthcare
Internet of Things 1–2 (2018) 1–13
General Info ZIRCAR Type SIL Silica Cloths consists of high
generation firewalls filter network traffic to protect an organization from
SA ER
SA ER
SA ER
Chapter 3
Chapter 3
st
st
AND APPLICATIONS A laboratory furnace is an essential part of
The companies that offer these computing services are called cloud
2
3
9
Downloaded from https://iranpaper.ir
A server works through a simple way of request and
is an authentication method that lets users access multiple applications
is an authentication method that lets users access multiple applications
FEATURE: MOBILE APPLICATIONS
Materials Today: Proceedings xxx (xxxx) xxx
Study of security issues and solutions in Internet of Things
10.5 Human Variability 195
level and AI makes possible in describing the factors that
10 TYPES OF DRAINAGE PIPES BASED ON MATERIAL AND STYLE
436 CHAPTER 18 eSCIENCE AND BIG DATA WORKFLOWS IN CLOUDS
مقایسه لوله دوجداره و تک جداره پلی اتیلن Compare the
Received 11 June 2022, accepted 6 August 2022, date of publication 16 August 2022, date of current version 22 August 2022.
ESWA 9318 No. of Pages 10, Model 5G