iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ Based
جزئیات خدمات ترجمه در ترجمه تخصصی
Iranian
control
control
control
control
control
control
control
control
control
[]
customer
[]
[]
How To Pick The Best ETF
routing
cluster
routing
routing
cluster
routing
video
messages
workflow
identification
recognition
learning
traffic
viewpoints about Curriculum Design based on Blended Learning approach Ali
viewpoints about Curriculum Design based on Blended Learning approach Ali
Few professionals would recommend a specific career choice based solely
Human Activity Recognition for the use in
G Model
as electrode materials owing to their unique structures and properties
as electrode materials owing to their unique structures and properties
as electrodematerials owing to their unique structures and properties to
68 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 13, NO. 1, FIRST QUARTER 2011
68 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 13, NO. 1, FIRST QUARTER 2011
68 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 13, NO. 1, FIRST QUARTER 2011
68 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 13, NO. 1, FIRST QUARTER 2011
Review
ABSTRACT
ABSTRACT
ABSTRACT
International Journal of Automation and Computing 7(4), November 2010, 531-542
Expert Systems with Applications 39 (2012) 4729–4739
Progress in Organic Coatings 76 (2013) 1642– 1665
Journal of Business Finance & Accounting
Progress in Organic Coatings 76 (2013) 1642– 1665
Characteristics Opportunities Challenges
2013 IEEE 37th Annual Computer Software and Applications Conference Workshops
Mathematical Programming Formulations 51
ICDS 2012 : The Sixth International Conference on Digital Society
484 Vinod Kumar et al. / Procedia - Social and Behavioral Sciences 37 ( 2012 ) 482 – 489
Vinod Kumar et al. / Procedia - Social and Behavioral Sciences 37 ( 2012 ) 482 – 489 485
The subject of human rights in Islam are based on
Abstract
Decision Support Systems 53 (2012) 704–711
Expert Systems with Applications 38 (2011) 8696–8702
Expert Systems with Applications 38 (2011) 8696–8702
A decision is a commitment to a proposition or plan
INTRODUCTION Traditional network security devices such as Intrusion Detection Systems
INTRODUCTION Traditional network security devices such as Intrusion Detection Systems
INTRODUCTION Traditional network security devices such as Intrusion Detection Systems
Artif Intell Rev
Comparison of Virtual Machine Scheduling Algorithms in
A Computationally Efficient Fingerprint Matching Algorithm for
Islamic Accounting
Journal of Microbiological Methods 94 (2013) 86–87
SECURITY AND COMMUNICATION NETWORKS
During aeroelastic simulation it is usually necessary to update a fluid volume mesh based on the
Fluvial Geomorphic Guidelines
Hybrid Intelligent System
Journal of Systems Architecture 59 (2013) 60–76
International Journal of Computer Applications (0975 – 8887)
Bulk WP Bulk Delete Posts Bulk Delete Pages Bulk Delete
Journal of Business Finance & Accounting
Expert Systems with Applications 41 (2014) 7653–7670
Bulk WP Bulk Delete Posts Bulk Delete Pages Bulk Delete
2013 International Conference on Computer Sciences and Applications
2013 International Conference on Computer Sciences and Applications
MeatScience98(2014)404–419
International Journal of Electrical and Computer Engineering (IJECE)
Detecting Distributed Denial of
International Journal of Electrical and Computer Engineering (IJECE)
International Journal of Electrical and Computer Engineering (IJECE)
8-Abstract—As the amount of non-scheduled small scale
3 Educational policy and
eAbstract The paper presents the new approach to optimizing automatic
eAbstract The paper presents the new approach to optimizing automatic
3.2. Organization
Management Accounting Research 23 (2012) 261– 277
آشکار ساز نوری گرافتن
Management Accounting Research 23 (2012) 261– 277
The discovery of photonic crystals made over two decades ago sparked great excitement in the
2011 Ninth IEEE/IFIP International Conference on Embedded and Ubiquitous Computing 2011 Ninth IEEE/IFIP International Conference on Embedded and Ubiquitous Computing 2011 IFIP Ninth International Conference on Embedded and Ubiquitous Computing
On the Relationship between Earnings Quality and the Degree of
On the Relationship between Earnings Quality and the Degree of
On the Relationship between Earnings Quality and the Degree of
Clinical Decision Support Systems: A discussion on
Introduction:
Introduction:
Clinical Decision Support Systems: A discussion on
Journal of Vol. 31, No. 2, pp. 107-138, 1994
ComputersandMathematicswithApplications63(2012)458–468
International Journal of Computer Trends and Technology (IJCTT) – volume 9 number 7– Mar 2014
Adjusts one set of scores based on the difference in
Accepted Manuscript
Accepted Manuscript
Sentiment Analysis: A Survey
Opinion Mining, Analysis and its Challenges
Information Sciences 281 (2014) 248–264
Accepted Manuscript
586 IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, VOL. 16, NO. 4, JULY 2012
Hajira Jabeen et al. / International Journal of Engineering Science and Technology
COMCOM 5017 No. of Pages 13, Model 5G
1
I. J. Computer Network and Information Security, 2013, 10, 44-50
35th Annual International Conference of the IEEE EMBS
2010 Seventh International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2010)
Neurocomputing 108 (2013) 45–57
Grey Systems: Theory and Application
Billions of devices are expected tobe associated into the system
I. J. Computer Network and Information Security, 2013, 10, 44-50
2010 Seventh International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2010)
2014 IEEE World Forum on Internet of Things (WF-IoT)
2014 IEEE World Forum on Internet of Things (WF-IoT)
2014 IEEE World Forum on Internet of Things (WF-IoT)
in this paper I want to suggest an interpretation of
the consciousattempts to change the structure or process of interaction
Vehicular Communications 1 (2014) 134–152
Journal of King Saud University – Computer and Information Sciences (2014) 26, 143–152
Int J CARS (2014) 9:241–253
Volume 2 No. 1 ISSN 2079-8407
The fundamental theory of design and operation of wind turbines
Normalized Similarity based Semantic
S. J. Gath et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (6), 2012,5315-5321
Computer Communications 42 (2014) 1–23
Expert Systems with Applications 39 (2012) 6388–6395
Neurocomputing 125 (2014) 95–101
the conscious attempts to change the structure or process of
to investigate the effects of ERP systems on the organization
to investigate the effects of ERP systems on the organization
Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)
2
Sasmita Mishra et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 4 (3) , 2013, 451-456
in this paper I want to suggest an interpretation of
HOFSTEDE’S 5 DIMENSIONS
Ganesh.I.Rathod et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (4) , 2014, 5601-5605
Empirical Framework for Making the Bid/No-Bid Decision
Empirical Framework for Making the Bid/No-Bid Decision
Empirical Framework for Making the Bid/No-Bid Decision
A lot of the NVIDIA VisualFX libraries have been already
A lot of the NVIDIA VisualFX libraries have been already
sample code and advanced libraries enabling developers to create the
برسی تکنولوژِی های کارت های گرافیک NVIDIA
Vehicular Communications 1 (2014) 134–152
Available online at www.sciencedirect.com
Expert Systems with Applications 41 (2014) 8225–8233
Int’l Journal of Cognitive Informatics and Natural Intelligence, 1(2), 73-85, April-June 2007 73
sample code and advanced libraries enabling developers to create the
Investigating two customer lifetime value models from segmentation perspective This
Pattern Recognition Letters 31 (2010) 1816–1824
a new approach to SMD is outlined based on what
LIAITHON: A location-aware multipath video
A.A. Talin et al. / Solid-State Electronics 45 2001) 963±976 973
Survey of Cognitive Radio Architectures
Optik 124 (2013) 2767– 2770
s SA is the ability to recognize salient cues from
A Review on Visual Brain Computer
2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops
2012 IEEE First International Conference on Mobile Services 2012 IEEE First International Conference on Mobile Services 2012 IEEE First International Conference on Mobile Services
most of the CBIR systems based up on the basic low arrangement of image intensities [22]. Color histogram,
due to the difficulty of inferring semantic meaning from low
due to the difficulty of inferring semantic meaning from low
due to the difficulty of inferring semantic meaning from low
Combined features Using a combination of visual features and concept
Combined features Using a combination of visual features and concept
due to the difficulty of inferring semantic meaning from low
From Wikipedia, the free encyclopedia
[3][4]
Computer-AidedDesign58(2015)105–116
NFC Enabled Intelligent Hospital
Transactions of the Korean Nuclear Society Spring Meeting
hoc networks have been extensively investigated by the research community
2013 International Conference on Connected Vehicles and Expo (ICCVE)
Volume 4, Issue 8, August 2014 ISSN: 2277 128X
A Biologically Inspired Computational Model of
Hierarchical Disaster Tolerant Architecture Based on Virtual Storage Technology Abstract
the status of data is becoming increasing important in information
275
Risk Management and Shareholders’
GAIT RECOGNITION BY LEARNING DISTRIBUTED KEY POSES
Effect of Cloud Computing based ERP System over Marketplace Dynamics
4 articles
systematic carding on the research of grey incidence analysis modeling has been made in this
Har d w ar e T r o j an
www.ietdl.org
Uncertainty is encountered when an experiment such as sampling is
Uncertainty is encountered when an experiment such as sampling is
Uncertainty in Learning from Big Data Edited By Xizhao Wang
Available online at www.sciencedirect.com
COMPUTER SCIENCE REVIEW ( ) –
Task scheduling on computational Grids using Gravitational
International Journal of Computer Applications (0975 – 8887)
COMPUTER SCIENCE REVIEW ( ) –
Hindawi Publishing Corporation
A Substitution Permutation Network Design Using Cellular Automata For Cipher Systems
International Conference on Computational Techniques and Artificial Intelligence (ICCTAI'2011)
Introduction Cerium is the most abundant element in rare earth
created applications on a development platform that a cloud service
created applications on a development platform that a cloud service
created applications on a development platform that a cloud service
created applications on a development platform that a cloud service
created applications on a development platform that a cloud service
FutureGenerationComputerSystems28(2012)379–390
FutureGenerationComputerSystems28(2012)379–390
658 Mohammad Abdul Mohit / Procedia - Social and Behavioral Sciences 153 ( 2014 ) 655 – 665
mechanic1
Proceedings of the 22”d Annual EMBS International Conference, July 23-28,2000, Chicago IL.
The θ–S curve is also useful, like vertical profiles of salinity and potential temperature
Proceedings of the 22”d Annual EMBS International Conference, July 23-28,2000, Chicago IL.
Proceedings of the 22”d Annual EMBS International Conference, July 23-28,2000, Chicago IL.
Proceedings of the 22”d Annual EMBS International Conference, July 23-28,2000, Chicago IL.
A Computationally Efficient Fingerprint Matching Algorithm for
This paper presents a review on different color based edge
This paper presents a review on different color based edge
A review Abstract This paper presents a review on different
The 9th International Forum on Strategic Technology (IFOST), October 21-23, 2014, Cox’s Bazar, Bangladesh
In this paper, an adaptive controller based on neural networks with parametric uncertainties for an
Expert Systems with Applications 41 (2014) 4401–4413
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
2008 Certified International Journal of Engineering Science and Innovative Technology
2008 Certified International Journal of Engineering Science and Innovative Technology
2008 Certified International Journal of Engineering Science and Innovative Technology
Pattern Recognition Letters 24 (2003) 1427–1435
is used to customer segmentation of a health and beauty
G Model
Lattice-based Cryptography
p u b l i c a t i o n / 2 3 2 6 1 8 2
ScienceDirect
ScienceDirect
Data required applying this method gathered from one branch of
This paper used clustering techniques as one of the methods
w
Electrical Power and Energy Systems 65 (2015) 432–442
Electrical Power and Energy Systems 65 (2015) 432–442
Electrical Power and Energy Systems 65 (2015) 432–442
Digital Elevation Model Based Hydro-processing
UNIVERSITY OF MINNESOTA
based image retrieval systems retrieve images from a database that
Electrical Power and Energy Systems 65 (2015) 432–442
Electrical Power and Energy Systems 65 (2015) 432–442
Electrical Power and Energy Systems 65 (2015) 432–442
233
Journal of Network and Computer Applications 40 (2014) 307–324
2013 Ninth International Conference on Computational Intelligence and Security
+An Evaluation of Web Services in the Design of a B2B Application
SPE 56562
This paper concentrates on Hybrid Fuel cell based Distributed Generation
Taxonomy of alert correlation techniques After a thorough review of
2013 Ninth International Conference on Computational Intelligence and Security
ASurveyontheInternetofThingsSecurity
USOO8972403B2
4 CHAPTER 1. INTRODUCTION
Galerkin The MLPG method has arisen from the finite element
Are you a shy person with a snarky sense of
D.Selvaraj et.al / Indian Journal of Computer Science and Engineering (IJCSE)
International Journal of Soft Computing and Engineering (IJSCE)
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎–∎∎∎
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎–∎∎∎
guided by an endless curiosity and exploration of drawing as
Biomarkers, 2008; 13(7"8): 637"657
646 M. Mascini & S. Tombelli
Egyptian Journal of Forensic Sciences (2015) xxx, xxx–xxx
Engineering Science and Technology, an International Journal 18 (2015) 594e602
5
JID:YJCSS AID:2681 /FLA [m3G; v 1.93; Prn:19/03/2013; 15:42] P.1(1-13)
computers & security 53 (2015) 79e108
The 10th International Conference on
The 10th International Conference on
Journal of Network and Computer Applications 58 (2015) 42–59
Electrical Power and Energy Systems 62 (2014) 753–762
Journal of Network and Computer Applications 58 (2015) 42–59
River Water Level Prediction Using Physically Based
Abstracts 147
Systematic Rationalization Approach for Multivariate Correlated Alarms
J. Funct. Biomater. 2015, 6, 204-221; doi:10.3390/jfb6020204
Abstracts 147
Abstracts 147
Abstracts 147
which claims that positive energy from people attracts positive energy
6th Conference on Information and Knowledge Technology (IKT 2014), May 28-30, 2014, Shahrood University of Technology, Tehran, Iran
6th Conference on Information and Knowledge Technology (IKT 2014), May 28-30, 2014, Shahrood University of Technology, Tehran, Iran
AcceptedManuscript
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Mining sparse and big data by case-based reasoning
Advances in Materials
Advances in Materials
Advances in Materials
Moodi
Power Boiler
Author's Accepted Manuscript
where operational offices and local infrastructures had been established in
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 418 #26
JND Model Study in Image Watermarking
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 437 #45
In this paper we present an expert system to balance
a b s t r a c t The assessment
Fourier Kernel Learning
10 Eduard Gabriel B az avan, Fuxin Li, and Cristian Sminchisescu
IEEETRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL.13,NO.8,AUGUST 2014 4283
3. Human issues in cellular manufacturing
3. The Proposed Methodology
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Agility is widely accepted in the manufacturing industry as a
Egyptian Informatics Journal (2015) xxx, xxx–xxx
124 IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, VOL. 1, NO. 1, JUNE 2007
ExpertSystemsWith Applications42(2015) 9033–9045
Available online at www.sciencedirect.com
Survey on Context-Aware Publish/Subscribe
Review of Available Transfer Capability Calculation
Review of Available Transfer Capability Calculation
1 Introduction Using the methodologies and techniques introduced in the
d
Wireless Pers Commun (2016) 87:17–28
EWA Selection Strategy with Channel Handoff Scheme in Cognitive Radio
Efficient Link Adaptation on Rayleigh Fading Channel for OSTBC MIMO
Computer Communications 42 (2014) 1–23
IIMB Management Review (2015) 27, 240–251
Wireless Pers Commun (2016) 87:17–28
Knowledge-Based Systems 97 (2016) 24–39
LEED (leadership in energy and environmental design); which is the most common
LEED (leadership in energy and environmental design); which is the most common
Nicholas Carr's „The Shallows. What the
Nicholas Carr's „The Shallows. What the
�
By reversing the soberness and the noble context and background
that are occupied and the oceans in between that are
based traffic monitoring and summarises the possible benefits in Intelligent
Available online at www.sciencedirect.com
P1: JZP
P1: JZP
Risk-based maintenance policy selection using AHP and goal programming
Survey on context-aware publish/subscribe systems for
subscribe scheme is an efficient paradigm for communication widely used
Survey on Context-Aware Publish/Subscribe systems for VANET
International Journal of Sustainable Built Environment (2014) 3, 235–246
International Journal of Sustainable Built Environment (2014) 3, 235–246
International Journal of Sustainable Built Environment (2014) 3, 235–246
International Journal of Sustainable Built Environment (2014) 3, 235–246
International Journal of Sustainable Built Environment (2014) 3, 235–246
based traffic monitoring and summarises the possible benefits in Intelligent
Available online at www.sciencedirect.com
based traffic monitoring and summarises the possible benefits in Intelligent
based traffic monitoring and summarises the possible benefits in Intelligent
S systems for VANET The examples of the previous section
2015 International Conference on Affective Computing and Intelligent Interaction (ACII)
Nodes in most of the deployments of Wireless Sensor Networks (WSNs) remain un-administered and exposed to variety of security attacks. Characterized by constrained resources and dynamically changing behavior of
Big Data Research 2 (2015) 166–186
Petri nets for Situation Recognition Örebro Studies in Technology 44
Most of my time I spend with a pencil or
Most of my time I spend with a pencil or
Process based methodologies
Process based methodologies
Process based methodologies
is a methodology for the assessment of relative efficiency of
is a methodology for the assessment of relative efficiency of
Pr eface
Pr eface
152 Financial Analysts as Users of Financial Accounting and Reporting Information
Efficient Optimal Algorithm of Task Scheduling in Cloud Computing Environment
Optimization of Resource Scheduling Based On Genetic Algorithm in Cloud Computing Environment
Using Mobile Phones to Determine
REFERENCES 29
Journal of Retailing and Consumer Services 30 (2016) 67–83
Available online at www.sciencedirect.com
This article was downloaded by: [University of Missouri Columbia]
Thread 1 Thread 2 Thread 3
Processor share received by dhrystones MPEG decoding with background compilations Interactive application with background simulations
Thread 1 Thread 2 Thread 3
Processor share received by dhrystones MPEG decoding with background compilations Interactive application with background simulations
Pr eface
4 Molecular Imprinting for Selective Sensing of Explosives, Warfare Agents…
256 G. Istamboulie and J.L. Marty
Pr eface
4 Molecular Imprinting for Selective Sensing of Explosives, Warfare Agents…
276 F. Arduini and G. Palleschi
2015 12th International Conference on Information Technology - New Generations
Available online at www.sciencedirect.com
2012 NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING, NUiCONE-2012, 06-08DECEMBER, 2012
T. Wang et al.: Rethinking the Data Center Networking
T. Wang et al.: Rethinking the Data Center Networking
This will result in a parallelization of the real and
6.2 Development of the Internet from the Users’ Perspective 41
6.2 Development of the Internet from the Users’ Perspective 41
Abstract—The emerging massive/large-scale multiple-input multiple-output (LS-MIMO)
Abstract—The emerging massive/large-scale multiple-input multiple-output (LS-MIMO) systems that rely
Abstract—The emerging massive/large-scale multiple-input multiple-output (LS-MIMO) systems that rely
The target was to give shape to the brand concept
Matching Structure and Semantics:
Available online at www.sciencedirect.com
Progress in Polymer Science 49–50 (2015) 3–33
Low melting aliphatic polyesters are probably the mostoften utilized soft
Low melting aliphatic polyesters are probably the mostoften utilized soft
Low melting aliphatic polyesters are probably the mostoften utilized soft
Low melting aliphatic polyesters are probably the mostoften utilized soft
The research on SMPs has developed to an interestingand vital
The research on SMPs has developed to an interestingand vital
The research on SMPs has developed to an interestingand vital
The research on SMPs has developed to an interesting and
Low melting aliphatic polyesters are probably the mostoften utilized soft
Shape memory polymers based on a glass transition The above
Shape memory polymers based on a glass transition The above
computer methods and programs in biomedicine 131 (2016) 127–141
A SYSTEM FOR MINE DESIGN SELECTION UNDER UNCERTAINTY
4 Easy and Effective Email Marketing Tips for Your Small Business
Knowledge-Based Systems 46 (2013) 109–132
OH groups at the outer surface of the coating compared
Enabling You! Powerful Organizations
CHAPTER V- EVALUATION OF DECISION MODELS
ND
Measurement 50 (2014) 346–355
Proceedings of the 2015 International Conference on Industrial Engineering and Operations Management
Engineering Applications of Artificial Intelligence∎ (∎∎∎∎)∎∎∎–∎∎∎
Distributed Database Management Techniques
Distributed Database Management Techniques
Downloaded from http://iranpaper.ir
ISSN 1068-7998, Russian Aeronautics (Iz.VUZ), 2014, Vol. 57, No. 3, pp. 303–306. © Allerton Press, Inc., 2014.
J. Appl. Environ. Biol. Sci., 6(4S)77-81, 2016
J. Appl. Environ. Biol. Sci., 6(4S)77-81, 2016
Framework for Better Reusability in Component Based Software Engineering ABSTRACT
Downloaded from http://iranpaper.ir
Nagrath etal. SpringerPlus (2015) 4:103
Lifelog Visualization for Elderly Health Care in
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Downloaded from http://iranpaper.ir
Volume 4, Issue 11, November 2014 ISSN: 2277 128X
A Survey of Trust Models for Enterprise Information Systems
4.3 Classic BWCA Versus Text and Image Compression Standards The classic BWCA is described in Figure 3.1, and it was created for text compression.
WHEREASGAZ is the company responsible for international business of a
WHEREASGAZ is the company responsible for international business of a
Available online at www.sciencedirect.com
Pattern Recognition Letters 82 (2016) 242–250
Expert Systems with Applications 41 (2014) 5526–5545
Journal of King Saud University – Computer and Information Sciences (2016) 28, 345–361
ARTICLE IN PRESS
The Methodology defines MCE and DE ground motions for structures
The development of analytical models is case specific, and no single model is
2016 IEEE International Conference on Smart Grid Communications (SmartGridComm): Data Management and Grid Analytics
J Netw Syst Manage (2015) 23:163–182
J Netw Syst Manage (2015) 23:163–182
J Netw Syst Manage (2015) 23:163–182
Information Sciences 191 (2012) 128–145
ABC OF
Available online at www.sciencedirect.com
Journal of Retailing and Consumer Services 30 (2016) 67–83
multiple human object tracking approach is used which based on
The 31st International Symposium on Automation and Robotics in Construction and Mining (ISARC 2014)
The 31st International Symposium on Automation and Robotics in Construction and Mining (ISARC 2014)
Journal of Retailing and Consumer Services 30 (2016) 67–83
Journal of Retailing and Consumer Services 30 (2016) 67–83
Journal of Retailing and Consumer Services 30 (2016) 67–83
Journal of Retailing and Consumer Services 30 (2016) 67–83
J. Mod. Power Syst. Clean Energy
The 31st International Symposium on Automation and Robotics in Construction and Mining (ISARC 2014)
Detecting Dynamic Topics in Social Network Using Citation based Anomaly
2015 IEEE 8th International Conference on Cloud Computing
2015 IEEE 8th International Conference on Cloud Computing
2015 IEEE 8th International Conference on Cloud Computing
H. Koohi, K. Kiani/Measurement 91 (2016) 134–139 135
IEEE ANTS 2015 1570205805
Detecting Anomalies in Online Social Networks using Graph Metrics Abstract
criteria based dynamic model selection and combination Abstract In spite
in a power grid largely improves the observability of power
in a power grid largely improves the observability of power
Journal of Network and Computer Applications 77 (2017) 18–47
in a power grid largely improves the observability of power
Dermal Absorption
in a power grid largely improves the observability of power
in a power grid largely improves the observability of power
We propose to monitor malicious activity on OSNs through the
Resource allocation Resource allocation is an inevitable technology for the
Journal of King Saud University – Computer and Information Sciences (2016) xxx, xxx–xxx
ARTICLE IN PRESS
KEYWORDS
Journal of King Saud University – Computer and Information Sciences (2016) xxx, xxx–xxx
Knowledge-Based Systems xxx (2015) xxx–xxx
International Journal of Biological Macromolecules 98 (2017) 748–776
International Journal of Biological Macromolecules 98 (2017) 748–776
Renewable and Sustainable Energy Reviews 67 (2017) 1047–1064
Problems and Perspectives in Management, Volume 11, Issue 4, 2013
Problems and Perspectives in Management, Volume 11, Issue 4, 2013
Problems and Perspectives in Management, Volume 11, Issue 4, 2013
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
AIChE Journal Page 38 of 77
AppliedMathematicsand Computation274(2016) 690–699
ISA Transactions
AppliedMathematicsand Computation274(2016) 690–699
ISA Transactions∎ (∎∎∎∎)∎∎∎–∎∎∎
Human Resource Management Review 23 (2013) 50–70
A Primer on Multichannel Marketing Multichannel marketing is the practice
A Primer on Multichannel Marketing Multichannel marketing is the practice
GIS-Based Multiple-Criteria Decision Analysis
Applied Mathematics, 2016, 7, 440-455
2017 the 6th International Conference on Industrial Technology and Management
adapt to fluctuation of the object appearance, and incorpo- (tracking, learning, detection), which combined the random
Expert Systems with Applications 41 (2014) 7281–7290
Available online at www.sciencedirect.com
has a longhistory and has appeared in various forms in
Computer Communications 74 (2016) 3–15
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2016.2637663, IEEE
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2016.2637663, IEEE
2012 IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference
Procedia
Cauchy Distribution of the CHARED was modified by tuning the
s Experimentarium features a helical staircase and cladding based on
II. EXTRACTIVE TEXT SUMMARIZATION
Abstract Network lifetime improvement and uncertainty inmultiple systems are the
LBP based feature descriptors have gotten encouraging performance in image
Knowledge-Based Systems 49 (2013) 50–62
WSEAS TRANSACTIONS on COMPUTERS M. Deepa Lakshmi, Julia Punitha Malar Dhas
FutureGenerationComputerSystems70(2017)17–25
FutureGenerationComputerSystems70(2017)17–25
FutureGenerationComputerSystems70(2017)17–25
a new approach for autonomous anomaly detection is introduced within
a new approach for autonomous anomaly detection is introduced within
a new approach for autonomous anomaly detection is introduced within
Renewable and Sustainable Energy Reviews 67 (2017) 1047–1064
Information technologies
Expertise Cooperation Contract This contract has been concluded between Sepehr
Renewable and Sustainable Energy Reviews 67 (2017) 1047–1064
Malaysian Journal of Science 33 (1): 68-77 (2014)
Malaysian Journal of Science 33 (1): 68-77 (2014)
Biomedical Signal Processing and Control 9 (2014) 56– 69
based Models Analyzing the propagation behavior is popular but incurs
based Models Analyzing the propagation behavior is popular but incurs
based Models Analyzing the propagation behavior is popular but incurs
based Models Analyzing the propagation behavior is popular but incurs
FROM ASSOCIATED GASES TO POWER GENERAL ASPECTS The issue Gas
Telecommun Syst
P1: JZP
sample performance ofthe algorithm was shown to merely beatthe chance
Fourteen of these features were used to compare the algorithm
but it could be inferred from results that it is
only a subset of frequency bands was discriminatory when using
4th International Conference on Advances in Control and
Downloaded from http://iranpaper.ir
Int J Syst Assur Eng Manag
Selection of Software Testing Technique:
Selection of Software Testing Technique:
ARTICLE IN PRESS
Downloaded from http://iranpaper.ir
A Survey Recent technological advances in the area of wireless
2016 IEEE 16th International Conference on Data Mining
Telecommun Syst
Journal of Systems Architecture 76 (2017) 117–132
International Journal of Biosensors & Bioelectronics
Computers in Human Behavior 56 (2016) 295e305
Computers in Human Behavior 56 (2016) 295e305
2016 eLearning Trends 9 Things That Will Shape The Future
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
PLANNING PRACTICE & RESEARCH, 2017
Chapter1
A Hybrid Reconstructed Discontinuous Galerkin Method for Compressible Flows on
212 M.M. Afsar, M.-H. Tayarani-N / Journal of Network and Computer Applications 46 (2014) 198–226
212 M.M. Afsar, M.-H. Tayarani-N / Journal of Network and Computer Applications 46 (2014) 198–226
212 M.M. Afsar, M.-H. Tayarani-N / Journal of Network and Computer Applications 46 (2014) 198–226
212 M.M. Afsar, M.-H. Tayarani-N / Journal of Network and Computer Applications 46 (2014) 198–226
A New Trust Model based on Social Characteristics and Reputation
Ava ailable online att www.sciencedirect.com
Abstract 1
Abstract 1
Abstract 1
Original Research Paper Application of remote sensing techniques for forest
Downloaded from http://iranpaper.ir
ABSTRACT.(1)
The risk of cardiovascular events based on Framingham criteriain Adults
Renewable and Sustainable Energy Reviews 69 (2017) 596–609
International Journal of
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 11, Number 4 (2016) pp 2411-2416
Neural Process Lett
Biosensors and Bioelectronics 105 (2018) 49–57
s SenseMI feature suite consists of five key technologies that
AP Psychology Vocabulary
Sci Pharm. 2008; 76: 333–360 doi:10.3797/scipharm.0803-03 333
Simpo PDF Merge and Split Unregistered Version - http://www.simpopdf.com
Simpo PDF Merge and Split Unregistered Version - http://www.simpopdf.com
The Pharma Innovation Journal 2018; 7(7): 331-333
Hindawi Publishing Corporation
Sensors and Actuators B 243 (2017) 311–325
tarjomepdf
1
2
3
Downloaded from http://comjnl.oxfordjournals.org/ at West Virginia University on September 18, 2016
Journal of Medical Systems (2018) 42:186
Received January 18, 2018, accepted February 23, 2018, date of publication March 19, 2018, date of current version April 18, 2018.
Critical Reviews in Analytical Chemistry
According to the National Academy of Sciences,
Wireless Networks
Wireless Networks
n
ve critically exam ined this rule for liv ing and
5 Simulation Results
T.S.Somasundaram,K.Govindarajan/FutureGenerationComputerSystems34(2014)47–65 53
3 Content-basedRecommenderSystems:StateoftheArtandTrends 83
Making Contributions to Causes Based on Product Sales and Consumer
The objective of this research is to develop a formal
PARDISO Solver
Project based learning is the methodology in which projects drive
Project based learning is the methodology in which projects drive
OUR INNOVATIVE APPROACH TO PACKAGING AND SUSTAINABILITY DIFFERENTIATES US FROM
Modeling and Simulation of PUMA Mobile Manipulator
Knowl Inf Syst (2017) 51:339–367
Task scheduling techniques in cloud computing: A literature survey
magnetochemistry
Computer Communications 139 (2019) 32–57
A Review on Trust Models of Social
Computer Communications 139 (2019) 32–57
JournalPre-proof
applied
Malekshahi Rad et al.
Myocarditis in US Athletes after mild Covid ?
www.nature.com/scientificreports
Downloaded from https://iranpaper.ir
Downloaded from https://iranpaper.ir
This article has been accepted for inclusion in a future issue of this magazine. Content is final as presented, with the exception of pagination.
AcceptedManuscript
Received November 21, 2020, accepted December 7, 2020, date of publication December 29, 2020,
Using Ethereum Blockchain in Internet of Things:
Knowledge-Based Systems 46 (2013) 109–132
Multimedia Tools and Applications
Multimedia Tools and Applications
Expert Systems With Applications 139 (2020) 112839
Expert Systems With Applications 139 (2020) 112839
All role based prices View role based price Add new
Decision Analytics Journal 7 (2023) 100233
International Journal of Information Management Data Insights 1 (2021) 100028
Journal of Ambient Intelligence and Humanized Computing
A New Cooperative Insurance Based On Blockchain
International Journal of Information Management Data Insights 1 (2021) 100028
Journal of Ambient Intelligence and Humanized Computing
HISTORICAL
HISTORICAL
Applied Energy 143 (2015) 251–261
Bioengineered