iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ Each
جزئیات خدمات ترجمه در ترجمه تخصصی
arch
task
butterflies
ANNGA
A Social Accounting
A Social Accounting
Social Accounting Matrix
channel
your
rear
t
strategy
strategy
routing
routing
routing
cache
cache
dictionary
program
program
world
world
students
room
Accepted Manuscript
ON THE ASSOCIATED GRAPHS TO A COMMUTATIVE RING
based program that facilitates analysis of tipping bucket and other
Estimating Mobile Application Energy
INT. J. COMPUTER INTEGRATED MANUFACTURING, MARCH 2004, VOL. 17, NO. 2, 108–116
INT. J. COMPUTER INTEGRATED MANUFACTURING, MARCH 2004, VOL. 17, NO. 2, 108–116
INT. J. COMPUTER INTEGRATED MANUFACTURING, MARCH 2004, VOL. 17, NO. 2, 108–116
It takes 20 years to build a reputation and five
68 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 13, NO. 1, FIRST QUARTER 2011
68 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 13, NO. 1, FIRST QUARTER 2011
68 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 13, NO. 1, FIRST QUARTER 2011
68 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 13, NO. 1, FIRST QUARTER 2011
TopDisc Algorithm The first coloring algorithm of TopDisc uses a
image retreival
ElastiStore: An Elastic Buffer Architecture for
CONFIRMING PAGES
A probabilistic neural network is used in Ko and Byun [2002] and in Ko et al.
702 IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 12, NO. 6, DECEMBER 2008
Academic Press is an imprint of Elsevier
Ratios of Total Suspended Solids to Suspended Sediment
ON THE ASSOCIATED GRAPHS TO A COMMUTATIVE RING
8
Double Entry Bookkeeping A business transaction involves an exchange between
you do gene predictions using a bacterial sequence from Heliobacillus
you do gene predictions using a bacterial sequence from Heliobacillus
Towards an Efficient Reservation Algorithm
Expert Systems with Applications 36 (2009) 3614–3622
The Starfish and the Spider: The Unstoppable Power of Leaderless
Some Considerations for Secure-Architecture Experimental Infrastructure
reduces the current and requires incorporation of bypass diodes in
reduces the current and requires incorporation of bypass diodes in
reduces the current and requires incorporation of bypass diodes in
reduces the current and requires incorporation of bypass diodes in
reduces the current and requires incorporation of bypass diodes in
CHAPTER 5
CHAPTER 5
www.ietdl.org
Methodology Bacterial strain and culture conditions Leptospira interrogans serovar Pomona
MethodologyBacterial strain and culture conditions Leptospira interrogans serovar Pomona
Methodology Bacterial strain and culture conditions Leptospira interrogans serovar Pomona
50 Resource-Constrained Project Scheduling
Mathematical Programming Formulations 53
54 Resource-Constrained Project Scheduling
Mathematical Programming Formulations 59
Mathematical Programming Formulations 61
Shi et al. BMC Research Notes 2011, 4:189
A simple problem-solving agent. It first formulates a goal and a problem,
I I I I
Globecom 2012 - Next Generation Networking and Internet Symposium
the causes of back pain and how to prevent and
418 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS, VOL. 22, NO. 3, MAYIJUNE 1992
418 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS, VOL. 22, NO. 3, MAYIJUNE 1992
PART3-29000
124 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 1, JANUARY 2014
The four young faces round the fire cheered up as
Globecom 2012 - Next Generation Networking and Internet Symposium
THIRD EDITION
facts are represented as data units having a timestamp which
Chapter 11
Transcript of the lecture When Galaxies Collide Professor Carolin Crawford
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 1, FEBRUARY 2003 17
صفحه 17 تا 22 - آذر
Transcript of the lecture When Galaxies Collide Professor Carolin Crawford
who first demonstrated the principle of the origin of how
1-8 نش
9-16
4 Group Level Phases of GSO Algorithm Implementation of GSO
10/12/2012
Computational Intelligence Computational
On Complexity of Isoperimetric Problems on Trees
On Complexity of Isoperimetric Problems on Trees
On Complexity of Isoperimetric Problems on Trees
364–– ––– –Issues Regarding Methods and Methodology
On Dominator Colorings in Graphs
International Business Review 21 (2012) 328–341
10 Habits to Develop for Financial Stability and Success
Learning hierarchical structures with
Learning hierarchical structures with
The structures of the prepared compounds were established from their
The structures of the prepared compounds were established from their
Expert Systems with Applications 38 (2011) 3407–3415
782 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 5, MAY 2014
This page intentionally left blank Behavior Dynamics in Media-Sharing Social Networks
Scuba: DivingintoDataatFacebook
CHAPTER 2
Comparing the Performance of Web Server Architectures
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 30, NO. 6, JUNE 2004 1
Chapter 7 Measurement of Cyber Situation Awareness in a Human
Chapter 7 Measurement of Cyber Situation Awareness in a Human
Comparison of Virtual Machine Scheduling Algorithms in
Coding Techniques
Coding Techniques
Coding Techniques
Coding Techniques
To appear in Smart Environments: Technologies, Protocols, and Applications
May 7, 2008 10:35 World Scientific Review Volume - 9in x 6in chapter4
Simultaneous Multi-Threading on POWER7 Processors
Z Energiewirtsch (2012) 36:135–145
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 30, NO. 6, JUNE 2004 1
CHAPTER 2
1
1
CHAPTER 2
Implementation of a 3GPP LTE Turbo Decoder
Finding a needle in Haystack: Facebook’s photo storage
Getting Started with ATLAS
Getting Started with ATLAS
Getting Started with ATLAS
A Combinatorial Approach to Detecting Buffer Overflow Vulnerabilities
Journal of Machine Learning Research 15 (2014) 2313-2335 Submitted 12/13; Revised 3/14; Published 6/14
Journal of Machine Learning Research 15 (2014) 2313-2335 Submitted 12/13; Revised 3/14; Published 6/14
Finding a needle in Haystack: Facebook’s photo storage
CHAPTER 2
part567
2013 42nd International Conference on Parallel Processing 2013 42nd International
2010 IEEE International Conference on Granular Computing
3D Face Recognition Based on Multiple Keypoint
W. Guo, W. Zhang / Journal of Network and Computer Applications 38 (2014) 185–201 187
CHAPTER 3
Parallel Island-Based Multiobjectivised Memetic
*†
IEEETRANSACTIONSONPOWERSYSTEMS,VOL.29,NO.4,JULY2014 1711
Electric Power Systems Research 81 (2011) 138–148
incorporates by reference the standards of the International Chamber of
incorporates by reference the standards of the International Chamber of
incorporates by reference the standards of the International Chamber of
incorporates by reference the standards of the International Chamber of
literature there are a lot of theoretical perspectives of which
based model to examine the emergent dynamic characteristics of fraud
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 6, JUNE 2011 1945
PART-1
Scuba: DivingintoDataatFacebook
6 The meaning of measurement
Having too many different standards makes life difficult for producers
Having too many different standards makes life difficult for producers
PUBLIC DIPLOMACY IN THE AGE OF THE INTERNET A MINORITY
PUBLIC DIPLOMACY IN THE AGE OF THE INTERNET A MINORITY
PUBLIC DIPLOMACY IN THE AGE OF THE INTERNET A MINORITY
PUBLIC DIPLOMACY IN THE AGE OF THE INTERNET A MINORITY
TOPICS IN INTERNET TECHNOLOGY
tree Structure Completeness Preserve complete information for frequent pattern mining
tree Structure Completeness Preserve complete information for frequent pattern mining
tree Structure Completeness Preserve complete information for frequent pattern mining
CHAPTER 2
hour campaign full of grand setpieces and deadly angels and
Chord: A Scalable Peer-to-peer Lookup Protocol
IDS
meanwhile some people subscribe to the idea that urban life
Parallel Algorithms for Constructing Data Structures for Fast Multipole Methods
ArtificialImmuneSystemInspiredIntrusionDetectionSystemUsingGenetic
Parallel Algorithms for Constructing Data Structures for Fast Multipole Methods
M-data at l . We only need compute M-data and box types
JournalofEconomicBehavior&Organization
JournalofEconomicBehavior&Organization
2
5
2
1. Introduction
7
Automatic WordNet Construction Using
1 Introduction Understanding of server capacity is crucial to server
Measuring legislators’ personal views on public policy can be challenging. The last representative
Measuring legislators’ personal views on public policy can be challenging. The last representative
1124 IEEETRANSACTIONSONINDUSTRIALINFORMATICS,VOL.10,NO.2,MAY2014
Chapter 5
Chapter 5
Chapter 5
eight different typesof collagen composed of at least 46 distinctpolypeptide
4.2. Social interest group firm has with financiers and market share information are not
ICIAfS'12 1569626783
Self-Tuning Spectral Clustering
J. Dairy Sci. 92:1161–1168
ARoutingArchitecturefor
594 Chapter 10 Mining Object, Spatial, Multimedia, Text, and Web Data
the generalization of an object can be performed by referring
Teachers as Classroom Coaches
equating data collection design provides a means of obtaining data
Encoding The genetic information of each individual is encoded in
EUROPEAN
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
cultures were agitated continuously on an orbital shaker moving at
Applied Soft Computing 26 (2015) 357–367
To appear in Smart Environments: Technologies, Protocols, and Applications
Y.Gaoetal./JournalofComputerandSystemSciences79(2013)1230–1242 1233
1232 Y.Gaoetal./JournalofComputerandSystemSciences79(2013)1230–1242
Y.Gaoetal./JournalofComputerandSystemSciences79(2013)1230–1242 1233
Computers & Operations Research 40 (2013) 385–394
Using Petri Nets For Resource Management
Information Sciences 275 (2014) 30–44
Expert Systems with Applications 42 (2015) 238–245
Hambley It is difficult to overemphasize the importance of good
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 5, NO. 5, MAY 1994
Lock and key FIELD The present invention relates to a
and of
and of
of
4.5 (Time semantics). Let N a STPN
Ad Hoc Networks xxx (2014) xxx–xxx
·
High-Performance Packet Classification on GPU
High-Performance Packet Classification on GPU
High-Performance Packet Classification on GPU
European Journal of Operational Research 239 (2014) 323–334
450 Example 29 The posterior distribution of the indirect effect
Hambley It is difficult to overemphasize the importance of good
Hambley It is difficult to overemphasize the importance of good
DistributedComputingBuildingBlocksforRationalAgents
If you are looking for a book that presents a
Design and Analysis
Hambley It is difficult to overemphasize the importance of good
ARTICLE IN PRESS
FA One day it occurred to a certain emperor that
Rural Development 2007-2013
268 5 Passive Mixer
IEEETRANSACTIONSONSMARTGRID,VOL.4,NO.3,SEPTEMBER2013 1567
IEEETRANSACTIONSONSMARTGRID,VOL.4,NO.3,SEPTEMBER2013 1567
Algorithmica (2014) 69:641–657
Physica A 338 (2004) 166–172
Physica A 338 (2004) 166–172
Journal of Manufacturing Systems 33 (2014) 218– 232
Constructing a TpB Questionnaire:
A VisualVocabulary forFlower Classification
Optical character recognition of cursive scripts present a number of
·
Path Selection and Coordination for Multiple Robots via Nash Equilibria
Path Selection and Coordination for Multiple Robots via Nash Equilibria
A novel approach for the cryptographic keys management in the
The sarcoplasmic currents were measured separately by applying equal values
Sign language recognition using depth camera and hand features
1 A mission is a task or process that is
Successful teamwork: A case study
Successful teamwork: A case study
Successful teamwork: A case study
Simpo PDF Merge and Split Unregistered Version - http://www.simpopdf.com
IEEE International Conference on Communications 2013: IEEE ICC'13 - The IEEE ICC 2013 2nd International Workshop on Small
�R
A VisualVocabulary forFlower Classification
1 A mission is a task or process that is
Sign language recognition using depth camera and FMLRF Neda khanbani1
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
InternationalJournalofProjectManagement21(2003)363–373
COMPNW 5373 No. of Pages 19, Model 3G
Journal of Network and Computer Applications 36 (2013) 409–419
Data Mining
D. Delen et al./Expert Systems with Applications 40 (2013) 3970–3983 3973
3982 D. Delen et al./Expert Systems with Applications 40 (2013) 3970–3983
شبکه
1 A mission is a task or process that is
Economic Modelling 30 (2013) 879–887
as a Dionysian artist he has identified himself with the
Sixth IEEE International Workshop on Network Science for Communication Networks (NetSciCom 2014)
Sixth IEEE International Workshop on Network Science for Communication Networks (NetSciCom 2014)
A Proposal of Millimeter-wave Multi-hop Mesh Wireless Network Architecture with
PREFACE TO THE FIRST EDITION
The electronic voting system based on a receipt with visual
War and the Cycle of Relative Power
Available online at www.sciencedirect.com
ScientiaIranicaA(2013)20(2),278–285
Parallel Task Routing for Crowdsourcing
Parallel Task Routing for Crowdsourcing
1
ScientiaIranicaA(2013)20(2),278–285
IN SPRING 2000, Roger Addison and I were conducting OD generally looks at differences in leadership in
Computers & Industrial Engineering 61 (2011) 1135–1148
Setting up profiles
Setting up profiles
An Efficient Parallel Algorithm for Solving the
European Journal of Operational Research 239 (2014) 335–348
6.2. Knowledge transfer
4.2. Relational dimension
COPYRIGHT
ELASTINOC SELF TESTABILITY As technology continues to scale and chips
Each MU is responsible for switching one output between 2
University \Alexandru Ioan Cuza" of Iasi, Romania
based structures can be implemented by decomposing the switch operation
2 MathematicalProblemsinEngineering
MathematicalProblemsinEngineering 5
CHAPTER 8. PRIVACY IN ONLINE TRANSACTIONS 117
CHAPTER 8. PRIVACY IN ONLINE TRANSACTIONS 124
Electric Power Systems Research 81 (2011) 862–872
Instructor’s Manual:
2.2.1. Queuing theory and simulation As a simple M/M/N queuing system where N is the number of
2164 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 26, NO. 4, NOVEMBER 2011
16Process Modeling in New
Comparison of MANOVA and ANOVA Now that we have presented
Comparison of MANOVA and ANOVA Now that we have presented
test that we covered in the last movie allows you
test that we covered in the last movie allows you
Fibonacci Numbers and Nature This page has been split into
Pattern Recognition Letters 31 (2010) 1816–1824
In-Place Linear-Time Algorithms for Euclidean
when used in combination with other techniques such as discriminant
50 Characteristics of Healthy Relationships
finger-knuckle-print database
InsuranceThe Insured agrees to maintain contributing insurance on each
Selected chapters from draft of
Electrical Power and Energy Systems 55 (2014) 108–115
Explaining with Psychological Capital Abhishek Kumar Totawar and RanjeetNambudiri Construct
Can Prayer Keep Your Lover From Cheating?
It is still in use in much of the industry
PSTN VoIP offers end users a lot of features and
Bayesian Forecasting of Multinomial Time Series
A memetic algorithm for job shop scheduling
Mahmoudi Ba Salam VaEhteram Pease be aware that tomorrow at
The Application of Pooled DNA Sequencing inDisease Association Study Table
face learning environments a b s t r a c
The amended text was approved by the plebiscite of 8
Fig. 2. in a city. As an example, widening the considered radius of attrac-
Fig. 2. in a city. As an example, widening the considered radius of attrac-
ادخ مان هب
developed over time and is not written down in one
286 DECISION MAKING WITH FUZZY INFORMATION
TWO
developed over time and is not written down in one
Journal of Business Research 65 (2012) 1790–1799
J Intell Manuf (2012) 23:651–659
The Family Therapy
Chapter 11
Chapter 11
Chapter 11
FTDB-aware ISF ( in : RC, out : sc )
FTDB-aware ISF ( in : RC, out : sc )
FTDB-aware ISF ( in : RC, out : sc )
Characterizaon of a mulpl ex,12 -biomarker test for rheumatoid
Introduction Data clustering is the process of placing data items
each containing a state drawn from a finite set of
each containing a state drawn from a finite set of
each containing a state drawn from a finite set of
cellular automaton
Reversible A reversible cellular automaton is a cellular automaton in
A Team-Based Organizational Model for Adaptive Multi-Agent Systems
Reversible A reversible cellular automaton is a cellular automaton in
Team Building Toolkit
آینده پژوهی
prompts to be selected for each major content category and
Rectangular lattice designs Rectangular lattice designs are resolvable designs for
A Survey of Optimization Models for Train
Functional connectivity in resting-state fMRI: Is linear correlation
Applications of Operations Research
Business Intelligence
The Family Therapy
JournalofBusinessResearch67(2014)785–789
Network Layer: Part II
Network Layer: Part II
A
Knowl Inf Syst (2008) 14:1–37
ANF: A Fast and Scalable Tool for Data Mining
A
I. Iancu, N. Constantinescu / Applied Soft Computing 13 (2013) 2136–2142 2137
Chapel Hill This chapter describes one of the most visible
TheTakeaway
Journal of M Management Research
Selecting the Right Interestingness Measure for
CMOS-like logic in defective, nanoscale crossbars
12
Information Processing and Management 49 (2013) 51–66
6.4 Simulated Annealing: General Presentation 131
CMOS-like logic in defective, nanoscale crossbars
CIRPÉE
Knowl Inf Syst (2011) 26:435–465
Knowl Inf Syst (2011) 26:435–465
Knowl Inf Syst (2011) 26:435–465
Knowl Inf Syst (2011) 26:435–465
Knowl Inf Syst (2011) 26:435–465
it is implicitly assumed that the location server receives actual
Knowl Inf Syst (2011) 26:435–465
17 Structured Techniques to Facilitate Relating at Various Levels in
17 Structured Techniques to Facilitate Relating at Various Levels in
Computers & Operations Research 59 (2015) 78–93
Available online at www.sciencedirect.com
Numeracy 145
Knowl Inf Syst (2011) 26:435–465
AA, for example, the left most plot shows the level/time history plot of a specific
Text Mining Sholom M. Weiss
International Journal of Machine Tools & Manufacture 87 (2014) 1–15
International Journal of Machine Tools & Manufacture 87 (2014) 1–15
International Journal of Machine Tools & Manufacture 87 (2014) 1–15
Expert Systems with Applications 41 (2014) 2157–2165
Expert Systems with Applications 41 (2014) 2157–2165
Abstract—In this paper, a visual speech classification scheme reliable facial and lip feature detection and tracking, which are
Information Processing and Management 49 (2013) 51–66
INFLUENCE OF GROUND MOTION SPECTRAL SHAPE AND DURATION
Nonetheless,
INFLUENCE OF GROUND MOTION SPECTRAL SHAPE AND DURATION
Research on Parallel Algorithm for Polygon
A Substitution Permutation Network Design Using Cellular Automata For Cipher Systems
2041 IEEE 2 8-th Convention of Electrical and Electronics Engineers in Israel
Islamic religions of the early adoption of the Imamate of
The Emerald Research Register for this journal is available at The current issue and full text archive of this journal is available at
Steelbridge 2004
re bringing in lots of traffic thanks to the highly
re bringing in lots of traffic thanks to the highly
A streaming approach abstract Requirements in computational power have grown
Available online at www.sciencedirect.com
increased sensitivity and precision, has helped a great deal to distinguish between different water
Pattern Recognition Letters 45 (2014) 106–114
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 26, NO. 1, JANUARY 2014 97
Application of Fuzzy Logic for Presentation of an
Chapter 3
3.4.3 Verification independent of number of mix servers
each decryption server distributes shares of its secret key to
1932 F. Marcelloni, M. Vecchio/Information Sciences 180 (2010) 1924–1941
Data Communications and Networking
A streaming approach abstract Requirements in computational power have grown
SLA-Based Resource Provisioning for
Description of properties of words such that meeting the selectional
Arrange pairwise comparisons of means in order from largest to
Downloaded from http://www.everyspec.com
Machine Learning for Natural Language Processing
Mayor Dominique Gros commissioned a trilingual wayfaring system to guide
Mayor Dominique Gros commissioned a trilingual wayfaring system to guide
Pattern Recognition Letters 24 (2003) 1427–1435
JOURNAL OF COMMUNICATIONS, VOL. 5, NO. 3, MARCH 2010 211
Lecture Notes in Computer Science 1
Level C - Grade 6/7 to Grade 9 Activity 2
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 26, NO. 1, JANUARY 2014 97
97
Data Mining with Big Data
Downloaded from http://bioinformatics.oxfordjournals.org/ by guest on April 11, 2015
Downloaded from http://bioinformatics.oxfordjournals.org/ by guest on April 11, 2015
ARTICLE IN PRESS
ARTICLE IN PRESS
ARTICLE IN PRESS
Downloaded from http://bioinformatics.oxfordjournals.org/ by guest on April 11, 2015
Modeling Purchase Behavior at an E-Commerce Web Site:
Parking problem becomes one of major issues in the city
Parking problem becomes one of major issues in the city
Modeling Purchase Behavior at an E-Commerce Web Site:
MultiLanes: Providing Virtualized Storage
3 Cryptographic Keys and Key Rings PGP makes use of
3 Cryptographic Keys and Key RingsPGP makes use of
p u b l i c a t i o n / 2 3 2 6 1 8 2
Many literatures have reviewed the application of data mining technology
Hasani
firms have invested millions of dollars to define and standardize
Computer Networks 51 (2007) 1031–1051
CHAPTER-IV
434
434
Cooperative driving: an ant colony system for autonomous
Contract 24-06-2015
Computers and Electrical Engineering 39 (2013) 640–654
LETTERS
LETTERS
An ABC book of 228 pages that shows more than
Signal & Image Processing : An International Journal (SIPIJ) Vol.4, No.3, June 2013
Planning for Decentralized Control of Multiple Robots Under Uncertainty
Planning for Decentralized Control of Multiple Robots Under Uncertainty Christopher
This paper presents a probabilistic framework for synthesizing control policies
Journal of Information & Computational Science 9: 4 (2012) 1083–1096
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 26, NO. 1, JANUARY 2014 97
Volume 4, Issue 5, May 2014 ISSN: 2277 128X
Abstract—BigDataconcernlarge-volume,complex,growingdatasetswithmultiple,autonomoussources.Withthefastdevelopment
The purpose of factor analysis lies in describing the connection
Abstract—k-meansisundoubtedlyoneofthemostpopularclusteringalgorithmsowingtoitssimplicityandefficiency.However,this
Abstract—k-meansisundoubtedlyoneofthemostpopularclusteringalgorithmsowingtoitssimplicityandefficiency.However,this
4.
Compared to the meat and potatoes gameplay shown at the
Alert association and tracking Associating IDS alerts that are hypothesized
High level information fusion assisted cyber defense Identifying the needs
Expert Systems with Applications 38 (2011) 6287–6293
ZDM 2006 Vol. 38 (2) Analyses
Analyses ZDM 2006 Vol. 38 (2)
ZDM 2006 Vol. 38 (2) Analyses
*Manuscript
3. WSA - greement and WSAG4J
3. WSA - greement and WSAG4J
3. WSA - greement and WSAG4J
2 Published Approaches for the Routing of Forklifts in a
2 Published Approaches for the Routing of Forklifts in a
6 A Case Study The analysis of a warehouse of
2 Published Approaches for the Routing of Forklifts in a
2 Published Approaches for the Routing of Forklifts in a
6 A Case Study The analysis of a warehouse of
2 Published Approaches for the Routing of Forklifts in a
design
COMMUNICA TIONS
Performance Evaluation of Reliability Aware Photonic Network-on-Chip
COMMUNICA TIONS
COMMUNICA TIONS
COMMUNICA TIONS
SkipTree: A Scalable Range-Queryable Distributed Data
SkipTree: A Scalable Range-Queryable Distributed Data
SkipTree: A Scalable Range-Queryable Distributed Data
International Journal of Industrial Engineering Computations 3 (2012) 123–132
International Journal of Fuzzy Logic Systems (IJFLS) Vol.1, No.1, October 2011
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 6 3 0 4 9 3 5 8
Studies of parental attitudes toward BGT present different methods to
ForwardingMetamorphosis: FastProgrammable
This paper aims to overcomes two limitations in current switching
An accurate and simple model for flexible satellites
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
J Supercomput
J Supercomput
J Supercomput
J Supercomput
Appendix Items for Measuring Ethical Leadership The CEO of my
528
Time Synchronization 249
colored embroidery floss and your familiarity with the chevron friendship
ON SAFARI
Engineering Applications of Artificial Intelligence 41 (2015) 195–206
PROJECT DESCRIPTION The Tango Housing project is unprecedented in its
PROJECT DESCRIPTION The Tango Housing project is unprecedented in its
®الگوریتم پایتون
Hindawi Publishing Corporation
IIMB Management Review (2013) 25, 203e212
G Model
1 General Decisions on land use have always been part
Hindawi Publishing Corporation
NLSR: Named-data Link State Routing Protocol
ISSN 2277-3061
Temporal Analytics on Big Data for Web
MANAGEMENT
MANAGEMENT
The Journal of Systems and Software 85 (2012) 77–86
Expert Systems with Applications 42 (2015) 6050–6064
Research Article
Planning and Controlling
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22, NO. 7, JULY 2011 1085
ABSTRACT Purchasing raw material problem from suppliers is one of
S VOLUME DISCOUNT ABSTRACT Purchasing raw material problem from suppliers
S VOLUME DISCOUNT ABSTRACT Purchasing raw material problem from suppliers
S VOLUME DISCOUNT ABSTRACT Purchasing raw material problem from suppliers
S VOLUME DISCOUNT ABSTRACT Purchasing raw material problem from suppliers
Purchasing raw material problem from suppliers
S VOLUME DISCOUNT ABSTRACT Purchasing raw material problem from suppliers
Expert Systems with Applications 42 (2015) 6050–6064
Expert Systems with Applications 42 (2015) 6050–6064
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
31 2.7 Strain-induced martensite formation
58 3.4 Simulating microstructural evolution
5
5
A Direct Nozzle Injection Controlled Rate
A Direct Nozzle Injection Controlled Rate
Murlidher Mourya et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 4 (5) , 2013, 681-682
Introduction to
Information Processing and Management 48 (2012) 903–917
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Introduction to
992 Y.-H.Leeetal./FutureGenerationComputerSystems27(2011)991–998
992 Y.-H.Leeetal./FutureGenerationComputerSystems27(2011)991–998
Creating a business plan
5
Machine Learning,
Machine Learning,
1
Time Dependent Vehicle Routing Problem
Author's Accepted Manuscript
6 I E EE J OURNAL OF SEL ECTED T O PICS IN SIGNAL PROCESSI N G , V O L. 9 , NO. 1, FE B R U A R Y 201 5
Location-Dependent Key Management Protocol for
13 Programming LINGO
13 Programming LINGO
Available online at www.sciencedirect.com
GLand XXXand their Affiliates may be referred to herein individually
From Research to Manuscript Michael Jay Katz
Human Action Recognition by Learning Bases of Action Attributes and Parts
A Direct Nozzle Injection Controlled Rate
A Direct Nozzle Injection Controlled Rate
Pattern Recognition 39 (2006) 180–188
Sky Journal of Business Administration and Management Vol. 1(2), pp. 10 - 24, March, 2013
6th Conference on Information and Knowledge Technology (IKT 2014), May 28-30, 2014, Shahrood University of Technology, Tehran, Iran
6th Conference on Information and Knowledge Technology (IKT 2014), May 28-30, 2014, Shahrood University of Technology, Tehran, Iran
Lecture Notes
Knowledge-Based Systems 59 (2014) 108–120
IMPROVED HUFFMAN CODING USING RECURSIVE SPLITTING.
huffman coding
A survey of vehicular communications for traffic signal optimization
Engineering Applications of Artificial Intelligence ∎ (∎∎∎∎) ∎∎∎–∎∎∎
13 Programming LINGO
13 Programming LINGO
Energy Conversion and Management 99 (2015) 387–399
Expert Systems with Applications 38 (2011) 7609–7615
Expert Systems with Applications 38 (2011) 7609–7615
The 23rd International Technical Conference on Circuits/Systems,
Expert Systems with Applications 38 (2011) 7609–7615
Bayesian Forecasting of Multinomial Time Series
Available online at www.sciencedirect.com
education
education
Instructor’s Manual:
Energy Conversion and Management 99 (2015) 387–399
s Edge keeps shedding share as users pick other browsers
Available online at www.sciencedirect.com
Predicting Positive and Negative Links
Domains Power Management Abstract The power of 3 different power
J Geogr Syst (2009) 11:291–310
J. Basic. Appl. Sci. Res., 3(3)965-973, 2013 ISSN 2090-4304
which prevent sets of concurrent processes from completing their tasks
which prevent sets of concurrent processes from completing their tasks
In the SRC that we have designed, we propose
In the SRC that we have designed, we propose
Lecture 24: Game Theory � c 2009 Je⁄rey A. Miron
--`,`,,``,```,`,`,`,`,``,`,`,,`-`-`,,`,,`,`,,`---
Sky Journal of Business Administration and Management Vol. 1(2), pp. 10 - 24, March, 2013
Sky Journal of Business Administration and Management Vol. 1(2), pp. 10 - 24, March, 2013
Lecture 24: Game Theory � c 2009 Je⁄rey A. Miron
Downloaded from Iran library: (www.libdl.ir) | Sponsored by Tehran Business School (www.tbs.ir)
Downloaded from Iran library: (www.libdl.ir) | Sponsored by Tehran Business School (www.tbs.ir)
Downloaded from Iran library: (www.libdl.ir) | Sponsored by Tehran Business School (www.tbs.ir)
Downloaded from Iran library: (www.libdl.ir) | Sponsored by Tehran Business School (www.tbs.ir)
Hindawi Publishing Corporation
Hindawi Publishing Corporation
A Multi-Layer Software-Based Fault-Tolerance
which are able to handle temporary and permanent hardware faults
which are able to handle temporary and permanent hardware faults
which prevent sets of concurrent processes from completing their tasks
Segmentation It may be necessary to take different audiences into
Using polynomial reductions to test the suitability of metaheuristics for
A Formal Method for Parallel Genetic Algorithms Abstract We present
A Formal Method for Parallel Genetic Algorithms Abstract We present
Using polynomial reductions to test the suitability of metaheuristics for
it is necessary to highlight some items and to validate
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 424 #32
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 424 #32
Using AHP and the IPMA Competence Baseline in the project
s Day begins in the third century with an oppressive
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 404 #12
Automation Consulting Services As they had been doing twice a
data analysis Input data included diagrams and planswhich are showing
k-A NONYMITY AGGARWAL, FEDER, KENTHAPADI, MOTWANI, PANIGRAHY, THOMAS, ZHU
data analysis Input data included diagrams and planswhich are showing
data analysis Input data included diagrams and planswhich are showing
data analysis Input data included diagrams and planswhich are showing
10 Eduard Gabriel B az avan, Fuxin Li, and Cristian Sminchisescu
Fourier Kernel Learning 11
3.مدیریت
Chemometrics: Data Analysis for the Laboratory and Chemical Plant.
2434 IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, VOL. 51, NO. 4, APRIL 2013
2434 IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, VOL. 51, NO. 4, APRIL 2013
2434 IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, VOL. 51, NO. 4, APRIL 2013
2434 IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, VOL. 51, NO. 4, APRIL 2013
AminiNasab
Mirella Monsante & Mary Sobeck
A distributed general-purpose computing system that
A distributed general-purpose computing system that
61 Another possible procedure for selecting the training set is
Globecom 2012 - Ad Hoc and Sensor Networking Symposium
Men buy most of the millions of boxes of candy
Intratumor heterogeneity in human glioblastoma
3 The Preparation of Buffers at Desired pH
organising maps Another possible procedure for selecting the training set
organising maps Another possible procedure for selecting the training set
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 1, FEBRUARY 2003 17
Chord: A Scalable Peer-to-peer Lookup Protocol
Chord: A Scalable Peer-to-peer Lookup Service for Internet
Chord: A Scalable Peer-to-peer Lookup Protocol
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
Expert Systems with Applications 40 (2013) 4749–4759
Author's personal copy
Chord: A Scalable Peer-to-peer Lookup Protocol
Chord: A Scalable Peer-to-peer Lookup Protocol
Chord: A Scalable Peer-to-peer Lookup Protocol
8
8
M. Yazdani, F. Jolai / Journal of Computational Design and Engineering 3 (2016) 24–36 25
M. Yazdani, F. Jolai / Journal of Computational Design and Engineering 3 (2016) 24–36 25
Edited with the trial version of
276 Chapter 10 Project Financing and Noneconomic Attributes
The land art project at Copenhagen gave us a novel
47228-1
47228-2
Downloaded by http://iranpaper.ir ﺏﺎﺘﮐ ﻭ ﻪﻟﺎﻘﻣ ﻥﺎﮕﯾﺍﺭ ﺩﻮﻠﻧﺍﺩ ﻪﻧﺎﻣﺎﺳ
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
Journal of Hydrology 515 (2014) 139–146
E1C08 09/14/2010 14:53:56 Page 321
from time to time a shout of—* Swine ! ' or ' Liar ! ' The
doggedly undertaken, without unreasonable hope, and
The ROC curve is a graphical plot of sensitivity and
Part II Platform Architecting and Design
Part II Platform Architecting and Design
Part II Platform Architecting and Design
Part II Platform Architecting and Design
Part II Platform Architecting and Design
Part II Platform Architecting and Design
Managing Project Risk Change management Required for successful system building
Managing Project Risk Change management Required for successful system building
Part II Platform Architecting and Design
One of the largest markets to utilize advertising in general
on his own personal behalf as the Managing Director of
Wireless Pers Commun (2012) 63:871–894
REVIEW
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
As it has become the norm for cloud providers to
1
2015 IEEE International Conference on Computer Vision
This topic has been studied in the computer vision literature
Applying Data Mining
Cost Accounting
Chapter 6
49895-1
49895-2
106
19
Algorithm 1 The Future-Demand-Friendly Heuristic at Time
(h) I(J) = 1,
Chapter 8
Chapter 4
Chapter 8
Chapter 4
فناوری
Chapter 8
Mining
(w)
(h) I(J) = 1,
European Journal of Operational Research 234 (2014) 37–48
Vision Research 47 (2007) 1362–1367
Algorithm 1 The Future-Demand-Friendly Heuristic at Time
Discussion The triads of stimuli tested in the present experiments
(h) I(J) = 1,
ARTICLE IN PRESS
2013 IEEE 13th International Conference on Data Mining Workshops 2013 IEEE 13th International Conference on Data Mining Workshops
IEE E TRAN S A CTIONS ON POWER S YST E M S , VOL. 30, NO. 4, J U L Y 20 15 173 9
IEE E TRAN S A CTIONS ON POWER S YST E M S , VOL. 30, NO. 4, J U L Y 20 15 173 9
Comparing Performance of PSO and MPSO Techniques for ECG Signal
Comparing Performance of PSO and MPSO Techniques for ECG Signal
1
Chapter 2
My Bright Future
Top performers understand the importance of practicing the art of
TASTEE: Lethal Tactics
using simulation methods. The selection of the most suitable design (based on AHP) is employed to
*
SpringerUndergraduateTexts
SpringerUndergraduateTexts
Game theory approach for modeling competition over
Introducing the Market Research Analysis Application
Introducing the Market Research Analysis Application
Choice Modeling
Mining
Downloaded form http://iranpaper.ir
Downloaded form http://iranpaper.ir
Truly monumental public buildings not only distinguish each known city
Self-assembly directed by NH��� O hydrogen bonding:
ChamanMotlagh
ARTICLE IN PRESS
ARTICLE IN PRESS
increase the business requirement changes that have encouraged companies tomake
Petri nets for Situation Recognition Örebro Studies in Technology 44
A multi-phase approach for supply chain
Mining
Efficient Compilation of Fine-Grained SPMD-threaded
As you might know your pasteurizer was built by FES and we sold it second hand to you as it was installed. Nowadays we
Mining
Technical Report Documentation Page
Author's Accepted Manuscript
2 Using Sets
Expert Systems With Applications 50 (2016) 75–88
DRAFT! © April 1, 2009 Cambridge University Press. Feedback welcome. 1
1
2
DRAFT! © April 1, 2009 Cambridge University Press. Feedback welcome. 1
3
Ullman ii This book evolved from material developed over several
Dileep: “44206_c000” — 2007/9/20 — 14:44 — pagei—#1 Dileep: “44206_c000” — 2007/9/20 — 14:44 — page ii — #2 Dileep: “44206_c000” — 2007/9/20 — 14:44 — page iii — #3 Dileep: “44206_c000” — 2007/9/20 — 14:44 — page iv — #4 Table of Contents
Multi-EvidenceLiftedMessagePassing,
It is important to note that the domain of each
402
Search on Encrypted Data 415
Cell values of raster datasets associatedwith these criteria are extracted
and orthogonal CDMA all have the same theoretical capacity in
It should be noted that uplink OFDMA is considerably more
1 Multiuser Diversity The main motivation for adaptive subcarrier allocation
4
5
Talanta 137 (2015) 120–129
Talanta 137 (2015) 120–129
structures are connected to the grounding system in accordance with
structures are connected to the grounding system in accordance with
Surplus Fair Scheduling: A Proportional-Share CPU Scheduling Algorithm for
Surplus Fair Scheduling: A Proportional-Share CPU Scheduling Algorithm for
Surplus F air S c heduling: A P r opor ti onal-Share C PU Sc heduling A lgorithm for
m a in [4 , 6 , 2 2 , 26 ] a ssociate a n intr insic r a te w ith each G P S , w h ile B V T is a der i v a ti v e of S F Q w ith an addi-
m ain [4 , 6 , 2 2 , 26 ] associate an intr insic r ate w ith each G P S , w h ile B V T is a der i v ati v e of S F Q w ith an addi-
2.5e+06 2.5e+06
University of Windsor
University of Windsor
KODAI MATH. SEM. REP.
www.comsoc.org/pubs/ surveys
University of Windsor
CDN performance in large-scale video-on-demand
A
A
T. Wang et al.: Rethinking the Data Center Networking
T. Wang et al.: Rethinking the Data Center Networking
Quantitative Methods in Supply Chain
Mining
REVIEW
Partition of a network in to different isolated regions can
efficiency fuzzy Data Envelopment Analysis technique for performance evaluation of
Chapter 4
5 Vector spaces and signal space
Proceedings of the 14th IFAC Symposium on
Mythili S et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.1, January- 2014, pg. 334-340
International Journal of Engineering & Technology IJET-IJENS Vol: 11 No: 01 24
International Journal of Engineering & Technology IJET-IJENS Vol: 11 No: 01 24
ScientiaIranicaA(2013)20(2),278–285
The target was to give shape to the brand concept
ScientiaIranicaA(2013)20(2),278–285
ScientiaIranicaA(2013)20(2),278–285
Graph Pattern Matching Revised for Social Network Analysis
2 Association Rules and Sequential Patterns
2 Association Rules and Sequential Patterns
11 Opinion Mining and Sentiment Analysis
It's your choice!
It's your choice!
BetweennessCentralityonGPUsandHeterogeneous
Mining
72 Chapter 3
Academic Press is an imprint of Elsevier
A malicious node can perform packetdropping by itself or by
8� 8� 2 = 128. Also, the total number of TSVs,jTj, is equal
Influence Maximization on Multi-Phased Multi-Layered Network
2010 2nd International Conference on Mechanical and Electronics Engineering (ICMEE 2010)
دستورالعمل طراحی سنسورهای حرارتی کابلی
Teacher Training Models for the Jena Plan
340 PHYLOGENETIC ANALYSIS
340 PHYLOGENETIC ANALYSIS
Cytotoxicity assay The method was carried out with a dilution
BRIAN TR AC Y 'S
From the Proceedings of the 2000 International Conference on Supercomputing, Santa Fe, N.M., May, 2000.
From the Proceedings of the 2000 International Conference on Supercomputing, Santa Fe, N.M., May, 2000.
International Journal of Advanced Research in
Case 1-2 Ackoff’s Management
Page 1 of 38
Page 1 of 38
the depth of tissue structures is determined by directly measuring
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 3, January 2012
Guidelines for Conducting a Focus Group
Energy Conversion and Management 105 (2015) 1046–1058
Energy Conversion and Management 105 (2015) 1046–1058
Int. J. Production Economics 152 (2014) 9–28
3 Coordination Algorithms
Mars Medical Challenge Asks Students to Design 3D Printable Items to Keep Astronauts Healthy on Mars
Ansari Lari and Golroo 1
We demonstrate the model by the example of finding a
Ansari Lari and Golroo 1
Available online at www.sciencedirect.com
2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN)
26
CHAPTER 2
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013
Recitation: Rehearsing Wireless Packet
Recitation: Rehearsing Wireless Packet
the project team should convene to develop an abstract model
European Journal of Operational Research 257 (2017) 1–12
EuropeanJournal ofOperational Research245 (2015) 645–655
4.6 Non-minutiae Feature-Based Matching Techniques 217
218 4 Fingerprint Matching
Ansari Lari and Golroo 1
1
EuropeanJournal ofOperational Research245 (2015) 645–655
European Journal of Operational Research 257 (2017) 1–12
Pers Ubiquit Comput
Design and Evaluation of Learning Algorithms for
Available online at www.sciencedirect.com
Pers Ubiquit Comput
Pers Ubiquit Comput
IEEE TRANSACTIONS ON
Pers Ubiquit Comput
it is often necessary to make the pins of several
it is often necessary to make the pins of several
63111
Pers Ubiquit Comput
www.ietdl.org
Width andheight of the image represent the spatial distribution of
Width andheight of the image represent the spatial distribution of
Int. J. Manag. Bus. Res., 4 (2), 73-80, Spring 2014
Pers Ubiquit Comput
Downloaded from http://iranpaper.ir
cut algorithm for the strong minimum energy topology in wireless
Downloaded from http://nar.oxfordjournals.org/ at Amirkabir University of Technology on December 11, 2016
This article was downloaded by: [McMaster University]
This article was downloaded by: [McMaster University]
Applied Mathematical Modelling 37 (2013) 5864–5875
EuropeanJournal ofOperational Research250 (2016)239–250
Expert Systems With Applications 57 (2016) 1–11
Optimization of Collective Communication Operations in MPICH
FUNCTIONAL-BASED AND ACTIVITY-BASED COST
PART 2 PORTFOLIO ANALYSIS
8
2.1. Subjects
8
·
Convergence of Probability Measures WILEY SERIES IN PROBABILITY AND STATISTICS
This article was downloaded by: [Florida Atlantic University]
Convergence of Probability Measures WILEY SERIES IN PROBABILITY AND STATISTICS
148 S. Krile
148 S. Krile
Exploring Large-Scale Peer-to-Peer Live Streaming
A Bayesian Ensemble Regression Framework on the Angry Birds Game
A Bayesian Ensemble Regression Framework on the Angry Birds Game
This chapter presents the logical structure of neoclassical theory in
Conformity-aware influence maximization in online social
Conformity-aware influence maximization in online social
Conformity-aware influence maximization in online social
JID:FSS AID:7111 /FLA [m3SC+; v1.237; Prn:27/10/2016; 15:30] P.1 (1-30)
6 Rough Sets
6.2 Heuristic solution methods for the workforce assignment problem 149
Available online at www.sciencedirect.com
with a central mainframe supporting a number of directly connected
The analyses presented in Chapter 21 provide broad coverage of
The analyses presented in Chapter 21 provide broad coverage of
The analyses presented in Chapter 21 provide broad coverage of
1.1 Problem Definition
is normally regarded as an important solution for detecting various
A Bayesian Ensemble Regression Framework on the Angry Birds Game
Expert Systems with Applications 38 (2011) 12565–12568
Academic Press is an imprint of Elsevier
118 CHAPTER 4 Feature Selection
118 CHAPTER 4 Feature Selection
P1: ABC/ABC P2: c/d QC: e/f T1: g
CRC: Protected LRU Algorithm
INVITED
3 structure of the thesis This work is structured as
EqHaz: An Open-Source Probabilistic
2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE), October 18-19, 2012
2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE), October 18-19, 2012
1 Modeling of the Resource Allocation in Cloud Computing Datacenters
and owing to the fact that 90 percent of Iranis
is given where the vertex set I is made of
The proposed model in the previous part determines location and
The proposed model in the previous part determines location and
The proposed model in the previous part determines location and
The proposed model in the previous part determines location and
The proposed model in the previous part determines location and
The proposed model in the previous part determines location and
and owing to the fact that 90 percent of Iranis
BUSINESS INSIDER 9 FEB 2017 Everyone responds to exercise differently
Expert Systems With Applications 57 (2016) 1–11
Downloaded from http://iranpaper.ir
International Journal of Computer Science & Information Technology (IJCSIT) Vol 4, No 1, Feb 2012
1
As certified standards FQML used three commercial standards from African
journal of information security and applications 24-25 (2015) 25–40
International Journal of Computer Science & Information Technology (IJCSIT) Vol 4, No 1, Feb 2012
1. Introduction
A Combined Inventory Routing and Game Theory Approach for a Real-World
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Michelettietal.JournalofMathematicsinIndustry (2016) 6:12
Int. J. Production Economics 167 (2015) 271–281
REVIEWS
REVIEWS
Available online at www.sciencedirect.com
4.3 Mixed strategy Nash equilibrium 113
4.5 Pure equilibria when randomization is allowed 119
SNNAP: Approximate Computing
Telecommun Syst (2013) 52:2163–2176
SEQUENTIAL ASSOCIATION INDICES AS DEPENDENT VARIABLES IN GROUP DESIGNS In
Chapter 6
4698 L. García-Hernández et al./Expert Systems with Applications 42 (2015) 4697–4708
4698 L. García-Hernández et al./Expert Systems with Applications 42 (2015) 4697–4708
11551 A particle swarm optimization algorithm for open vehicle routing
11551 A particle swarm optimization algorithm for open vehicle routing
8.4.3 An Example Analysis: Danish Poultry Farming
STAFF TRAINING
STAFF TRAINING
STAFF TRAINING
Workload Assessment
Workload Assessment
How to brainstorm using a Lotus Blossom map
G Model
Multi-version Scheduling
AIChE Journal Page 10 of 77
Page 11 of 77 AIChE Journal
AIChE Journal Page 18 of 77
Page 23 of 77 AIChE Journal
Page 27 of 77 AIChE Journal
AIChE Journal Page 28 of 77
Executing dynamic data-graph computations
CuckooFilter: PracticallyBetterThanBloom
204 CHEMOMETRICS
Maintenance of cooperative behavior among selfish individuals in biological and
1
Parallel Computing 37 (2011) 230–243
Configuration operations In order to facilitate data exchange between the
Configuration operations In order to facilitate data exchange between the
GLIOMAS are the brain tumors with the highest mortality rate
INT J COMPUT COMMUN, ISSN 1841-9836
4.7. DECAYING WINDOWS 157
the tree construction and link scheduling are disjoint steps in
درﻛﻠﻣﻋ يرﯾﮔ هزادﻧا يﺎﮭﺷور
Chapter6
Online Social Networks and Media 1 (2017) 33–43
Algorithms for Image
CHAPTER
1920
Applied Mathematics, 2016, 7, 440-455
Expert Systems With Applications 73 (2017) 145–160
Expert Systems With Applications 73 (2017) 145–160
Joint Venture Agreement between Niroo Research Institute and SkyWind GmbH DATE: May XX, 2017
Engineering Applications of Artificial Intelligence 58 (2017) 111–122
http://tarjomebazar.com
Clustering is concerned with grouping objects together that are similar
Pulse metal detectors are powerful and versatile machines but in
Merging simply traverses all the lists in synchronization to check
Merging simply traverses all the lists in synchronization to check
Merging simply traverses all the lists in synchronization to check
Merging simply traverses all the lists in synchronization to check
annihilation coincidence detection is used in lieu of absorptive collimation
Appendices 151
A Smart Platform for Large-Scale
مدل ریاضی ارزش زمانی در تجارت الکترونیک
bs_bs_banner
Procedia
·
Expert Systems With Applications 64 (2016) 36–55
5 Maintenance Reserve Cash Flow Forecasting Similar to a maintenance
The Analytic Hierarchy Process
www.active2010.ca
J Ind Eng Int
142 CHAPTER 6. OPTICAL ACCESS AND BROADCAST NETWORKS
2. OPERATIONA
Development of an Intelligent Decision Support System for an hierarchical
Downloaded from http://iranpaper.ir
Evolutionary prisoner’s dilemma game on hierarchical lattices
Human Resource Management
CrossFit Basics
Chapter 6
Introduction
Conjoint Analysis in Consumer Research:
European Journal of Operational Research 254 (2016) 169–178
whereas low cation content may result in unacceptably large zones
Each one of your 4 friends has to fill up
Each one of your 4 friends has to fill up
Each one of your 4 friends has to fill up
Each one of your 4 friends has to fill up
Chapter 2
RESPONSEOPTIMIZATIONOF SEEDLING VIGOR TRAITS TO OVERCOME PREDICAMENTS IN SEED RESEARCHES
Vol. 8, No. 5 | 1 May 2017 | BIOMEDICAL OPTICS EXPRESS 2732
Vol. 8, No. 5 | 1 May 2017 | BIOMEDICAL OPTICS EXPRESS 2732
Objectdetectionviaamulti-region&semanticsegmentation-awareCNNmodel
Chapter6. Particle SwarmOptimizationBasedSchedulingHeuristic
2014 IEEE International Congress on Big Data 2014 IEEE International Congress on Big Data 2014 IEEE International Congress on Big Data 2014 IEEE International Congress on Big Data
Contextual Slip and Prediction of Student Performance
Regularization of Neural Networks using DropConnect
Regularization of Neural Networks using DropConnect
Determine all routes between the source and destination nodes and
Determine all routes between the source and destination nodes and
An American National Standard
An American National Standard
Large-Scale Frequent Subgraph Mining in
sheet and request relay types and we are happy to
Chapter 2
JOURNAL OF COMMUNICATIONS AND INFORMATION SYSTEMS, VOL. 1, NO. 27, APRIL 2012 15
JOURNAL OF COMMUNICATIONS AND INFORMATION SYSTEMS, VOL. 1, NO. 27, APRIL 2012 15
528
re swooping in to deliver packages or spotting victims in
re swooping in to deliver packages or spotting victims in
2 Beta Network 4 Miscellaneous considerations 5 Optimization and performance
2 Beta Network 4 Miscellaneous considerations 5 Optimization and performance
PervasiveandMobileComputing4(2008)658–680
http://www.dl-book.ir/
http://www.dl-book.ir/
UseR!
Available online at www.sciencedirect.com
tered images. If the 6, and 6, (standard deviations of
2002
on the algorithm performance as measured by the AUC and
but it could be inferred from results that it is
Background The approach taken was influenced by the work of
Linear Model of Production in a Classical
Linear Model of Production in a Classical
Homeland Security & Emergency Management 2014; 11(2): 217–241
The Impact of Natural Disasters on Critical
Int J Syst Assur Eng Manag
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Emergency Response Plans
Journal of Parallel and Distributed Computing 62, 1338–1361 (2002)
Journal of Parallel and Distributed Computing 62, 1338–1361 (2002)
Journal of Parallel and Distributed Computing 61, 810�837 (2001)
Knowledge-Based Systems 46 (2013) 1–11
Related content
invasive behavior of weed in search for resources and appropriate
based modeling has proven effective in increasing the understanding of
ARTICLE IN PRESS
ARTICLE IN PRESS
3. EMPIRICAL OBSERVATION
PervasiveandMobileComputing4(2008)658–680
planning problem for tourists interested in visiting multiple points of
planning problem for tourists interested in visiting multiple points of
level language policy in the implementation of dual language bilingual
Networking Fundamentals
Distributed argumentative model for Group Decision Making processes Up to
PervasiveandMobileComputing4(2008)658–680
Accepted Manuscript
Accepted Manuscript
Ef cient Aggregation for Graph Summarization
Game Theory and Economic Modelling
Now imagine that A plays this game against not a
Chapter 1
Film Analysis 189
CHAPTER 3
CHAPTER 3
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 5 7 6 1 0 8 7 4
IUI 2017 • Interactive Machine Learning and Explanation March 13–16, 2017, Limassol, Cyprus
136 Public Transport Planning with Smart Card Data
Discover the unseen UniSee Videowall Overview With the UniSeeTM family
AMO - Advanced Modeling and Optimization, Volume 5, Number 1, 2003
AMO - Advanced Modeling and Optimization, Volume 5, Number 1, 2003
we will have to think about what might happen over
AMO - Advanced Modeling and Optimization, Volume 5, Number 1, 2003
SPRINGER BRIEFS IN OPERATIONS RESEARCH
5.2. EXAMPLE: BEAUTY CONTEST 69
Edited at https://subtitletools.com
Global Franchise Store Operations Manual
International Series in
DESIGN AND CONTROL OF A SMART BED FOR
I think there were a number of reasons we all immediately fell in love with
215 Catitude is a really difficult thing to try to describe—even I have trouble
“Carrying my heart.”
“Carrying my heart.”
“Carrying my heart.”
I think there were a number of reasons we all immediately fell in love with
215 Catitude is a really difficult thing to try to describe—even I have trouble
This meditation is called affectionate breathing and take about 20
This meditation is called affectionate breathing and take about 20
This meditation is called affectionate breathing and take about 20
I think there were a number of reasons we all immediately fell in love with
215 Catitude is a really difficult thing to try to describe—even I have trouble
دانش۳۵
implement and document the processes and procedures required to achieve
Dearest Est,
story and love alive and growing through so many. It is natural and obvious
دانش۳۶
Downloaded from http://iranpaper.ir
Motivation The main objective of our work is to add
Information Processing Letters 115 (2015) 368–370
chapter 18
Network Anomaly Detection
Network Anomaly Detection
is entered into amongst the following individuals constituting all of
Deep Convolutional Neural Networks
Deep Convolutional Neural Networks
Deep Convolutional Neural Networks
Deep Convolutional Neural Networks
Object space versus world space Every object in Maya has
Object space versus world space Every object in Maya has
Proceedings of the ASME 2017 International Design Engineering Technical Conferences and
was established in 2003 whit the aim of producing herbal
Motivation The main objective of our work is to add
• To identify which features may be relevant to a
PROBABILITY AND RANDOM VARIABLES
PROBABILITY AND RANDOM VARIABLES
Accepted Manuscript
ACCEPTED MANUSCRIPT
Computers & Operations Research 40 (2013) 856–866
DISTANCE Variation of appropriate distance relative to the size of the athlete
Highlights
for using Factor Analysis acceptably (Table 4). KMO is
for using Factor Analysis acceptably (Table 4). KMO is
3 System Dynamics
3 System Dynamics
3 System Dynamics
3 System Dynamics
3 System Dynamics
Knowledge-Based Systems 32 (2012) 116–122
C H A P T E R 1 8
هکبش لرتنك یاه هناماس :یشهوژپ هورگ ود :شیاریو CTMS08/02 :شرازگ دك
هکبش لرتنك یاه هناماس :یشهوژپ هورگ ود :شیاریو CTMS08/02 :شرازگ دك
پردازش تصویر
is the statisticalmethod of partitioning data set into subsets such
Journal of Modern Education Review, ISSN 2155-7993, USA
Chapter4
Chapter4
Chapter4
Chapter4
s a survey to assess your beliefs regarding sex and
Cross-Site Virtual
MICROBIOLOGICAL AIR AND SURFACE MONITORING An effective air and surface
MICROBIOLOGICAL AIR AND SURFACE MONITORING An effective air and surface
MICROBIOLOGICAL AIR AND SURFACE MONITORING An effective air and surface
MICROBIOLOGICAL AIR AND SURFACE MONITORING An effective air and surface
Computers and Electrical Engineering 67 (2018) 96–113
Accepted Manuscript
576 Chapter 8 GRAPH THEORY
596 Chapter 22 Exploring Concepts of Probability
C h a p te R
Spark: ClusterComputingwithWorkingSets
49.1 : Fault Tolerance Techniques for Wireless Ad Hoc Sensor Networks
CHAPTER NINE
BUILDING THE TOOLS
thus requires no buffering. Although Eclipse++ only uses buffered
Technique Description
navidi8
2858 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 60, NO. 5, MAY 2014
2860 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 60, NO. 5, MAY 2014
2862 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 60, NO. 5, MAY 2014
and the total sample size was 4675 people with the
Line segments show confidence interval of the rate of breast
Fog Deployment Types How fog software and fog systems are
Technical Commentary/
HPC versus HTC differences ANSWER: HTC = High Throughput Computing
Process Identification Things which matter most must never be at
Electrical Power and Energy Systems 55 (2014) 108–115
2014 IEEE International Conference on Services Computing
2014 IEEE International Conference on Services Computing
If you're reading this you're probably one of two types of people:
Wireless Networks
Methodology of the
and the social sciences have contributed to a dramatic expansion
and the social sciences have contributed to a dramatic expansion
and the social sciences have contributed to a dramatic expansion
Accepted Manuscript
TM
Robust, clearly reported clinical practice guidelines (CPGs) are essential for evidence-based
both of the real world in which we live and
both of the real world in which we live and
our development has been heavily based on a pipeline implementation
each ant tours through nodes on the network one after
Answer Explanations
CONTENTS
CONTENTS
mpi This is a parallel program using MPI to calculate
mpi This is a parallel program using MPI to calculate
J.ParallelDistrib. Comput. 73(2013)52–61
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSTE.2019.2943553, IEEE
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSTE.2019.2943553, IEEE
Sentence-Based Tasks 183
Sentence-Based Tasks 191
as well as the capacity cost induced by the number
A thermocouple consists of two wires made of dissimilar metals
ActivityNet: ALarge-ScaleVideoBenchmarkforHumanActivity
Probabilistic Linear Discriminant Analysis
ActivityNet: ALarge-ScaleVideoBenchmarkforHumanActivity
Probabilistic Linear Discriminant Analysis
ActivityNet: ALarge-ScaleVideoBenchmarkforHumanActivity
Probabilistic Linear Discriminant Analysis
Downloaded from http://iranpaper.ir
Probabilistic Linear Discriminant Analysis
M14_CHOP0203_06_SE_C14.indd Page 420 26/09/14 11:44 AM f-447 /203/AW00176/9780133800203_CHOPRA/CHOPRA_SUPPLY_CHAN_MANAGEMENT06_SE_978013380020 ...
When you connect a wire element between the positive and
Expert Systems With Applications 150 (2020) 113345
2018 International Conference on Field-Programmable Logic and Applications
Annals of Nuclear Energy 29 (2002) 41–51
Journal Pre-proof
Web-based supplementary material forAnadaptivespatio-
1 Introduction
Journal Pre-proof
پنتاگرام - مقاله رشته گرافیک
Journal Pre-proof
Abstract Vaccination has been proven to be the most effective
Available online at www.sciencedirect.com
1. Introduction
vertex cover problem
vertex cover problem
Available online at
budget
budget
Proceedings of the 2008 Winter Simulation Conference
ریاضی و کامپیوتر
8 NETWORK OPTIMIZATION PROBLEMS WITH SIDE CONSTRAINTS All the network
Journal Pre-proof
Journal Pre-proof
Journal Pre-proof
The Fourteenth IEEE International Conference on e-Business Engineering
AcceptedManuscript
Adv Syst Sci Appl 2018; 02; 63-83
Journal Pre-proof
Journal Pre-proof
IMPORTANCE Migraineisthesecondleadingcauseofdisabilityworldwide.Mostpatientswith
IMPORTANCE Migraineisthesecondleadingcauseofdisabilityworldwide.Mostpatientswith
14
Annex to ED Decision 2020/024/R
۸۲۱ t
SecureDataAggregationinWirelessSensorNetworks: ASurvey
www.nature.com/scientificreports
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JSAC.2019.2904348, IEEE Journal
Parametric Design Process of Facade Elements with
Parametric Design Process of Facade Elements with
Highway Capacity Manual: A Guide for Multimodal Mobility Analysis
Mining
Establishing Pairwise Keys in Distributed
Information and Computation 146, 1�23 (1998)
H6746-Ch12.qxd 8/3/05 4:28 PM Page 304
CH APTER
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/LWC.2020.2994643, IEEE Wireless
CH APTER
Received November 26, 2020, accepted January 8, 2021, date of publication March 8, 2021, date of current version March 19, 2021.
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, VOL. 29, NO. 2, MARCH 2021 731
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, VOL. 29, NO. 2, MARCH 2021 731
May 29, 2019 ForecastingMarketStates_v3.2
May 29, 2019 ForecastingMarketStates_v3.2
FL-YOUTH/02
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 22, NO. 7, JULY 2021 4519
10 Most Popular Valentine’s Day
چگونه در تمام طول سال مانند یک حرفه ای انگلیسی تدریس کنیم
we introduce some example problems and systems from multiple disciplines
we introduce some example problems and systems from multiple disciplines
we introduce some example problems and systems from multiple disciplines
The Incidence Matrix and its Applications After studying adjacency and
The Incidence Matrix and its ApplicationsAfter studying adjacency and
we introduce some example problems and systems from multiple disciplines
23 MinimumSpanningTrees
23 MinimumSpanningTrees
23 MinimumSpanningTrees
23 MinimumSpanningTrees
23 MinimumSpanningTrees
This section is dedicated to introducing in detail the proposed
Downloaded from https://iranpaper.ir
Int. J. Fuzzy Syst. (2022) 24(3):1653–1668
Int. J. Fuzzy Syst. (2022) 24(3):1653–1668
Int. J. Fuzzy Syst. (2022) 24(3):1653–1668
Int. J. Fuzzy Syst. (2022) 24(3):1653–1668
AssignMEnT MATERiAl 199
Downloaded from https://iranpaper.ir
502 Chapter 11 Probability
ASSignment mA teriAl 689
SoftComputing(2023)27:12883–12893
Exploring Engineering Exploring Engineering