iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ Techniques
جزئیات خدمات ترجمه در ترجمه تخصصی
sternum
cache
cache
–
–
diplomatic
The automatic analy
Machine learning techniques are able to examine and to extract
2011 IEEE Symposium on Computers & Informatics
www.ijecs.in
Available online at www.sciencedirect.com
Methods of future and scenario analysis
814 S. Jain et al / Phys Med Rehabil Clin N Am 15 (2004) 811–825
Downloaded from http://bioinformatics.oxfordjournals.org/ at Universiti Teknologi Malaysia on December 4, 2012
INFOCOMP 2013 : The Third International Conference on Advanced Communications and Computation
DEVELOPMENT POLICY ANALYSIS 9
Ad Hoc Networks 11 (2013) 1062–1074
Fabrication of Microreactors Made from Metals and Ceramics The material
Materials Letters 95 (2013) 121–124
Materials Letters 95 (2013) 121–124
disciplinary therapeutic opportunities using the medium of animation to work
Role Analysis of IT in Business Process
60 S. Srinivasulu and A. Jain
5 Rainfall-Runoff Modelling: Integrating Available Data and Modern Techniques 61
UKAIS 2009, Oxford , UK
UKAIS 2009, Oxford , UK
Fishing techniques
A robust chaotic algorithm for digital image steganography a b
A robust chaotic algorithm for digital image steganography a b
Design principles 71
manual for mental health professionals
Software Testing Techniques
E-commerce Product Search: Personalization,
IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), May 09-11, 2014, Jaipur, India
Problem Solving Management Using Six Sigma Tools & Techniques
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 2, MARCH/APRIL 2012 159
Problem Solving Management Using Six Sigma Tools Techniques
Role Analysis of IT in Business Process
Data Mining in Financial Application Dongsong Zhang and Lina Zhou
TARGET COSTING IN THE AUTOMOTIVE INDUSTRY:
TARGET COSTING IN THE AUTOMOTIVE INDUSTRY:
XML Template (2013) [21.6.2013–3:13pm] [1–15]
XML Template (2013) [21.6.2013–3:13pm] [1–15]
XML Template (2013) [21.6.2013–3:13pm] [1–15]
The distribution of analytical techniques in policy advisory
We are developing novel methods for linking human whole genome
We are developing novel methods for linking human whole genome
the performance of the algorithm is very sensitive to the
To study the transmission of weaving techniques and the designs
has long been contributing to the successful management of banking
has long been contributing to the successful management of banking
Computers and Electrical Engineering 38 (2012) 1062–1072
Automatic network intrusion detection: Current techniques
Digital Watermarking
Abstract —Field-weakening techniques have been developed
Information Sciences xxx (2014) xxx–xxx
A Short Survey on Image Steganography and
2014 IEEE 13th International Symposium on Network Computing and Applications 2014 IEEE 13th International Symposium on Network Computing and Applications
Microelectronics Reliability 54 (2014) 1050–1055
Computer-AidedDesign58(2015)105–116
Animation Support in a User Interface Toolkit:
IEEETRANSACTIONSON VOL. NO. AUGUST 1979 227
re bringing in lots of traffic thanks to the highly
Fig. 7.10 The eight principal orthogonal functions describing the sea surface temperature anomalies (from
are a tribe of nomads living in the southern seas
a great deal of emphasis has been placed on the
Soil Improvement Through Vibro-compaction and Vibro-replacement
Scenario analysis is useful because it serves as a vehicle
since multimedia data are unstructured by nature therefore mining the
Barcelona Film School Master in 2D animation and implementation Although
Database Systems Journal vol. III, no. 3/2012 داده کاوی با استفاده از رایانش ابری
Sources of information The alerts generated by monitoring systems are
we have found some research efforts suggesting alternative methods like
we have found some research efforts suggesting alternative methods like
Sources of information The alerts generated by monitoring systems are
Taxonomy of alert correlation techniques After a thorough review of
Computers and Electrical Engineering 38 (2012) 1062–1072
computers & security 28 (2009) 18–28
Beheshti Univ Dent J 2015; 32(4): 225-231 Original Article
h
h
Parental acceptance of pediatric behavior
The search engine user types his keywords or questions and
toward a Framework for Enhancing the Business Value of IT
Preface to the revised second edition Welcome to this revised
Preface to the revised second edition Welcome to this revised
Over few decade digital filters has developed many applications on
Rapid development has promoted the 3D land use in the
Introduction and remote-sensing methods have been proposed to collect human
Introduction and remote-sensing methods have been proposed to collect human
Introduction and remote-sensing methods have been proposed to collect human
CHAPTER 1
1
Available online at www.sciencedirect.com
158 4 Catalyst Characterization
abstract
The research is an examination of the relationship of organizational activities, decisionmaking style, strategic
JPMA-01513; No of Pages 14
386 Chapter 8 Nondestructive Testing in Concrete Engineering
8.1 Introduction 387
388 Chapter 8 Nondestructive Testing in Concrete Engineering
Applying Data Mining
32 Cuyler & Halpin
49895-1
49895-2
Introduction The techniques of surface enrichment of jewellery and other
ISSN:2321-1156
ISSN:2321-1156
ISSN:2321-1156
7.3 DIELECTRIC WAVEGUIDE ANALYSIS TECHNIQUES 425
Applications of Artificial Intelligence and Related Techniques to Improve the
2 Semantic Web The Web doubles in size every eight
2 Semantic Web The Web doubles in size every eight
1 Artificial Intelligence and Related Techniques Applied to Semantic Web
1 Artificial Intelligence and Related Techniques Applied to Semantic Web
2 Semantic Web The Web doubles in size every eight
3
3
forecasts will differ across the different stages of the newproduct
Air pollutant emissions which will exceed federal or state standards
The items were derived from the literature and refined on
Data mining and knowledge discovery in databases have been attracting
Fraud can be seen in all insurance types including health
practices reveals that firms have made substantial progress in reducing
توضیحات چند فایل آموزشی 02
Researchers have developed and applied a variety of approachesfor multi-criteria decision-making for the green supplier selection
406 Hakan Hac~giimiig, Bijit Hore, Bala Iyer, and Sharad Mehrotra
406 Hakan Hac~giimiig, Bijit Hore, Bala Iyer, and Sharad Mehrotra
the intelligent fault detection system plays a crucial role for
Testing of Hypotheses-II 301
Modern electronic health records are designed to capture
Duplicate blinds Saffron(Crocus sativus L.)throughTissue culture Abstract Plant tissue culture techniques to measure progressWith the implementation of plant species that it can be produced in vitro
Journal of Management Research
ZHANG_LAYOUT.qxp_Author Layout 7/6/15 2:59 PM Page 86
MICROBIAL ECOLOGY OF HANDMADE DAIRY
MICROBIAL ECOLOGY OF HANDMADE DAIRY
MICROBIAL ECOLOGY OF HANDMADE DAIRY
http://jecei.srttu.edu
Distributed Database Management Techniques
Distributed Database Management Techniques
Computers in Human Behavior xxx (2015) xxx–xxx
Computers in Human Behavior xxx (2015) xxx–xxx
Computers in Human Behavior xxx (2015) xxx–xxx
JPMA-01776; No of Pages 25
SOFT COMPUTING TECHNIQUES FOR PROCESS
Computers in Human Behavior xxx (2015) xxx–xxx
Computers in Human Behavior xxx (2015) xxx–xxx
than the forms in which power is exercised by and
than the forms in which power is exercised by and
than the forms in which power is exercised by and
Chapter 12
A Survey and Analysis of Techniques for Player Behavior Prediction
11
Detecting Anomalies in Online Social Networks using Graph Metrics Abstract
CBU INTERNATIONAL CONFERENCE ON INNOVATION, TECHNOLOGY TRANSFER AND EDUCATION
Journal of Network and Computer Applications 77 (2017) 18–47
Innovative Methods for Mold Design and Fabrication
Aware Personalized User Recommendations in Social Networks Abstract Trust is
I
Context Reasoning Decision Models Context reasoning can be defined as
Johnson/Hansen: The Visualization Handbook Page Proof 11.6.2004 9:04am page 813
IIMB Management Review (2017) 29,29–44
Psychological Science in the
Psychological Science in the
7.5.4 Other types of imaging
PredictingtheSeverityofBreastMasseswithData MiningMethods Abstract Mammography isthe most effective and available tool
PredictingtheSeverityofBreastMasseswithData MiningMethods Abstract Mammography isthe most effective and available tool
FutureGenerationComputerSystems ( ) –
PredictingtheSeverityofBreastMasseswithData MiningMethods Abstract Mammography isthe most effective and available tool
1
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎-∎∎∎ 1 2 3 4 5 6 7 8 9 10 11 12
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎-∎∎∎ 1 2 3 4 5 6 7 8 9 10 11 12
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎-∎∎∎ 1 2 3 4 5 6 7 8 9 10 11 12
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎-∎∎∎ 1 2 3 4 5 6 7 8 9 10 11 12
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 8 4 4 3 7 9 2 4
International Journal of Computer Science & Information Technology (IJCSIT) Vol 3, No 6, Dec 2011
proposed an unsupervised approach for sentiment polarity detection from twitter
1
ISSN: 0976-5697
TO
TO
InformationSciences324 (2015) 60–87
InformationSciences324 (2015) 60–87
Classification for Fraud Detection with Social
Enterprise / MSSP / Law-enforcement
CHAPTER 3
CHAPTER 3
CHAPTER 3
Proceedings of the IEEE 2017 International Conference on Computing Methodologies and Communication
Proceedings of the IEEE 2017 International Conference on Computing Methodologies and Communication
QuantitativeAnalysisofControlFlowCheckingMechanisms
1
QuantitativeAnalysisofControlFlowCheckingMechanisms
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 11, Number 4 (2016) pp 2411-2416
14-th IFAC Symposium on Control in Transportation Systems
giving more importance to the idea being expressed by an
Recommender System Application Developments: A Survey
Expert Systems with Applications 39 (2012) 11303–11311
Downloaded from http://iranpaper.ir
Expert Systems with Applications 39 (2012) 11303–11311
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSE.2017.2671865, IEEE
methods have been used over the years for many power
Accident/Incident Prevention Techniques
A survey of real locomotion techniques for immersive virtual reality applications on head-mounted displays
Research Issues and Challenges in Content Placementand Delivery Strategies Abstract
KNOWLEDGE SHARING SYSTEMS: SYSTEMS THAT ORGANIZE AND DISTRIBUTE KNOWLEDGE 1
11
12
Software Testing Techniques
Software Testing Methods and
Software Testing Techniques
specification-based and implementation-based techniques. This research appeared to be the first to
MOBILE AGENTS AND SECURITY
MOBILE AGENTS AND SECURITY
CK Framework to Fight Ransomware Attacks Chinese military general Sun
Chapter 13
Two particularly important components of brand knowledge are brand awareness
TABLE 1. Comparative study of existing techniques for cryptocurrency price prediction.