iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ SYSTEMS
جزئیات خدمات ترجمه در ترجمه تخصصی
systems
RFID
systems
power
artifact
[]
lighting
[]
organic
mobile
CUDA
information
information
information
information
system
system
software
security
biometric
consistency
applications
biometric
biometric
biometric
value
system
[]
system
system
work
work
SISP
information
research
research
research
system
advantage
information
intrusion
intrusion
Knowledge
Knowledge
porphyry
companies
litter
litter
biomedical
NGOSS
system
power
information
information
accounting
engineering
systems
systems
engineering
engineering
engineering
–
–
energy
management
management
information
management
innovation
B
communication
automation
automation
مقاله مدیریت سیستمهای پیچیده
3 HighProduction ManufacturingSupport Systems AutomationinProduction Systems AutomatedManufacturingSystems Computerized ManufacturingSupport Systems
مقاله مدیریت سیستمهای اطلاعاتی
Computers in Industry 59 (2008) 647–659
understanding interest groups lobbying and lobbyists in developing democracies
Available online at www.sciencedirect.com
Energy and Buildings 51 (2012) 56–63
Intrusion Detection
INVITED
Int. J. Production Economics ] (]]]]) ]]]–]]]
Int. J. Production Economics ] (]]]]) ]]]–]]]
CHP and CCHP Systems Today
Hickory
Expert Systems with Applications 40 (2013) 3872–3885
Expert Systems with Applications 40 (2013) 3872–3885
FutureGenerationComputerSystems29(2013)1408–1416
Information & Management 51 (2014) 27–42
whose battery and storage let it resume work in seconds
whose battery and storage let it resume work in seconds
FutureGenerationComputerSystems29(2013)1408–1416
With the passage of the Mine Improvement and New Emergency
After the occurrence of numerous worldwide financial scandals, the
ijcrb.webs.com
ijcrb.webs.com
ijcrb.webs.com
ijcrb.webs.com
ijcrb.webs.com
American Journal of Scientific Research
Criteria for measuring and comparing
APPLIED PHYSICS LETTERS 88, 192511 2006
American Journal of Scientific Research
374
custom Basic electronics Hardware design languages Virtual machine emulation Core
custom Basic electronics Hardware design languages Virtual machine emulation Core
custom Basic electronics Hardware design languages Virtual machine emulation Core
This article was downloaded by: [Mohsen Bozorgnasab]
Structure and Infrastructure Engineering
5/13/2014 Evaluation of the Green Egyptian Pyramid
Alexandria Engineering Journal (2012) 51, 293–304
Progress in Organic Coatings 76 (2013) 1642– 1665
As we will see, both interior and exterior routing protocols achieve routing
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
legal systems can be split between civil law and common
The current issue and full text archive of this journal is available at
ESWA 9133 No. of Pages 8, Model 5G
Int J Syst Assur Eng Manag (Apr-June 2010) 1(2):87–95
FALL 2007 VOL.49 NO.1
typically also including passive electrical components and based on printed
Progress in Organic Coatings 76 (2013) 1642– 1665
Chapter3. ModellingandSimulation
Chapter3. ModellingandSimulation
Vol.
Part lll: Key System Applications for
IEC 27000 international standard have been developed to deal withrisk
IEC 27000 international standard have been developed to deal withrisk
Embedded IT Security in Automotive
1. Introduction
1. Introduction
1. Introduction
Embedded IT Security in Automotive
Journal of Social Sciences 8 (1): 74-78, 2012
Chapter3. ModellingandSimulation
بخش 2
1. Introduction
typically also including passive electrical components and based on printed
Design Considerations for Military Data Link Architecture in Enabling Integration
Design Considerations for Military Data Link Architecture in Enabling Integration
Requirements Engineering for Emergent
Requirements Engineering for Emergent
Embedded IT Security in Automotive
1 Overview This chapter addresses river basin planning and management
1 Overview This chapter addresses river basin planning and management
This article was downloaded by: [Mohsen Bozorgnasab]
Structure and Infrastructure Engineering
Structure and Infrastructure Engineering
Structure and Infrastructure Engineering
Structure and Infrastructure Engineering
آزمون تعیین سطح
A Tale of Compatible Twins!
A Tale of Compatible Twins!
Decision Support Systems: A Summary,
Available online at www.sciencedirect.com
THE FOR-UNI BLUEPRINT
International Journal of Economic Sciences and Applied Research 5 (3): 7-32
European Polymer Journal 53 (2014) 118–125
viewpoints
viewpoints
TRANSACTIONS ON SOFTWARE ENGINEERING 1
This specification covers transmission of digitally recorded electrophysiologic waveform data
This specification covers transmission of digitally recorded electrophysiologic waveform data
ETP ASSESSMENT TEMPLATE Please complete the template below providing brief
Solar Energy Utilization 61
L
Building Skin Intelligence a parametric and algorithmic tool for daylighting
Baseband Processing for SDR Many technologies require substantial research and
is a production planning and inventory control system used to
Why Spend More Than You Have to on a System
is a production planning and inventory control system used to
Why Spend More Than You Have to on a System
MRP
Available online at www.sciencedirect.com
security is a domain in which one or more individual
cyber situational awareness alone is insufficient to properly perform network
cyber situational awareness alone is insufficient to properly perform network
cyber situational awareness alone is insufficient to properly perform network
cyber situational awareness alone is insufficient to properly perform network
International Journal of Economic Sciences and Applied Research 5 (3): 7-32
Z Energiewirtsch (2012) 36:135–145
Available online at www.sciencedirect.com
20 IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 36, NO. 1, JANUARY/FEBRUARY 2010
20 IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 36, NO. 1, JANUARY/FEBRUARY 2010
Form Methods Syst Des (2011) 39:47–82
Concepts for Distributed Engine Control
20 IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 36, NO. 1, JANUARY/FEBRUARY 2010
Concepts for Distributed Engine Control
security This chapter outlines two different technology domains that have
Future Work The work of implementing data fusion capabilities in
Business process performance includes the operational efficiency enhancement in various
Business process performance includes the operational efficiency enhancement in various
International Journal of Economic Sciences and Applied Research 5 (3): 7-32
No lesson seems to be so deeply inculcated by the
No lesson seems to be so deeply inculcated by the
Security and Performance Evaluation Platform
CONCLUSIONS Operating systems represent complex interactive softwaresystems that control access
CONCLUSIONS Operating systems represent complex interactive softwaresystems that control access
although even the most heavily alloyed wrought aluminium is still
108 IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 21, NO. 1, JANUARY 2006
International Journal of Accounting Information Systems 14 (2013) 321–348
Intermolecular Potentials of Mixed Systems: Testing
Intermolecular Potentials of Mixed Systems: Testing
Wide-Area Protection and Power System
ARTICLE IN PRESS
6.5. NONLINEAR INSTRUMENTAL VARIABLES
6.8. EMPIRICAL LIKELIHOOD
Available online at www.sciencedirect.com
Megacities Sustainable
1.4 / SECURITY SERVICES 15
1.4 / SECURITY SERVICES 15
Available online at www.sciencedirect.com
Iran Transfo Company Zanjan
Iran Transfo Company Zanjan
این صورت نوشتار برای این دسته از سیستم های آشوبی
Concepts for Distributed Engine Control
Human Factors and Ergonomics in Manufacturing, Vol. 18 (5) 515–524 (2008)
Published online 24 October 2005Climate change and food security
David Smith Abstract In this paper we use the concept
00adBARYAM_29412 9/5/00 7:26 PM Page 1
analog and digital circuits came into use for high level
BINDEXXML 06/22/2012 18:40:24 Page 402 FFIRSXML 06/22/2012 18:37:30 Page 1
analog and digital circuits came into use for high level
analog and digital circuits came into use for high level
BRITISHSTANDARD IrrigationtechniquesÐ Automaticturf irrigationsystemsÐ Part2:Designanddefinitionoftypical technicaltemplates TheEuropeanStandard EN12484-2:2000hasthestatusofa BritishStandard ICS65.060.35
Communications of the Association for Information Systems (Volume13, 2004) 177-195 177
Fuzzy Logic Ap roaches
Ecosystems (2012) 15: 401–415
Payne Martim Carbone Monirul Sharif Wenke Lee School of Computer
i
Research Journal of Finance and Accounting www.iiste.org
Research Journal of Finance and Accounting www.iiste.org
Proceedings of the National Conference on Innovations in Emerging Technology-2011
UKAIS 2009, Oxford , UK
16 CHAPTER 1
16 CHAPTER 1
NASA/TM-2008-215108
NASA/TM-2008-215108
Molecules 2009, 14, 2602-2620; doi:10.3390/molecules14072602
IJB-2872; No. of Pages 8
Electrical Power and Energy Systems 33 (2011) 385–393
DTD 5 ARTICLE IN PRESS
JURCA LAYOUT 5/22/07 12:51 PM Page 108
Development of Prototype Wide-Area Monitoring,
Executing Projects with Multicultural Teams 507
Executing Projects with Multicultural Teams 507
Executing Projects with Multicultural Teams 507
Journal of Strategic Information Systems xxx (2014) xxx–xxx
IX: A Protected Dataplane Operating System for
Expert Systems with Applications 41 (2014) 7653–7670
585
Management Accounting Research 24 (2013) 82– 87
have refocused and intensified interest on risk and the nature
International Journal of Accounting Information Systems 14 (2013) 127–137
Cyber supply chain risk management
www.ccsenet.org/ijbm International Journal of Business and Management Vol. 5, No. 7; July 2010
Evolving fuzzy systems
Research Journal of Finance and Accounting www.iiste.org
DTD 5 ARTICLE IN PRESS
538 n Operational Excellence
Expert Systems with Applications 36 (2009) 2592–2602
Working Papers
538 n Operational Excellence
International Journal of Electrical and Computer Engineering (IJECE)
International Journal of Electrical and Computer Engineering (IJECE)
International Journal of Electrical and Computer Engineering (IJECE)
ijcrb.webs.com
Int J Adv Manuf Technol (2012) 61:999–1018
ijcrb.webs.com
Some methods to implement these disposal strategies include using the
Some methods to implement these disposal strategies include using the
Some methods to implement these disposal strategies include using the
eAbstract The paper presents the new approach to optimizing automatic
538 n Operational Excellence
538 n Operational Excellence
538 n Operational Excellence
www.ccsenet.org/ijbm International Journal of Business and Management Vol. 5, No. 7; July 2010
The Critical Security Controls
A control system is a device or set of d eus vied ces to manage, command, dire,c or t
Computer
eAbstract The paper presents the new approach to optimizing automatic
Information Sciences 225 (2013) 72–80
Available online at www.sciencedirect.com
Nature Reviews Genetics | AOP, published online 2 May 2012; doi:10.1038/nrg3208
Applied Energy 114 (2014) 385–399
Expert Systems with Applications 40 (2013) 5439–5447
MACROERGONOMICS
based examination of social CRM have received little attention in
Morgan, G. (1998). Images of Organization. Thousand Oaks,
526 n Operational Excellence
PART2
Vladimir Šimovi ć
NationalScienceReview
Chap-15.qxd 11/02/2005 18:48 PM Page 213
Computers in
Inrernational Journal of Projecr Managemenr
Some methods to implement these disposal strategies include using the
1
and redesigning business processes for a company that wants to
Available online at www.sciencedirect.com
Clinical Decision Support Systems: A discussion on
is the only country which saw a growing car sales
Clinical Decision Support Systems: A discussion on
Vladimir Šimovi ć, Matija Varga, Predrag Oreški
Generalized Additive Manufacturing
Business Intelligence Vendors It is important to remember that business
E System Development Abstract Conventional vehicle development was mainly about
is an advanced technology for storing thermal energy that can
Available online at www.sciencedirect.com
Three Semantics for Modular Systems
IIMB Management Review (2013) 25, 137e149
Applied Energy 138 (2015) 133–142
Applied Energy 138 (2015) 133–142
business Model of Distance Education With the development of computer
6
Business Intelligence Vendors It is important to remember that business
Some methods to implement these disposal strategies include using the
Applied Energy 138 (2015) 133–142
Cascades with CO 2 as low temperature fluid are promising
Cascades with CO 2 as low temperature fluid are promising
Challenges and open research problems of the WSN solutions for
Technology in Society 24 (2002) 331–347
Technology in Society 24 (2002) 331–347
Technological Forecasting & Social Change 79 (2012) 419–428
Making Solar Cells
Communications of the Association for Information Systems
VOL. 2, NO. 3, JUNE 2007 ISSN 1819-6608
IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), May 09-11, 2014, Jaipur, India
Management of Information Systems:
Management of Information Systems:
Computers in Human Behavior 35 (2014) 267–277
1- This paper reports on the findings of a postal questionnaire that examines the
Article01 : Masaaki Hiromura was born in the aichi prefecture, japan in 1954. after graduating from
Proceedings of the National Conference on Innovations in Emerging Technology-2011
Information Sciences 225 (2013) 72–80
The overall trend in policy in Europe is to improve
Available online at www.sciencedirect.com
Management Information Systems
Journal of Management and Marketing Research
Management Information Systems
Management Information Systems
Management Information Systems
A Performance Evaluation Tool for Hybrid and DynamicDistributed Systems Distributed
FedEx Improves Customer Experience with Integrated Mapping and Location Data
the increased penetration of DG presents a significant challenge to
2014 IEEE 17th International Symposium on Object/Component-Oriented Real-Time Distributed Computing
١۴٣۵/٠٢/١١
This paper concentrates on Hybrid Fuel cell basedDistributed Generation system
Knowledge-Based Systems 23 (2010) 243–247
Journal of Software Engineering and Applications, 2013, 6, 34-40
Abstract Parties conducting electronic business have usually never seen each
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
6
The Bw-Tree: A B-tree for New Hardware
The Bw-Tree: A B-tree for New Hardware
262 5 Passive Mixer
5.9 Distortion in Single-Ended Sampling Mixer 263
Decision Support Systems 42 (2006) 1776–1799
1792 A.K. Choudhury et al. / Decision Support Systems 42 (2006) 1776–1799
520 Operational Excellence
Anintegrativemodelforknowledgesharing
02
Kamel Boulos and Berry International Journal of Health Geographics 2012, 11:25
Kamel Boulos and Berry International Journal of Health Geographics 2012, 11:25
is based on the assumption that an organization can better
ComputerStandards&Interfaces38(2015)64–71
Course Technology’s Management Information Systems
safe energy storage devices to meet the various design and
This PDF is available from The National Academies Press at http://www.nap.edu/catalog.php?record_id=18321
1
Faculty of Economics and Management Universiti Putra Malaysia Abstract This
464 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—II: EXPRESS BRIEFS, VOL. 55, NO. 5, MAY 2008
182 IEEETRANSACTIONSONINDUSTRIALINFORMATICS,VOL.9,NO.1,FEBRUARY2013
182 IEEETRANSACTIONSONINDUSTRIALINFORMATICS,VOL.9,NO.1,FEBRUARY2013
182
182
What is the role of knowledge management and knowledge management
Leadership style influences culture, and so does gender. Male
Leadership style influences culture, and so does gender. Male
hasdemonstrated that uncertainty is a complex phenomenon that shares a
Information Sciences 296 (2015) 307–314
Expert system design for educational and vocational
INTRODUCTION Network coding is a promising paradigm that hasbeen shown
ARTICLE IN PRESS
Electronic Payment Systems on Open
Electronic Payment Systems on Open
Concepts and Technologies for Synthetic Aperture Radar
devices. Section II highlights the characteristics of the main spectrum currently available to IMT systems through the
S. J. Gath et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (6), 2012,5315-5321
OperatingSystemSecurity SynthesisLectureson
to investigate the effects of ERP systems on the organization
to investigate the effects of ERP systems on the organization
Journal of Strategic Information Systems xxx (2014) xxx–xxx
Journal of Strategic Information Systems xxx (2014) xxx–xxx
Micro strategy and strategizing for IS Joe Peppard European School
Micro strategy and strategizing for IS Joe Peppard European School
debate and the questioning of the practical relevance of much
debate and the questioning of the practical relevance of much
Intelligent Suspensions
Intelligent Suspensions
STRUCTURAL
KAMandGAM 117 Relationshiptypes High Partnership Marriage Low Acquaintance Romance Low
Softw Syst Model
relegated to fashionable or aesthetic one liners that need not
Expert Systems with Applications 40 (2013) 3970–3983
D. Delen et al./Expert Systems with Applications 40 (2013) 3970–3983 3983
Chapter1
Chapter1
46 Chapter3. Islanded-ModeDERControl forDistortedLoadCurrents
Adaptive Dual Control Systems: A Survey
Chapter 1
1 Statement of Problem and Thesis Objectives A microgrid is
The proposed DSS determines market segments for new products using
The proposed DSS determines market segments for new products using
The proposed DSS determines market segments for new products using
The proposed DSS determines market segments for new products using
The proposed DSS determines market segments for new products using
The proposed DSS determines market segments for new products using
Decision Support System
INSIGHT INTRODUCTION NATURE|Vol 447|24 May 2007|doi:10.1038/nature05913
focuses on support functions such as market planning and informationsystems
Computers in Biology and Medicine ∎ (∎∎∎∎)∎∎∎–∎∎∎
8 F. Liu et al. / Computers in Biology and Medicine ∎ (∎∎∎∎)∎∎∎–∎∎∎
4 F. Liu et al. / Computers in Biology and Medicine ∎ (∎∎∎∎)∎∎∎–∎∎∎
Computers in Biology and Medicine ∎ (∎∎∎∎)∎∎∎–∎∎∎
Computers in Biology and Medicine ∎ (∎∎∎∎)∎∎∎–∎∎∎
F. Liu et al. / Computers in Biology and Medicine ∎ (∎∎∎∎)∎∎∎–∎∎∎ 9
Systems
Systems
Systems
Systems
CIRP Annals - Manufacturing Technology 61 (2012) 657–679
DECSUP-12148; No of Pages 13
Knowledge-Based Systems 37 (2013) 146–153
FutureGenerationComputerSystems25(2009)528–540
Composites: Part B 69 (2015) 133–144
Specification and Description
Proc. of the Second Intl. Conf. on Advances In Civil, Structural and Environmental Engineering- ACSEE 2014.
Proc. of the Second Intl. Conf. on Advances In Civil, Structural and Environmental Engineering- ACSEE 2014.
problem is that homomorphic encryption cannot be used for some
were designed to provide the security guarantees of traditional cryptographic
MODELLING OF METALLURGICAL PROCESSES USING CHAOS THEORY AND
Computers in Industry 65 (2014) 657–674
WHAT IS A DSS?
INTRODUCTION
At first it may seem counter productive to use paper
2 State of the art
Figure 2.11: E2E verification: Alice being able to verify her vote for Bob is
This article discusses the major developments in the history of
This article discusses the major developments in the history of
1 Embodied Energy An important principle in the above four
1 Embodied Energy An important principle in the above four
www.it-ebooks.info Web Penetration Testing with
Generalized Projective Synchronization of Hyperchaotic
Physics Letters A 369 (2007) 294–298
Generalized Projective Synchronization of Hyperchaotic
International Journal of Computer Science & Information Technology (IJCSIT) Vol 3, No 6, Dec 2011
NETWORK INTRUSION DETECTION USING DATA
Project Management Institute
A work ow-inspired, modular and robust approach to
Eurotech Group Eurotech isa leading international technology group with headquarters
Embedded Linux in a Partitioned
®
®
®
®
2011 IEEE International Conference on
About the Reviewers
www.it-ebooks.info Web Penetration Testing with
Advanced Risk Analysis in
She became the first woman to design a federal buildingwhen
transmitting command and control from the operators to the UAV
Journal of Strategic Information Systems 22 (2013) 238–251
Journal of Strategic Information Systems 22 (2013) 238–251
255-330
Management of
Verifiable election systems give voters the ability to check that
Verifiable election systems give voters the ability to check that
978-1-4673-5119-5/12/$31.00 c 2012 IEEE
978-1-4673-5119-5/12/$31.00 c 2012 IEEE
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
sensor data fusion has been recommended as a methodology to
2014 IEEE 13th International Symposium on Network Computing and Applications 2014 IEEE 13th International Symposium on Network Computing and Applications
Tutorial on agent-based modelling and simulation
Tutorial on agent-based modelling and simulation
The process forcreating a cutting instrument by striking a hammerstone
The process forcreating a cutting instrument by striking a hammerstone
Chapter
New-Generation Managers’ Business/IT Alignment
Foreword
Green Business Process Management
Unordered Business Processes, Sustainability
Information Systems in Environmental
Foreword
Information and Organization 13 (2003) 25–52
Networking systems
Networking systems
A Case Study on Hershey's ERP
Expert Systems with Applications 39 (2012) 9054–9063
Seed Coating Systems and Equipment
Seed Coating Systems and Equipment
International Journal of Information Management 33 (2013) 831– 839
تکمیل سفارش
IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 1, FEBRUARY 2014 3
INFORMATION SYSTEMS APPLIED TO TRANSPORT
INFORMATION SYSTEMS APPLIED TO TRANSPORT
IBIMA Publishing
ITS Applications in Developing Countries: A Case Study of Bus Rapid
The Interaction of
Available online at www.sciencedirect.com
Int J Flex Manuf Syst (2007) 19:1–40
Estudios Gerenciales 31 (2015) 20–29
Electrical Power and Energy Systems 61 (2014) 665–672
Electrical Power and Energy Systems 61 (2014) 665–672
Received August 1, 2010 / Accepted September 19, 2010 J. Technol. Manag. Innov. 2010, Volume 5, Issue 3
New-Generation Managers’ Business/IT Alignment
New-Generation Managers’ Business/IT Alignment
Renewable and Sustainable Energy Reviews 41 (2015) 68–84
is widely recognized in the context of the control of
most of the CBIR systems based up on the basic low arrangement of image intensities [22]. Color histogram,
Energy and Buildings 47 (2012) 659–673
Energy and Buildings 47 (2012) 659–673
Energy and Buildings 47 (2012) 659–673
are one of the major techniques used to protect such
Although the ultimate goal of research in Cyber Situational Awareness
European Journal of Operational Research 158 (2004) 146–172
E-C ommer c e S ecurit y and F r aud
10.5 The Information Assurance Model and Defense Strategy 487
1 Explain integrations and the role they play in connecting
the market forces lead the way to a convergence of
176 IEEE TRANSACTIONS ON POWER ELECTRONICS, VOL. 28, NO. 1, JANUARY 2013
(22 nm)
International Journal of Information Management 33 (2013) 831– 839
The research areas introduced in Section 4 provide an initial
The research areas introduced in Section 4 provide an initial
the autopilot is more accurately described as the automatic flight
International Journal of Accounting Information Systems 14 (2013) 113–119
IIMB Management Review (2013) 25, 137e149
One of the most fertile and widely used approaches to
The Bw-Tree: A B-tree for New Hardware
The Bw-Tree: A B-tree for New Hardware
Proceedings of the 2005 IEEE
Proceedings of the 2005 IEEE
Southern Cross University
Animation Support in a User Interface Toolkit:
Decision Support Systems 53 (2012) 490–498
a smaller memory capacity and without such a large array
ijcrb.webs.com
9. The Study Variables
IEEETRANSACTIONSONMICROWAVETHEORYANDTECHNIQUES,VOL.62,NO.4,APRIL2014 1031
شبکه
ESWA 9885 No. of Pages 13, Model 5G
Policy Analysts: A New Professional Role in Government Service
Available online at www.sciencedirect.com
17
Unit 8 The early 1970s saw the birth of the
2752 IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 55, NO. 7, JULY 2008
Our portfolio can meet any requirement Gearmotors and inverter technology
Our portfolio can meet any requirement Gearmotors and inverter technology
Service and repair
Expert Systems with Applications 41 (2014) 679–693
Part 5
International Journal of Information Management 34 (2014) 733–740
Engineering Molecular Dynamics Simulation in ChemicalEngineering Abstract Chemical engineering systems
Engineering Molecular Dynamics Simulation in ChemicalEngineering Abstract Chemical engineering systems
Expert Systems with Applications 40 (2013) 1054–1060
As compared to systems that use earlier forms of Soft
Greening through IT Greening through IT
Greening through IT Greening through IT
IEEETRANSACTIONSONCIRCUITSANDSYSTEMS—I:REGULARPAPERS,VOL.60,NO.9,SEPTEMBER2013 2533
Algorithmic Construction of Lyapunov Functions for Power System Stability Analysis
The element that the fields of AI have in common
Cultural Influences on
A modern approach to manufacturing data management must be based
DATA WAREHOUSING
Southern Cross University
Southern Cross University
THERMAL ENERGY
AnArchitectureforaGeneralPurposeMulti-Algorithm
“Knowledge Librarian”- An International Peer Reviewed Bilingual E-Journal Of Library And Information Science
Energy Policy 65 (2014) 444–454
DATA WAREHOUSING
Business and Economic Research
Advanced Control Engineering Methods
International Journal of Engineering Innovation & Research
Expert Systems with Applications 41 (2014) 2157–2165
Expert Systems with Applications 41 (2014) 2157–2165
A Guide to ERP: Benefits,
A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems
A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems
Signal Processing 113 (2015) 159–168
Systems engineers defi ne the term system as a set
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Review
Proceedings of the 2012 International Conference on
Expertise Recommender: A Flexible
Residue Number Systems 1
2014 International Conference on Computational Science and Computational Intelligence 2014
2041 IEEE 2 8-th Convention of Electrical and Electronics Engineers in Israel
Accepted Manuscript
Interactions and issues of urban water management 67
4 The distribution centre as an assembly facility Having discussed
Intelligent Tutoring of Virtual Learning Communities
Proceedings of the 22”d Annual EMBS International Conference, July 23-28,2000, Chicago IL.
Enterprise Resource Planning:
Journal of Strategic Information Systems 23 (2014) 1–10
Information systems support includes all of the peripherals that support
2-5(29173)
5-10(29173)
Journal of Strategic Information Systems 1995 4(2) 149-163
the contribution of the information systems function This paper argues
Countermeasures Encourage users to be aware of their surroundings and
Countermeasures Encourage users to be aware of their surroundings and
Countermeasures Encourage users to be aware of their surroundings and
RFID Systems and Security and Privacy
Double-Deck EGSCSUsing GNP withACO
Journal of Strategic Information Systems 1995 4(2) 149-163
Chaji - Sheida
Energy 66 (2014) 523e534
Available online at www.sciencedirect.com
Proceedings of the 22”d Annual EMBS International Conference, July 23-28,2000, Chicago IL.
Proceedings of the 22”d Annual EMBS International Conference, July 23-28,2000, Chicago IL.
Proceedings of the 22”d Annual EMBS International Conference, July 23-28,2000, Chicago IL.
2010 International Conference on Power System Technology
Laboratory
Journal of Strategic Information Systems 1995 4(2) 149-163
. (کامپیوتر-امنیت-شبکه)
Sensors 2015, 15, 7571-7595; doi:10.3390/s150407571
Journal of Business Research 67 (2014) 1201–1208
with the advent of smart dust the security for wireless
The common language of IT SFIA version 5 | 7
computers & security 32 (2013) 90e101
G Model
NFPA 1620
This NFPA document is made available for use subject to
Downloaded from http://www.everyspec.com
applications are widely seen to have the potential to improve
IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 1, FIRST QUARTER 2013 5
ABSTRACT It is widely believed that major financial benefits can
1678 IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 25, NO. 3, JULY 2010
1678 IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 25, NO. 3, JULY 2010
Which is a young and rapidly growing company for Uninterrupted
DecisionSupportSystems74(2015)12–32
Available online at www.sciencedirect.com
2014 IEEE 10th World Congress on Services 2014 IEEE 10th World Congress on Services 2014 IEEE 10th World Congress on Services
Mohammadi
E-commerce
as may be seen in the enormous growth in mobile
as may be seen in the enormous growth in mobile
as may be seen in the enormous growth in mobile
2014 International Conference on Computational Science and Computational Intelligence 2014
2014 International Conference on Computational Science and Computational Intelligence 2014
BioSystems 114 (2013) 219– 226
Universal Journal of Management and Social Sciences Vol. 3, No.3; March 2013
A Survey on Deep Packet Inspection for Intrusion Detection Systems
INCOSE Systems Engineering Handbook v. 3.2
INCOSE Systems Engineering Handbook v. 3.2
INCOSE Systems Engineering Handbook v. 3.2
Mohammadi
CHAPTER
USENIX Association
Aided Scheduling and Dispatch Service Components The various components of
G Model
Abstract The development of mechanisms to ease human machine interaction
Abstract
1. Introduction
a valuable vehicle for the realization of intelligent systems is
2. Related work
2.2. Context in information systems
There is outstanding research that considers the modeling of contextual data in information systems:
2.4. Context, databases and fuzzy set theory
Abstract
1. Introduction
a valuable vehicle for the realization of intelligent systems is
2. Related work
2.2. Context in information systems
There is outstanding research that considers the modeling of contextual data in information systems:
2.4. Context, databases and fuzzy set theory
أ
2. SECURITY CONCERNS IN A COMPUTER-BASED ACCOUNTING SYSTEM
In addition to the header information that is also used
17
Marketing Information Systems
Marketing Information Systems
PA R T T W O
106 THEORY AND PHILOSOPHY IN HUMAN RESOURCE DEVELOPMENT
176 IEEE TRANSACTIONS ON POWER ELECTRONICS, VOL. 28, NO. 1, JANUARY 2013
176 IEEE TRANSACTIONS ON POWER ELECTRONICS, VOL. 28, NO. 1, JANUARY 2013
Marketing Information Systems
Intelligent Tutoring of Virtual Learning Communities
فناوری اطلاعات
weHelp: AReferenceArchitectureforSocialRecommender
weHelp: AReferenceArchitectureforSocialRecommender
Biogas Opportunities Roadmap
Available online at www.sciencedirect.com
Marketing Information Systems
148 Marketing Information Systems
Marketing Information Systems
Marketing Information Systems
Generalized Projective Synchronization of Hyperchaotic
1 - ولید
2-ولید
Handbook
the impact of comprehensive reference systems such as belief systems
CHAPTER-IV
Int. J. Production Economics 144 (2013) 157–174
BioMed Central
Lecture Notes in Computer Science 5525
DecisionSupportSystems74(2015)12–32
Context of Systems Analysis
combined heat and power
Reliability Engineering and System Safety 46 (1994) 139-158
Join NursingCenter to get uninterrupted access to this article and
Considerations for a Successful Clinical Decision Support System Abstract Clinical
Considerations for a Successful Clinical Decision Support System Abstract Clinical
Assess Employee Adoption of IS Security Measures C. M. Jones, R. V. McCarthy & L. Halawi
Association for Information Systems
K C Chakrabarty: Empowering deposit insurance entities to face
T.41.A.2 IEA SHC Task 41 I Solar energy systems in Architecture ‐ integration criteria & guidelines
T.41.A.2 IEA SHC Task 41 I Solar energy systems in Architecture ‐ integration criteria & guidelines
T.41.A.2 IEA SHC Task 41 I Solar energy systems in Architecture ‐ integration criteria & guidelines
Solar energy systems in Architecture ‐ integration criteria & guidelines
Power Quality Assessment in the Wake of Ship Technology Development
Ethical
K C Chakrabarty: Empowering deposit insurance entities to face
ACI 440.2R-08
Course Technology’s Management Information Systems
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 50, NO. 8, AUGUST 2005 1177
In this area governments have a significant role in assuring
The goal of this strategy is to strengthen the security
The goal of this strategy is to strengthen the security
saving measures for each climate zone are ccoonnttaaiinneedd in the
Internet of Things - Wikipedia, the free encyclopedia Page 1 of 14
Sociolinguistic factors
Sociolinguistic factors
Information Services, Geography 581
computers & security 28 (2009) 18–28
1
WIDEBAND WIRELESS ACCESS TECHNOLOGIES
www.ASEC.ir
08_050845 ch03.qxp 11/21/06 1:12 PM Page 43
| |
by using engineering principles to exert spatiotemporal control over drug
GEZE AUTOMATIC DOOR SYSTEMS
System safety
Dr Graeme M. Taylor
food items should be carefully assessed and appropriate materials purchased
Reading Passage TWO Health information technology Concepts and Definitions Health
2 Gathering network information The first step in developing cyber
2 Gathering network information The first step in developing cyber
2 Gathering network information The first step in developing cyber
Simulation has become an indispensable tool for researchers to explore
Journal of Information Technology (2005) 20, 67–87
Chapter 1
2015 48th Hawaii International Conference on System Sciences
Management Information Systems
CONTENTS
1
x
Formulating Operational Definitions of Desired Outcomes of Instruction in Mathematics and Science
Expert Systems with Applications 40 (2013) 4241–4251
Energy 72 (2014) 783e799
Formulating Operational Definitions of Desired Outcomes of Instruction in Mathematics and
6
The excess energy is sold at a premium to the
1
Journal of Computer Sciences and Applications, 2015, Vol. 3, No. 2, 29-32
Security in computer networks is one of the most interesting
THE MEANING OF ARCHITECTUR: ENEW SCIENTIFIC FOUNDATIONS
international journal of medical informatics 77 (2008) 176–183
Chapter 1
TGreen Roof
An Intrusive Analyzer for Hadoop Systems Based on Wireless Sensor Networks
HARDWARE These notes outline the major components of a Magnetic
Advances in Whole-Body MRI Magnets
1 Introduction How will Internet computing change the world ofinformation
An Intrusive Analyzer for Hadoop Systems Based on Wireless Sensor Networks
ResearchArticle
International Journal of Accounting Information Systems 15 (2014) 166–184
Sustainability Accounting, Management and Policy Journal
HARDWARE These notes outline the major components of a Magnetic
Advances in Whole-Body MRI Magnets
Signature Preview Mode Formal Representation
HARDWARE These notes outline the major components of a Magnetic
Advances in Whole-Body MRI Magnets
JID:FSS AID:6804 /FLA [m3SC+; v1.205; Prn:13/05/2015; 11:06] P.1 (1-15)
1- This paper reports on the findings of a postal questionnaire that examines the
4
4
Research Policy 40 (2011) 526–538
Research Policy 40 (2011) 526–538
Journal of Enterprise Information Management
1
C-arm Cone-beam CT: General Principles
General Measu remen t Principles
ICICES2014 - S.A.Engineering College, Chennai, Tamil Nadu, India
4
4
4
CHAPTER 9
Journal of Enterprise Information Management
Journal of Enterprise Information Management
Chapter 44
there must be at least one reinforcing loop driving the
JID:YJCSS AID:2681 /FLA [m3G; v 1.93; Prn:19/03/2013; 15:42] P.1(1-13)
C6696_01_CTP.4c 1/28/08 8:21 AM Page 1
Critical success factors in the Context of humanitarian aid Supply
Employing Information andCommunication Systems in Planning Processes to Increase Efficiency
C6696_FM_CTP.4c 2/8/08 4:14 PM Page i
Science Policy Reports
GEZE AUTOMATIC DOOR SYSTEMS
Science Policy Reports
If I do ten spontaneous acts of good will a
The Internet of Things allows objects to be sensed and
Beyond ERP
WANG_LAYOUT.qxp_Layout 1/30/14 1:29 PM Page 122
Industrial Marketing Management 42 (2013) 394–404
section ladder input network is exploited to achieve excellent input
a product with high recycled content and which is itself
88 A. Kylili, P.A. Fokaides / Sustainable Cities and Society 15 (2015) 86–95
Starting the pendulum from a slightly different initial condition would
Hoseini-Hesam10
ComputerStandards&Interfaces42(2015)137–142
HR Trends in Delivery Methods Inspection of this list gives
Hoseini-Hesam-San10
Proceedings of the 4th International Conference on TuBB.3
Beyond ERP
01-P1503 10/24/2000 5:07 PM Page 1
Beyond ERP
Beyond ERP
EngineeringStructures29(2007)237–247
Engineering Structures 24 (2002) 1587–1599
EngineeringStructures29(2007)237–247
Engineering Structures 24 (2002) 1587–1599
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 7 0 5 9 7 7 9 5
Information & Management 51 (2014) 27–42
CARD PERSONALIZATION
CARD PERSONALIZATION
MB Xeno f ast
CARD PERSONALIZATION
MB Xeno f ast
GEZE SAfET y TEChnoL oGy
GEZE SAFET Y TECHNOLOGY
Industrial Marketing Management 42 (2013) 394–404
TRUST AND IT INNOVATION IN ASYMMETRIC ENVIRONMENTS OF THE SUPPLY CHAIN
to of
A Course in Multicultural Mathematics
to of
CARD PERSONALIZATION
MB Xeno f ast
CARD PERSONALIZATION
MB Xeno f ast
ترجمه
Information & Management 51 (2014) 27–42
CHAPTER
enterprise systems for management
Expert Systems with Applications 39 (2012) 13085–13092
ترجمه
DISCLAIMER
REFERENCES
REFERENCES
depending on the type of delay and the relative lengths
except for the fact that delays are not often easily
f3 +
Cloud computing risk and audit issues
Int. J. Production Economics 147 (2014) 340–350
CHAPTER
Chapter1.fm Page 1 Wednesday, November 12, 2014 3:22 PM
25th 2015 Comments Views Over 80 percent of the Show
REFERENCES
REFERENCES
REFERENCES
Melt fi ltration | process feature
Transportations Systems Modeling and Applications
ترجمه
Available online at www.sciencedirect.com
chapter
chapter
chapter
You can drive a system crazy by muddying its information
Transportations Systems Modeling and Applications
Transportation systems and
we have the ability to design and implementsecurity mechanisms within
Towards an Architecture of BI in the Cloud
with each type of magnetic field associated with an MR
the volume of smoke is so great that it may
are dangerous products of combustion that have critical influences on
The issue of performance standards for fire dispatch and for
7
7
7
7
Adaptive E-Learning Systems: Retrospection, Opportunities and
MIPRO 2010, May 24-28, 2010, Opatija, Croatia
Adaptive E-Learning Systems: Retrospection, Opportunities and
MIPRO 2010, May 24-28, 2010, Opatija, Croatia
TM
Survey on Load Rebalancing For
4.1.1. Logistic and product lifetime managem ent
Accepted Manuscript
CHAPTER
CHAPTER
CHAPTER
7
7
Artificial Intelligence in Medicine (2009) 46, 5—17
Contents
Energy Conversion and Management 99 (2015) 387–399
7
Armand Baboli et al. / IFAC-PapersOnLine 48-3 (2015) 1912–1917
functional machines and mobile robots supports the emergence of highly
functional machines and mobile robots supports the emergence of highly
functional machines and mobile robots supports the emergence of highly
3
7
Energy Conversion and Management 99 (2015) 387–399
Flare Pilot System Safety
hasors are basic tools of ac circuit analysis, usually of the wave form for one (nominal) period are collected,
hasors are basic tools of ac circuit analysis, usually of the wave form for one (nominal) period are collected,
hasors are basic tools of ac circuit analysis, usually of the wave form for one (nominal) period are collected,
European Journal of Operational Research 173 (2006) 951–956
International Journal of Business and Social Science Vol. 4 No. 17 [Special Issue – December 2013]
functional machines and mobile robots supports the emergence of highly
AUTCON-01947;NoofPages9
AUTCON-01947;NoofPages9
2014 47th Hawaii International Conference on System Science
Artificial Intelligence 175 (2011) 1020–1036
10 things you should know about deploying a UPS Uninterruptible
7706 IEEE TRANSACTIONSON INDUSTRIAL ELECTRONICS, VOL. 62, NO. 12, DECEMBER 2015
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, VOL. 26, NO. 10, OCTOBER 2015 2535
Expert Systems with Applications 40 (2013) 7267–7279
platforming methodology is introduced for mapping product features platform and
12. Policy learning as a key process in
J Intell Manuf (2013) 24:1131–1144
THE SYSTEMIC ENTERPRISE ARCHITECTURE
GLOBAL
The International Information & Library Review (2009) 41, 163e172
The International Information & Library Review (2009) 41, 163e172
Web Browsing Performance ofWireless Thinclient ComputingABSTRACTWeb applications
Web Browsing Performance of Wireless Thinclient Computing ABSTRACT Web applications
Techniques for Power Converters 65 This chapter provided information and
ComputerStandards&Interfaces42(2015)137–142
Overview Since people have been succeeded in making connections among
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 438 #46
9. Analysis of Multimachine System 329
7
International Journal of Database Management Systems ( IJDMS ) Vol.7, No.5, October 2015
ComputerStandards&Interfaces42(2015)137–142
ComputerStandards&Interfaces42(2015)137–142
the US military has been pursuing an increasingly systemic view
Definition of manufacturing and its impact on nations In his
Definition of manufacturing and its impact on nations In his
Definition of manufacturing and its impact on nations In his
Definition of manufacturing and its impact on nations In his
Lasers are used in a variety of applications ranging from
Available online at www.sciencedirect.com
GeoJournal (2014) 79:1–14
For a while it was a neglected and misunderstood area
A distributed general-purpose computing system that
A distributed general-purpose computing system that
Available online at www.sciencedirect.com
ASEE 2014 Zone I Conference, April 3-5, 2014, University of Bridgeport, Bridgeport, CT, USA.
_______________________________________________________________________________________
514
Accepted Manuscript
Accepted Manuscript
WANG_LAYOUT.qxp_Layout 1/30/14 1:29 PM Page 122
Available online at www.sciencedirect.com
Decision Support Systems 40 (2005) 235–255
1
Expert Systems with Applications 39 (2012) 11657–11665
Expert Systems with Applications 39 (2012) 11657–11665
Security in cloudcannot be simulated even though as different simulation
Transportations Systems Modeling and Applications
Internet of Things:
Internet of Things:
Internet of Things:
Management
Management
ESWA 9504 No. of Pages 15, Model 5G
2014 International Conference on Electronics and Communication System (lCECS -2014)
2015 12th International Multi-Conference on Systems, Signals & Devices
Green Energy and Technology
The Journal of Systems and Software 99 (2015) 109–119
The Journal of Systems and Software 99 (2015) 109–119
00adBARYAM_29412 9/5/00 7:26 PM Page 1
00adBARYAM_29412 9/5/00 7:26 PM Page 1
00adBARYAM_29412 9/5/00 7:26 PM Page 1
00adBARYAM_29412 9/5/00 7:26 PM Page 1
SAP System not producing correct output or not working properly
Knowledge-Based Systems xxx (2011) xxx–xxx
Knowledge-Based Systems xxx (2011) xxx–xxx
American Journal of Software Engineering, 2014, Vol. 2, No. 2, 22-25
Available online at www.sciencedirect.com
Managing Project Risk Change management Required for successful system building
Managing Project Risk Change management Required for successful system building
Expert Systems with Applications 38 (2011) 5166–5177
Expert Systems with Applications 38 (2011) 5166–5177
Expert Systems with Applications 38 (2011) 5166–5177
Expert Systems with Applications 38 (2011) 5166–5177
Contents
Making Solar Cells
Safety Science xxx (2016) xxx–xxx
A SECURITY REFERENCE
Critical Perspectives on Accounting 25 (2014) 135–141
International Journal of Information Management 32 (2012) 24– 34
Computers in Human Behavior 26 (2010) 1136–1148
E109
th
th
th
LEED (leadership in energy and environmental design); which is the most common
LEED (leadership in energy and environmental design); which is the most common
Accepted Manuscript
Simple Lessons from Complexity
Simple Lessons from Complexity
M07_CHAF9601_04_SE_C07.QXD:D01_CHAF7409_04_SE_C01.QXD 16/4/09 13:27 Page 393
M07_CHAF9601_04_SE_C07.QXD:D01_CHAF7409_04_SE_C01.QXD 16/4/09 13:27 Page 393
, . ~ ....• ~ ......, .. ':... ' .•.-.. ;'-';'.: ..... .:....:.:::-:;.,~~':~~ ::...'~~}.::....':'-~.,;;..,.!:.:
A survey of privacy in multi-agent systems
Complexity
Complexity
Roger
M07_CHAF9601_04_SE_C07.QXD:D01_CHAF7409_04_SE_C01.QXD 16/4/09 13:27 Page 393
Bibliography of Systems ResourcesIn addition to the works cited
Complexity
Manufacturing strategy is a plan for moving a company from
abstract Manufacturing strategy is a plan for moving a company
FMTOC.qxd 11/26/12 5:09 PM Page i
M07_CHAF9601_04_SE_C07.QXD:D01_CHAF7409_04_SE_C01.QXD 16/4/09 13:27 Page 393
i_m0 Applied Space
ISA Transactions ∎ (∎∎∎∎) ∎∎∎–∎∎∎
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 8 9 5 5 4 1 2 7
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 8 9 5 5 4 1 2 7
Arnold Schwarzenegger
M07_CHAF9601_04_SE_C07.QXD:D01_CHAF7409_04_SE_C01.QXD 16/4/09 13:27 Page 393
Distributed Database
Information Security Technical Report, Vol 6, No. 2 (2000) 95-102
Distributed Database
3.3 Electrodialysis (ED/EDR/SED)
Information Security Technical Report, Vol 6, No. 2 (2000) 95-102
Distributed Database
It becomes the most attractive place for life and work
OperatingSystemSecurity SynthesisLectureson
and network connectivity that enables these objects to collect and
Security
Synthesis Lectures on Information Security, Privacy and Trust . . . . . . . . . . . . . . . . . . . . . . . .iii
Synthesis Lectures on Information .iii
Example 3
Roger
Roger
European Journal of Information Systems (2008) 17, 236–263
Roger
The Millennium Project Futures Research Methodology —V3.0
Web Browsing Performance of
Bibliography of Systems ResourcesIn addition to the works cited
IEEE TRANSACTIONS ON ENERGY CONVERSION, VOL. 25, NO. 3, SEPTEMBER 2010 901
7
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
i_m0 Applied Space
www.pwc.com/us/insurance
www.pwc.com/us/insurance
FEATURE
Summary
www.pwc.com/us/insurance
Summary
UNDERSTANDING TECHNOLOGY AND ITS MODE OF EVOLUTION Everyone would agree
Ambitious applications must fight OS
Consumers
3.11.1. Receiving
Consumers
C09 06/30/2010 23:58:31 Page 175
C10 06/30/2010 14:48:30 Page 195
Ambitious applications must fight OS
Survey on Context-Aware Publish/Subscribe systems for VANET
IJSIM
This file can then be used to generate daily maintenance schedules and to project needs for repair
Augmented reality Samsung SARI AR SDK marker less tracker used
Information Management and Business Review
Information Management and Business Review
Information Management and Business Review
with the objective approach conducted using data such as industry data, industry sales growth and
of the variance. SEM is a set of statistical techniques that allow the testing of a set of relationships that are
management accounting information systems. This is in accordance with the findings mentioned by
Information Management and Business Review
with the objective approach conducted using data such as industry data, industry sales growth and
of the variance. SEM is a set of statistical techniques that allow the testing of a set of relationships that are
management accounting information systems. This is in accordance with the findings mentioned by
management accounting information systems. This is in accordance with the findings mentioned by
The Effect of Organizational Culture on the Application of Management Accounting Information
Y = 0.364X + 0.484 X + 0.168 X + 0.105
System Thinking: Approaches and Methodologies
System Thinking: Approaches and Methodologies
SOFT
Soft Systems Methodology
Soft Systems Methodology
SOFT SYSTEM DYNAMICS METHODOLOGY (SSDM): A
Soft Systems Methodology
This publication is available at Army Knowledge Online
Management Information Systems
Management Information Systems
Management Information Systems
Management Information Systems
4/10/2015
Management Information Systems
Management Information Systems
Management Information Systems
The Journal of Systems and Software 43 (1998) 11–17
The Journal of Systems and Software 43 (1998) 11–17
Scheduling Algorithm for Real-Time Applications in Grid Environment
Journal of Strategic Information Systems 24 (2015) 149–157
Journal of Strategic Information Systems 24 (2015) 149–157
3 Generation-X Technologies and IT Auditing
Procedia
Procedia
Procedia
CHAPTER
Introduction to Computer Network Vulnerabilities
The Key Advantages of IP-based CCTV
Available online at www.sciencedirect.com
IATSS Research 34 (2010) 9–15
TSUGAWA LAYOUT 10/20/10 3:59 PM Page 120
Available online at www.sciencedirect.com
Downloaded from Iran library: (www.libdl.ir) | Sponsored by Tehran Business School (www.tbs.ir)
Downloaded from Iran library: (www.libdl.ir) | Sponsored by Tehran Business School (www.tbs.ir)
i_m0 Applied Space
80 CHAPTER 3—Concept of Operations and System Operational
Neo-Piagetian Theories of Cognitive Development
Downloaded form http://iranpaper.ir
10 Chapter 1 —Space Systems Engineering
100 Chapter 4 —Engineering and Managing System Requirements
شورknn k [2]
electronic warfare
Call of Duty: Black Ops III
This publication is available at Army Knowledge Online
Buckling Restrained Braced Frame (BRBF)
Buckling Restrained Braced Frame (BRBF)
CHAPTER 4. RELATED WORKS
Addressing Challenges of Ultra Large Scale System on Requirements Engineering
Downloaded from Iran library: (www.libdl.ir) | Sponsored by Tehran Business School (www.tbs.ir)
Handbook for Blast-Resistant Design of Buildings
Handbook for Blast-Resistant Design of Buildings
INTRODUCTION Why do some companies systematically outperform their competitors and
The Journal of Systems and Software 43 (1998) 11–17
and orthogonal CDMA all have the same theoretical capacity in
to the channel before transmitting in order to avoid collisions
An improvement upon static allocation made possible in LTE is
1 Multiuser Diversity The main motivation for adaptive subcarrier allocation
ACCINF-00259; No of Pages 11
INCOSE!Systems!Engineering!Handbook!v.!3.2!
Security in Electronic Payment Systems
GUIDELINES
in Napster a central server stores the index of all
Introduction Scalable computers have moved from the research lab to
A Virtual Machine Monitor Disco is a virtual machine monitor
Disco acts as a gateway that uses the network interfaces
Conclusions This paper tackles the problem of developing system software
Creating the Internet
This publication is available at Army Knowledge Online
A version of this paper has been published originally by
OperatingSystemSecurity SynthesisLectureson
DEVELOPING SCOPE, PRELIMINARY PLAN, AND BUDGET 35
THE BUILDING BLOCKS AND DIMENSIONS OF A SECTORAL SYSTEM OF
inputs and demand with key links and dynamic complementaritiesSectoral systems
THE BUILDING BLOCKS AND DIMENSIONS OF A SECTORAL SYSTEM OF
inputs and demand with key links and dynamic complementaritiesSectoral systems
THE BUILDING BLOCKS AND DIMENSIONS OF A SECTORAL SYSTEM OF
Schumpeter Mark I pattern of innovative activities may turn into
inputs and demand with key links and dynamic complementaritiesSectoral systems
1 Innovation systems and context dependency The innovation systems approach
Differential equations provided accurate numerical predictions and concise ways to
آشکارساز نمونه بردار هوا
6.2 Development of the Internet from the Users’ Perspective 41
BASF Construction Chemicals
6.2 Development of the Internet from the Users’ Perspective 41
This publication is available at Army Knowledge Online
6.2 Development of the Internet from the Users’ Perspective 41
This will result in a parallelization of the real and
6.2 Development of the Internet from the Users’ Perspective 41
6.3 The Significance of Digitalization for a Sustainable City 43
6.2 Development of the Internet from the Users’ Perspective 41
International Journal of Production Research
3268 G.A. Akyuz and M. Rehan
International Journal of Production Research 3269
CZASOPISMO INŻYNIERII LĄDOWEJ, ŚRODOWISKA I ARCHITEKTURY
CZASOPISMO INŻYNIERII LĄDOWEJ, ŚRODOWISKA I ARCHITEKTURY
"", : :
"", : :
"", : :
"", : :
Abstract—The emerging massive/large-scale multiple-input multiple-output (LS-MIMO)
Abstract—The emerging massive/large-scale multiple-input multiple-output (LS-MIMO) systems that rely
Abstract—The emerging massive/large-scale multiple-input multiple-output (LS-MIMO) systems that rely
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 6 8 4 2 1 0 9 5
today are the predominant technology for storingstructured data in web
Organizations like NASA regularly receive terabytes of incoming data from
Endotoxin Detection Systems
must agree on the procedures to be applied for the
Modern electronic health records are designed to capture
Renewable and Sustainable Energy Reviews 30 (2014) 461–478
Renewable and Sustainable Energy Reviews 30 (2014) 461–478
مدیریت و برنامه ریزی انرژی در شهرهای هوشمند
(IJCSIS) International Journal of Computer Science and Information Security,
Haralambos Mouratidis
SCHILLER
SCHILLER
SCHILLER
SCHILLER
Discussion regarding the case study
The number of health and social care information systems under development increases constantly. An
International Journal of Cognitive Therapy, 3(2), 97–112, 2010
No Inverter
Green Energy and Technology
--`,`,,`,,,,,,`,```,,``,,```,`,`-`-`,,`,,`,`,,`---
action fire sprinkler systems employ the basic concept of a
Knowledge-Based Systems 46 (2013) 109–132
You can use them to identify electrical components or connections
You can use them to identify electrical components or connections
سیستم های اطفای حریق
سیستم اطفای حریق اتوماتیک آب
the free encyclopedia This article is about the complete fire
سیستم اطفای حریق اتوماتیک آب
Automatic fire suppression systems control and extinguish fires without human
Automatic fire suppression systems control and extinguish fires without human
سیستم اطفای حریق اتوماتیک آب
معرفی انواع سیستم اطفای حریق اتوماتیک
Here are answers to the most frequently asked questions regarding FM-200™ waterless fire protection systems.
Here are answers to the most frequently asked questions regarding FM-200™ waterless fire protection systems.
انواع سنسورهای حرارتی کابلی و اساس عملکرد آنها
آشکارسازهای نمونه بردار دودی
پرشس های متداول سیستم اطفای حریق FM200
Downloaded from http://iranpaper.ir
APPLICA TIONS GUIDE: ASPIRA TING SMOKE DETECTION
You can use them to identify electrical components or connections
Lighting for Schools
and chemically inert gas that is both readily available and
Gaseous fire suppression
FE-13 (HFC-23 NFPA 2001 designation) is an efficient clean agent fire suppressant utilized in various environments that require fire protection while minimizing the risk of collateral damage from fires.
بررسی انواع سیستم های اطفای حریق
Available online at www.sciencedirect.com
Approved for Public Release: 11-4436.
Technical Sciences 327
Relationship between site and atomic fractions in the 2SLOD model
10 things you should know about deploying a UPS Uninterruptible
cogniTiVe engineering
Expert Systems with Applications 42 (2015) 2998–3004
A multi-body systems approach to
A multi-body systems approach to
A multi-body systems approach to
The first primitive loudspeakers were invented during the development of
Chapter 5
The first primitive loudspeakers were invented during the development of
1 are also near the fundamental tones and hard to
Based Transmission System Expansion Planning for the Highest Satisfaction Level
The Last Great Edifice of Classical Sociology The tum of
The Last Great Edifice of Classical Sociology The tum of
Introduction
Model of efficient and sustainable improvements in a lean production
CHAPTER
HAPTER 6
2 Quality Management The first and foremost element for GMP
حسایداری
CONCEPTS AND MISCONCEPTIONS 11
CONCEPTS AND MISCONCEPTIONS 11
we propose a novel adaptive power control scheme for IoT
we propose a novel adaptive power control scheme for IoT
we propose a novel adaptive power control scheme for IoT
A Quantom Approach to Time and Organizational Change
This page intentionally left blank DISTRIBUTED SYSTEMS
which confuses the issue of which messaging system an application
which confuses the issue of which messaging system an application
which confuses the issue of which messaging system an application
Proceedings of the 19th World Congress
Available online at www.sciencedirect.com
Operation and Maintenance Methods
Automatica47(2011)1547–1555
Automatica48(2012)1432–1439
Automatica47(2011)1547–1555
Automatica48(2012)1432–1439
AN IMPROVED LEADER ELECTION ALGORITHM FOR DISTRIBUTED SYSTEMS ABSTRACT Leader
AN IMPROVED LEADER ELECTION ALGORITHM FOR DISTRIBUTED SYSTEMS ABSTRACT Leader
G Model
G Model
18. In implementing the new agenda, the focus should be on efficiency, effectiveness and equity
18. In implementing the new agenda, the focus should be on efficiency, effectiveness and equity
18. In implementing the new agenda, the focus should be on efficiency, effectiveness and equity
voltage distribution systems has become a feasible option in distribution
18. In implementing the new agenda, the focus should be on efficiency, effectiveness and equity
3 Applying innovation to steam systems Steam systems are capable
3 Applying innovation to steam systems Steam systems are capable
CORE CONCEPTS OF
University of Texas at El Paso
University of Texas at El Paso
Available online at www.sciencedirect.com
Journal of Systems Architecture 60 (2014) 726–740
fasle 14
Decision Support Systems 50 (2011) 491–500
Toward a Sustainable
CHAPTER
Journal of World Business 46 (2011) 13–21
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
The case of two investment multinational banks in Tanzania This
The case of two investment multinational banks in Tanzania This
Artificial Neural Networks for Misuse Detection
Milan Janić
0006D_c03_89-124.qxd 9/25/03 9:50 PM Page 89
Expert Systems with Applications 38 (2011) 6523–6529
Introducing FERPS: A Framework for Enterprise
Introducing FERPS: A Framework for Enterprise
Nagrath etal. SpringerPlus (2015) 4:103
2009 International Conference on Computational Science and Engineering 2009 International
BINDEXXML 06/22/2012 18:40:24 Page 402 FFIRSXML 06/22/2012 18:37:30 Page 1
Web-based Motion Detection System for Health Care
2009 International Conference on Computational Science and Engineering 2009 International
Pers Ubiquit Comput
2009 International Conference on Computational Science and Engineering 2009 International
This research develops a concept for the application smart environments
This research develops a concept for the application smart environments
This research develops a concept for the application smart environments
Kinetic Systems in Architecture
190 7 Manufacturing Systems
Available online at www.sciencedirect.com
SOFT COMPUTING TECHNIQUES FOR PROCESS
Introducing FERPS: A Framework for Enterprise
CORE CONCEPTS OF
AN INTRODUCTION TO ACCOUNTING INFORMATION SYSTEMS CHAPTER 1 Accounting Information
AN INTRODUCTION TO ACCOUNTING INFORMATION SYSTEMS CHAPTER 1 Accounting Information
AN INTRODUCTION TO ACCOUNTING INFORMATION SYSTEMS CHAPTER 1 Accounting Information
AN INTRODUCTION TO ACCOUNTING INFORMATION SYSTEMS CHAPTER 1 Accounting Information
AN INTRODUCTION TO ACCOUNTING INFORMATION SYSTEMS CHAPTER 1 Accounting Information
Applied Energy 137 (2015) 511–536
Queen Mary University of London, School of Law
ISSN(Online) : 2319-8753
Downloaded from http://iranpaper.ir
14
Pers Ubiquit Comput
Pers Ubiquit Comput
8
Pers Ubiquit Comput
Pers Ubiquit Comput
Systems
M. Fera et al. / IFAC-PapersOnLine 48-3 (2015) 1720–1725
VOLUME 89, NUMBER 5 PHYSICAL REVIEW LETTERS 29 JULY 2002
Downloaded from http://iranpaper.ir
w
1
Pers Ubiquit Comput
“9781405155816_4_022” — 2010/5/8 — 12:17 — page 630 — #1
CHAPTER 19
M. Fera et al. / IFAC-PapersOnLine 48-3 (2015) 1720–1725
M. Fera et al. / IFAC-PapersOnLine 48-3 (2015) 1720–1725
Food freezing History and Origin One of the earliest known
AUTOPOIESIS AND SOCIAL SYSTEMS
REAL-TIME SYSTEMS
NETWORK TRAFFIC ANOMALY DETECTION FOR IAAS
FUNCTIONAL-BASED AND ACTIVITY-BASED COST
Government development process in greater detail reveals that there are
Experience with low HSS levels/ ion exchange salt removal
Unless restricted by height, long-period performance groups should contain
Wall systems will typically require two-dimensional continuum models that
REAL-TIME SYSTEMS
explains the new technical standards for robot design and the
1 SOURCE OF THE KNOWLEDGE The data pyramid discussed in
1 SOURCE OF THE KNOWLEDGE The data pyramid discussed in
The Emerald Research Register for this journal is available at The current issue and full text archive of this journal is available at
REAL-TIME SYSTEMS
The transport of microorganisms through porous rock media is a
·
ARTICLE IN PRESS
ARTICLE IN PRESS
ARTICLE IN PRESS
PAPADIMITRATOS LAYOUT 10/19/09 12:36 PM Page 84
InternationalJournalofAccountingInformationSystems23(2016)14–27
devices are designed to capture and record axle weights and
Available online at www.sciencedirect.com
at’s studies, the authors reconfigure the place of public libraries, scriptions to journals and the use of Internet-delivered ab-
[From: Concise history of the language sciences: from the Sumerians to the cognitivists. Edited by
Chapter 12
2015 48th Hawaii International Conference on System Sciences
2015 48th Hawaii International Conference on System Sciences
doi: 10.1111/isj.12119
Computer-AidedDesign43(2011)479–501
2015 48th Hawaii International Conference on System Sciences
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 6 3 1 4 3 7 9 8
Renewable and Sustainable Energy Reviews 70 (2017) 44–49
Developing Tomorrow’s
eHealth in Canada Executive Summary The eHealth industry is a
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 15, NO. 2, APRIL 2014 477
International Journal on AdHoc Networking Systems (IJANS) Vol. 4, No. 3, July 2014
Expert Systems with Applications 38 (2011) 12565–12568
G Model
CHAPTER
CHAPTER
CHAPTER
CHAPTER
CHAPTER
CHAPTER
Handling and maintenance of numbering machines Numbering machines are precision
Abstract The rapid increase in the flow rate of published
International Journal on AdHoc Networking Systems (IJANS) Vol. 4, No. 3, July 2014
One of the most effective methods of secure communications based
One of the most effective methods of secure communications based
Downloaded from http://iranpaper.ir
One of the most effective methods of secure communications based
Accounting and Finance
Competition and information systems The traditional argument says that it
Competition and information systemsThe traditional argument says that it
SAE 2003
WATER SUPPLY IN ECUADOR FLOODS
P1: OTA/XYZ P2: ABC
P1: OTA/XYZ P2: ABC
P1: OTA/XYZ P2: ABC
Introduction to Design and Selection of the System
Introduction to Design and Selection of the System
UNIVERSITE MOHAMMED V DE RABAT
CHAPTER
Expert Systems With Applications 56 (2016) 9–27
Expert Systems With Applications 56 (2016) 9–27
The difference between single phase and 3 phase UPS systems
Please help improve this article by adding citations to reliable
UPS Basics Everything you ever wanted to know about uninterruptible
devices are designed to capture and record axle weights and
devices are designed to capture and record axle weights and
The difference between single phase and 3 phase UPS systems
Please help improve this article by adding citations to reliable
UPS Basics Everything you ever wanted to know about uninterruptible
Transport Policy 29 (2013) 264–274
J. Eng. Technol. Manage. 36 (2015) 1–23
International Journal of Computer Science & Information Technology (IJCSIT) Vol 4, No 1, Feb 2012
Full-Circle Learning
CHP and CCHP Systems Today
Practical guide
Available online at www.sciencedirect.com
This Smart AI Can Now Steal Code to Write Its
This Smart AI Can Now Steal Code to Write Its
International Journal of Computer Science & Information Technology (IJCSIT) Vol 4, No 1, Feb 2012
Research Policy 31 (2002) 213–231
ACKNOWLEDGEMENTS
ACKNOWLEDGEMENTS
BIBLIOGRAPHICAL REVIEW ON RECONFIGURABLE
مدتهاست بشر در آرزوی رسیدن به قسمتهای مختلف بدن موجودات
Available online at www.sciencedirect.com
IET Generation, Transmission & Distribution
بررسی کلاس کاری مدارهای سیستم اعلام حریق
Management Information System
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Rev. Confirming Pages
Open source is good for security because it prevents you
1 Introduction Most security engineers nowadays are largely concerned with
1 Introduction Most security engineers nowadays are largely concerned with
Open source is good for security because it prevents you
2 A commonly used method of protecting against unauthorized changes
you might be one of the many people eagerly awaiting
Journal of Biomedical Informatics 34, 365–376 (2001)
Journal of Biomedical Informatics 34, 365–376 (2001)
�
M a r i t i m e U n
M a r i t i m e U n
E. Bubeníková et al. / IFAC-PapersOnLine 48-4 (2015) 174–179
eAirlines: Strategic and tactical use of ICTs in the airline industry 1
14 Legitimating the social
Foreword
Model Checking
Strengths and Weaknesses
Research Policy 39 (2010) 822–834
AJIS Vol 4 No. 1
s.M. DUNPHY ET
Technovation 31 (2011) 615–626
M. Kapsali / Technovation 31 (2011) 615–626 617
Foreword
Model Checking
Strengths and Weaknesses
Transition Systems
Parallelism and
decision making and control all depend on the effective management
Available online at www.sciencedirect.com
Parametricism
systems currently generate a major fraction of the total Internet
Environmental Modelling & Software xxx (2014) 1e11
Simpo PDF Merge and Split Unregistered Version - http://www.simpopdf.com
Distributed Systems
ChallengesonDistributedWebRetrieval
Service Management Product or service management involves addressing the customer
IX: A Protected Dataplane Operating System for
SAP continues to extend the capabilities of SAP ERP with
SAP continues to extend the capabilities of SAP ERP with
handshaking
Computer Networks 57 (2013) 1344–1371
IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 25, NO. 3, JULY 2010 1501
Human Resource Management Review 23 (2013) 50–70
Introduction Organizations use a number of strategies for improving their
International Journal of Accounting Information Systems 12 (2011) 142–151
Industrial and Systems Engineering
APPENDIX
Nutrition and clinical practice The impact of diet on human
APPENDIX
7th IFAC Conference on Manufacturing Modelling, Management,
Field Crops Research 196 (2016) 357–367
Reasons for ERP Implementation Failures in Some Banks Where there
Reasons for ERP Implementation Failures in Some Banks Where there
2015 International Conference on Cyber Security of Smart cities, Industrial Control System and Communications (SSIC)
04-24 corby 21/1/05 10:39 am Page 4
Pay Systems and Organizational Flexibility
04-24 corby 21/1/05 10:39 am Page 4
Theimportanceof
Theimportanceof
04-24 corby 21/1/05 10:39 am Page 4
Theimportanceof
2015 IEEE/ACM 1st International Workshop on Big Data Software Engineering
Knowledge Management
Knowledge Management
FMTOC.qxd 11/26/12 5:09 PM Page i
Available online at www.sciencedirect.com
8.0 OUTSOURCING MANAGEMENT
8.0 OUTSOURCING MANAGEMENT
8.0 OUTSOURCING MANAGEMENT
Your face is NOT your password
[ABTRACTS]
[ABTRACTS]
[ABTRACTS]
[ABTRACTS]
[ABTRACTS]
[ABTRACTS]
Distribution
سیستم نمونه بردار هوا و آشکارساز دود
CHAPTER 1
CHAPTER 1
CHAPTER 2
The Basics of
The Basics of
CHAPTER 1
CHAPTER 2
CHAPTER 1
Parallelism and
The Basics of
CHAPTER 2
In Hadoop data is distributed across the nodes there by
n 173
Infor mation Systems
Basic Functions of Electronic Commerce Software Software and hardware products
E- Business
Information Systems
4 Understanding Information Retrieval Systems
4 Understanding Information Retrieval Systems
8 Understanding Information Retrieval Systems
16 Understanding Information Retrieval Systems
32 Understanding Information Retrieval Systems
Information Searching and Search Models 37
8 Understanding Information Retrieval Systems
Parallelism and
handshaking
Home Essentials of Patch Management Policy and Practice
Available online at www.sciencedirect.com
COMMUNICATIONS,
COMMUNICATIONS,
Catalog display Shopping cart capabilities Transaction processing Larger complex sites
Catalog display Shopping cart capabilities Transaction processing Larger complex sites
Wireless Pers Commun
A Smart Platform for Large-Scale
·
SOLAR HEATING OF OPEN-AIR SWIMMING POOLS 215
Available online at www.sciencedirect.com
CHAPTER 2
Green Energy and Technology
http://tarjomebazar.com
http://tarjomebazar.com
CYBERSECURITY
Chapter 2
Green Energy and Technology
http://tarjomebazar.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Information & Management 51 (2014) 27–42
CHAPTER 2
CHAPTER 2
CHAPTER 2
عمران- سازه
نحوه تست آشکارساز حرارتی کابلی
obr76817_ch07_270-306.indd Page 272 13/08/10 7:37 PM user-f501 /Users/user-f501/Desktop
Human Information Behavior
28 IEEE JOURNAL OF EMERGING AND SELECTED TOPICS IN POWER ELECTRONICS, VOL. 1, NO. 1, MARCH 2013
ISSN (Online) 2278-1021
It proposed an abstract framework of futuristic learning systems with
In mining operations, queues frequently form during the haulage process as trucks arrive at loaders,
In mining operations, queues frequently form during the haulage process as trucks arrive at loaders,
Available online at www.sciencedirect.com
CHAPTER 4
Planning Theory & Practice
Planning Theory & Practice
Two and Three Phase Equilibrium. Calculations
DIRECTIONS Mayak soak off gel polish must be cured with
The digital representation provides both the elements and the dynamics
Intermsofapplyingthesetypesofanalysistoconstruction,thelimitations
Intermsofapplyingthesetypesofanalysistoconstruction,thelimitations
234 Chapter 5. Quantum Integrability
Chapter 11
پرسنل دارای تایید صلاحیت
Completions Completions Primer Primer
′T ′ ′
Downloaded from http://ijlct.oxfordjournals.org/ by guest on September 5, 2016
TEAMWORK AND ORGANIZATIONAL INNOVATION 1
Church et al. Journal of Cloud Computing: Advances, Systems and Applications
Chapter Scanning Networks
Green Energy and Technology
Chapter 2
AVANZATE TECNOLOGIE PLASTICHE
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
DECSUP-12342; No of Pages 8
DECSUP-12342; No of Pages 8
complexity The underlying theme of complexity theory is that local
International Journal of Accounting & Information Management
Fuzzy Systems and Their Properties 7 Fuzzy Rule Base and
Employee Relations
Some Methodological Issues in Finance Emiliano Ippoliti Abstract The nature
One way we cope is to seek the comfort of
Managing a business today is fundamentally different than it was
82 C H APT E R 1. S U B T O P I C S
The Leadership Quarterly 20 (2009) 631–650
Introduction
and thus a coherent approach is required to fully exploit
Fewer steps, stages and linkages in the flow patterns
and thus a coherent approach is required to fully exploit
:یفرعم
:یفرعم
Complexity theory Overlapping a great deal with complexity theory is
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
and thus a coherent approach is required to fully exploit
and thus a coherent approach is required to fully exploit
Expert Systems with Applications 42 (2015) 679–690
79276
Vol. 4, No. pp. 1593-1606, 1996
2011 American Control Conference
Dental CAD/CAM
Dental CAD/CAM
UAS ROADMAP 2005
DECSUP-12342; No of Pages 8
Available online at www.sciencedirect.com
1112 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 4, JULY 2006
Available online at www.sciencedirect.com
2 SUMMARY
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
DISTRIBUTED SYSTEMS
2.1 Offset Printing 315
This paper presents a layered framework for the purposes of
Available online at www.sciencedirect.com
JOURNAL OF INFORMATION SYSTEMS American Accounting Association
JOURNAL OF INFORMATION SYSTEMS American Accounting Association
Knowledge Management Introducing Knowledge Management
Received:4April2017 Revised:12May2017 Accepted:16May2017
Received:4April2017 Revised:12May2017 Accepted:16May2017
Nanofluidics and
Bundschuh & Chen
Section 1
About the book series
1
1
Behind me stands Milsons point train
Received:4April2017 Revised:12May2017 Accepted:16May2017
IEEJ TRANSACTIONS ON ELECTRICAL AND ELECTRONIC ENGINEERING
Conveyor Systems
CUSTOM
Conveyor Systems
CUSTOM
Conveyor Systems
Conveyor Systems
CUSTOM
Conveyor Systems
CUSTOM
A Programmable Storage System Abstract Storage systems need to support
Predictive Applications Perhaps the most exciting use for Smart Services
Predictive Applications Perhaps the most exciting use for Smart Services
Management and Analysis of Big Graph Data:
Management and Analysis of Big Graph Data:
Nonlinear Dyn (2014) 75:49–61
ICTs for
Accepted Manuscript
Accepted Manuscript
Chapter17
Dit artikel uit Law and Method is gepubliceerd door Boom juridisch en is bestemd voor anonieme bezoeker
Dit artikel uit Law and Method is gepubliceerd door Boom juridisch en is bestemd voor anonieme bezoeker
1542 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 10, NO. 2, MAY 2014
DC converter performs an important role in converting DC power
DC converter performs an important role in converting DC power
About the book series
About the book series
About the book series
there has been a worldwide focus on reducing tillage not
Weather Variability Weather variability is a major issue in the
Weather Variability Weather variability is a major issue in the
A P P E N D I X A
Renewable and Sustainable Energy Reviews 82 (2018) 460–470
in business process
Handbook for Blast-Resistant Design of Buildings
Expert Systems with Applications 40 (2013) 5439–5447
Gregor/The Nature of Theory in IS
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSTE.2018.2810220, IEEE
ElectrificationplanningusingNetworkPlannertool:ThecaseofGhana
MicroSCADA Pro
CHAPTER 5
CHAPTER 5
DecisionSupportSystems97(2017)58–68
users are demanding services that will provide them a fast
CHAPTER
CHAPTER 5
Microprocessors and Microsystems 41 (2016) 67–76
American Journal of Scientific Research
part one guide to design of fire systems
United States A R T I C L E I
A. Car Wash Water Reclamation
CHAPTER 1
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2016.2550765, IEEE
NFPA 1620
Design and operation optimization of organic Rankine cycle coupled
Kaspersky for Business
MANAGEMENT INFORMATION SYSTEMS
Issues in Informing Science and Information Technology Volume 6, 2009
A Taxonomy of Cognitive Artifacts 1
A Taxonomy of Cognitive Artifacts 1
Issues in Informing Science and Information Technology Volume 6, 2009
3.4. COMPUTERISED MANAGEMENT INFORMATION
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Directives are tools applied by the European Union to decree
Directives are tools applied by the European Union to decree
generating increased efforts by both owners and the construction industry
MANAGEMENT INFORMATION SYSTEMS
INTERNATIONAL JOURNAL OF ENERGY RESEARCH
Table 1. Manufacture Performance dimensions.
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, VOL. 29, NO. 6, JUNE 2018 2127
PRODUCTS AND SERVICES Water treatment Systems We provide different purification
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
RESS 2700
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, VOL. 29, NO. 6, JUNE 2018 2127
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, VOL. 29, NO. 6, JUNE 2018 2127
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, VOL. 29, NO. 6, JUNE 2018 2127
Renewable and Sustainable Energy Reviews 65 (2016) 57–80
Renewable and Sustainable Energy Reviews 65 (2016) 57–80
Renewable and Sustainable Energy Reviews 65 (2016) 57–80
Solutions for
Solutions for
Applied Computer Science, vol. 12, no. 3, pp. 37 –46 Submitted: 2016-09-12
AEI 2017 591
9th IFAC Symposium on Nonlinear Control Systems
9th IFAC Symposium on Nonlinear Control Systems
Introduction Drugs have been used throughout history to aid in
Transportation Research Part E xxx (2015) xxx–xxx
Downloaded from http://iranpaper.ir
Recommender System Application Developments: A Survey
Available online at www.sciencedirect.com
Expert Systems with Applications 39 (2012) 11303–11311
92 Y.-H. Hung et al./Knowledge-Based Systems 35 (2012) 87–93
Y.-H. Hung et al./Knowledge-Based Systems 35 (2012) 87–93 93
ge licensed by ingram publishing
ge licensed by ingram publishing
49.1 : Fault Tolerance Techniques for Wireless Ad Hoc Sensor Networks
Expert Systems with Applications 39 (2012) 11303–11311
Information System
based control system installed in buildings that controls and monitors
Automatica, Vol. 33, No. 12, pp. 2159-2177, 1997
Automatica, Vol. 33, No. 12, pp. 2159-2177, 1997
For Peer Review Only
Omega 28 (2000) 249–268
Split by PDF Splitter
Organizational Change
Centre International de
Organizational Change
Organizational Change
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSTE.2018.2810220, IEEE
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSTE.2018.2810220, IEEE
1
methods have been used over the years for many power
246 • Appendix B: How to Evaluate Business Process Analysis Software
MACROERGONOMICS
MACROERGONOMICS
Choosing the right alarm system can be a life and
01_BIM_Project_Execution_Planning_Guide_V2.1_(one-sided) A Building Information Model (BIM) is “a digital representation of physical and functional characteristics
Chapter 7
7.1 Introduction
Industrial Viruses Industrial viruses target systems such as supervisory control
TheItalian case This paper investigates whether a relationship exists between
argues that organisations may improve their performanceby adopting a holistic
7. Conclusions, limitations, and further research
Chapter 5
Chapter 5
Author Manuscript Author Manuscript Author Manuscript Author Manuscript
Author Manuscript Author Manuscript Author Manuscript Author Manuscript
Empirical results indicate that SVM modelprovides more accurate results than
<
<
P A R T I V
International Journal of Transportation Science and Technology 6 (2017) 208–216
3.2 Components of User Experience
BigGraphAnalyticsSystems
BigGraphAnalyticsSystems
International Journal of Production Economics 197 (2018) 342–357
International Journal of Production Economics 197 (2018) 342–357
International Journal of Production Economics 197 (2018) 342–357
لطفا فقط قسمت هایلایت زرد به فارسی ترجمه شود معنی
December 1, 2019 Distributed Systems
November 29, 2019 Distributed Systems
December 1, 2019 Distributed Systems
December 1, 2019 Distributed Systems
December 1, 2019 Distributed Systems
November 29, 2019 Distributed Systems
December 1, 2019 Distributed Systems
December 1, 2019 Distributed Systems
December 1, 2019 Distributed Systems
December 5, 2019 Distributed Systems
December 5, 2019 Distributed Systems
Fully mitigating all EW or EMSO capability gaps may also
The relatively static and inflexible nature of PLA military systems
The KTK system is a parallel organization within all EW
military and those of China and Russia can reveal challenges
forces will include too few of these individual units to
military has an inherent EW and EMSO disadvantage as an
POPULAR HYIP SCRIPTS HYIP script is a software package to
DATA SECURITY IN HYIP PROJECTS As HYIPs are the resources
Contents lists available at ScienceDirect
Renewable Energy
Hybrid Energy System for Remote Area – An Action
IEEETRANSACTIONSON AUTOMATICCONTROL,VOL.58,NO.8,AUGUST2013 2077
Renewable Energy
Contents lists available at ScienceDirect
Hybrid Energy System for Remote Area – An Action
The objective of this research is to develop a formal
DHS Science and Technology Directorate
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/331454334
96060
<
From Safety-I to Safety-II: A White Paper
Volume 7 Number 1 2004 ISBN 0-86176-920-1 ISSN 1352-2752
Volume 7 Number 1 2004 ISBN 0-86176-920-1 ISSN 1352-2752
پایش امنیت سیستم های کنترل صنعتی
Session 6D: Blue Sky AAMAS 2019, May 13-17, 2019, Montréal, Canada
ریزشبکه DC_1
1 Introduction
خودروهای هیبریدی
Automatica62(2015)193–199
6109
7
Micro- and Nano-Scale Robotics
the plane [22]. Planes that used this flight such an easy plane to fly it remained in service
center
0
International Journal of Industrial Ergonomics 68 (2018) 149–164
specification-based and implementation-based techniques. This research appeared to be the first to
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/339240839
This threat relatesto the exploitation of specific vulnerabilities of Data
Technological Forecasting & Social Change 146 (2019) 366–379
Technological Forecasting & Social Change 146 (2019) 366–379
Technological Forecasting & Social Change 146 (2019) 366–379
NFPA 12
NFPA 12
NFPA 12
Technological Forecasting & Social Change 146 (2019) 1–11
Micro Gas Turbine Technology Summary
chapter
1
1
1
1
1
THE 10 ELEMENTS
PRICE
AbstrA ct
مهندسی برق و انرژی
AbstrA ct
CHAPTER 2
CHAPTER 2
Priem Financial Innovation (2020) 6:11
7 Integrating bioherbicides into weed management programmes With many years
0006D_c12_541-587.qxd 10/13/03 21:35 Page 558
ENCYCLOPEDIAOF
ENCYCLOPEDIAOF
“Transformation of the human capital reproduction in line with Industries 4.0 and
5 History of Fluid Power Fluid power is as old
attacks in the sensing or communication layers can compromise the
TEMPEST is the set of standards that determine the The purpose of this study is to present a review of
II. VESSEL COMMUNICATION SYSTEMS SECURITY
3
5
1
VPN Credentials Fortinet has become aware that a malicious actor
VPN Credentials Fortinet has become aware that a malicious actor
Manufacturers that rely on manual or disconnected automated systems will
Computers and Electrical Engineering 81 (2020) 106522
As one of the unfortunate benefactors from the changing business
has rejected antimechanistic construalsof the dynamical approach to cognition in
has rejected antimechanistic construalsof the dynamical approach to cognition in
has rejected antimechanistic construalsof the dynamical approach to cognition in
polymers
Journal Pre-proof
Copyright © 2019 by the author(s). Published here under license by the Resilience Alliance.
opyright © 2019 by the author(s). Published here under license by the Resilience Alliance.
88 PART 1 • SYSTEMS ANALYSIS FUNDAMENTALS
Possible synergies for cyber attack in combination with HPEM attack
88 PART 1 • SYSTEMS ANALYSIS FUNDAMENTALS
88 PART 1 • SYSTEMS ANALYSIS FUNDAMENTALS
E-Business Strategy in Developing Countries
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/337614517
BAE SYSTEMS
This article was downloaded by: [ECU Libraries]
Agricultural Systems 162 (2018) 19–27
Agricultural Systems 162 (2018) 19–27
Knowledge-Based Systems 46 (2013) 109–132
make basic service available at affordable rates so everyone can
This is an extended chapter based on qualitative methods for
AI Risk Management Framework: Second Draft
Introduction The plastics pipes industry revolves around specifications and standards
Introduction The plastics pipes industry revolves around specifications and standards
The Incidence Matrix and its Applications After studying adjacency and
The Incidence Matrix and its ApplicationsAfter studying adjacency and
What is the recommended maximum operating pressure for a PE
AI Risk Management Framework: Second Draft
AI Risk Management Framework: Second Draft
Sales Director Introduction OCMIS is a company that for 50
AUTONOMOUS EMERGENCY BRAKING TEST RESULTS
Engineering
Engineering
paradigm raises challenges for devising efficient strategies that offloadapplications to
Management Accounting Research 55 (2022) 100781
Management Accounting Research 55 (2022) 100781
sustainability
THE IMPACT OF ELECTRONIC DATA INTERCHANGE ON ACCOUNTING SYSTEMS
THE IMPACT OF ELECTRONIC DATA INTERCHANGE ON ACCOUNTING SYSTEMS
Accounting 7 (2021) 755–762
Chapter 7
Chapter 7
Chapter 7
Chapter 7
Chapter 5
Chapter 5
1030 IEEE TRANSACTIONS ON SMART GRID, VOL. 11, NO. 2, MARCH 2020
Chapter 5
Chapter 6
Chapter 6
Chapter 7
Chapter 5
Chapter 4
Chapter 6
Minds and Machines
Downloaded from https://iranpaper.ir
Downloaded from https://iranpaper.ir
ESWA 9318 No. of Pages 10, Model 5G
AI & SOCIETY (2023) 38:1627–1638
The objective of this work is to conceive, develop, test, optimize, and
At present there are not many instances available in the
Federal entities in Canada are supposed to be bound by
Federal entities in Canada are supposed to be bound by
Operations primacy as a basic assumption is understandable within the CAF’s
Executive summary
airspace, and also aircraft having widely differing per- aircraft operators to meet their planned times of departure
Technology in Society 78 (2024) 102644
Technology in Society 78 (2024) 102644
Technology in Society 78 (2024) 102644
space reactor