iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ Rule
جزئیات خدمات ترجمه در ترجمه تخصصی
data
offerings
offerings
offerings
majority
Association Rule Hiding
Discovery of Policy Anomalies
1
124 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 1, JANUARY 2014
FutureGenerationComputerSystems30(2014)116–126
Descartes' rule of signs - Wikipedia, the free encyclopedia http://en.wikipedia.org/wiki/Descartes'_rule_of_signs
10/12/2012
Scalable Packet Classification
The Second International Conference on Emerging Security Information, Systems and Technologies The Second International Conference on Emerging Security Information, Systems and Technologies
Three Fundamental Laws Of Success in Financial Management
to extend and amend principles that arise in other types
to extend and amend principles that arise in other types
Firewall Policy Modeling, Analysis and
Firewall Policy Modeling, Analysis and
Global Information Assurance Certification Paper
Firewall Policies Management: A Survey Paper
1 Introduction The launch weather guidelines involving the SpaceShuttle and
1 Introduction The launch weather guidelines involving the SpaceShuttle and
1 Introduction The launch weather guidelines involving the SpaceShuttle and
Back End System The cron daemon is a long running
Back End System The cron daemon is a long running
The International Criminal Court (ICC), governed by the Rome Statute, is the first permanent, treaty based,
Rationality in Policy Decision Making 163
9049 Contents lists available at ScienceDirect Expert Systems with Applications
9049 Contents lists available at ScienceDirect Expert Systems with Applications
High-Performance Packet Classification on GPU
High-Performance Packet Classification on GPU
High-Performance Packet Classification on GPU
Joye, Yannick; Cognitive and Evolutionary Speculations for Biomorphic Architecture; Leonardo
35th Annual International Conference of the IEEE EMBS
Hadley v Baxendale
Hadley v Baxendale
Hadley v Baxendale
Hadley v Baxendale
Hadley v Baxendale
Downloaded from Downloaded from Downloaded from Downloaded from Downloaded from
G Model
G Model
Brain Inspired Reinforcement Learning
Fluid Phase Equilibria 239 (2006) 188–199
\\jciprod01\productn\C\CIN\44-1\CIN102.txt unknown Seq: 1 25-FEB-11 10:25
\\jciprod01\productn\C\CIN\44-1\CIN102.txt unknown Seq: 1 25-FEB-11 10:25
1
1
Algorithms for Packet Classification
ی س یل گنا ی سرا ف ی س یل گنا ی سرا ف
ی س یل گنا ی سرا ف ی س یل گنا ی سرا ف
The support of an association rule indicates howfrequently that rule
Abortion and the Golden Rule
Frequent Absence and Presence Itemset
Fundamental Geometrical
Applied Soft Computing 13 (2013) 3422–3428
Pointed towers and turrets of country cottages in the abundance
Fundamental Geometrical
Overview
A Substitution Permutation Network Design Using Cellular Automata For Cipher Systems
ISSN 2039-2117 (online) Mediterranean Journal of Social Sciences Vol 6 No 2 S1
Fuzzification is closely related to knowledge because the membership functions
Expert Systems with Applications 42 (2015) 3980–3990
Heart and vein diseases are one of the most important
BioSystems 114 (2013) 219– 226
Data & Knowledge Engineering 70 (2011) 732–752
738 N. Prat et al. / Data & Knowledge Engineering 70 (2011) 732–752
N. Prat et al. / Data & Knowledge Engineering 70 (2011) 732–752 739
N. Prat et al. / Data & Knowledge Engineering 70 (2011) 732–752 741
we tackle the issue of conflict resolution by applying the
\\jciprod01\productn\C\CIN\44-1\CIN102.txt unknown Seq: 1 25-FEB-11 10:25
5. AN ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEM
5. AN ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEM
Machine Learning,
Machine Learning,
to of
to of
INCON13-IT-018
International Journal of Soft Computing and Engineering (IJSCE)
International Journal of Soft Computing and Engineering (IJSCE)
International Journal of Soft Computing and Engineering (IJSCE)
Journal of Accounting and Economics 59 (2015) 284–299
Journal of Mathematical Behavior 32 (2013) 577– 592
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 416 #24
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 417 #25
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 418 #26
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 426 #34
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 429 #37
ScientiaIranicaE(2013)20(3),879–899
156 4 Catalyst Characterization
ESWA 9504 No. of Pages 15, Model 5G
Using an improved rule match algorithm in an expert system to detect broken driving
MIT LCS Technical Memo: MIT-LCS-TM-637
Procedia
Procedia
Procedia
Expert Systems With Applications 50 (2016) 75–88
Open Source Security Information Management
IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 19, NO. 4, AUGUST 2011 717
Expert Systems with Applications 42 (2015) 7549–7559
2 Association Rules and Sequential Patterns
2 Association Rules and Sequential Patterns
Applied Mechanics and Materials Vols 284-287 (2013) pp 2380-2384 Online: 2013-01-25
Applied Mechanics and Materials Vols 284-287 (2013) pp 2380-2384 Online: 2013-01-25
CHAPTER
Machine Learning for Imbalanced Datasets:
METHOD OF COLLECTING EXCHANGE RATES FOR THE
University of Texas at El Paso
University of Texas at El Paso
CHAPTER
46
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Global Journal of Computer Science and Technology
1 SOURCE OF THE KNOWLEDGE The data pyramid discussed in
1 SOURCE OF THE KNOWLEDGE The data pyramid discussed in
Rule 143
1
Pattern Recognition 48 (2015) 50–59
Takagi-Sugeno Fuzzy Modeling for Process Control
443581 ORG20210.1177/1350508412443581Hodson et al.Organization
Information Sciences 351 (2016) 1–17
!Err TRANSACTIONS ON SYSTEMS, MAN. ANI) C’YHT.RNT.TI(‘S, VOI.. 20, NO. 2. MAR(.II/APRII. 1000 419
!Err TRANSACTIONS ON SYSTEMS, MAN. ANI) C’YHT.RNT.TI(‘S, VOI.. 20, NO. 2. MAR(.II/APRII. 1000 419
Discovery of Meaningful Rules in Time Series
journal of information security and applications 24-25 (2015) 25–40
APRON LAYOUT DESIGN AND FLIGHT-TO-GATE ASSIGNMENT AT LANSERIA
Automation in Construction 29 (2013) 183–195
2010
2015 3rd International Conference on Information and Communication Technology (ICoICT)
2015 3rd International Conference on Information and Communication Technology (ICoICT)
which is a survey of multiobjective evolutionary algorithms for data
Original scientific paper UDK: 658.512.2
P1: PCX Printer: Yet To Come
1. Murder is defined as an intentional homicide aggravated by certain base
Received June 5, 2016, accepted June 21, 2016, date of publication June 27, 2016, date of current version July 22, 2016.
A Companion to Business Ethics
utilitarians have devised ingenious methods of placing a price on
Applied Thermal Engineering 110 (2017) 457–468
WATER-SUPPLY OPERATIONS DURING DROUGHT:
University of Chicago Law School
Received June 5, 2016, accepted June 21, 2016, date of publication June 27, 2016, date of current version July 22, 2016.
Effective protection of human rights and fundamental freedoms is
Effective protection of human rights and fundamental freedoms is
4. System design
4. System design
4. System design
4. System design
ve critically exam ined this rule for liv ing and
Computers in Human Behavior 81 (2018) 325e339
Computers in Human Behavior 81 (2018) 325e339
Journal of Energy & Natural Resources Law, 2016
Chapter 35
Introduction to Modeling Cognitive Processes
10 The Morality of the Rule of Law: Lon L. Fuller
10 The Morality of the Rule of Law: Lon L. Fuller
All role based prices View role based price Add new
Chapter 1
The Persian people lived in the banks of the Persian Gulf,