iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ application
جزئیات خدمات ترجمه در ترجمه تخصصی
network
–p
architecture
architecture
architecture
network security
data
data
Components
Components
[]
[]
Estimating Mobile Application Energy
Air Bearing Application Guide New Way Precision
Simplifying Client-Server Application Development
The Journal of Systems and Software 84 (2011) 1480– 1506
Enterprise architecture patterns for business process support analysis
Software Architecture Definition for On-demand Cloud
SOAMANET: A Tool for Evaluating Service-Oriented Architectures on Mobile Ad-
SOAMANET: A Tool for Evaluating Service-Oriented Architectures on Mobile Ad-
Catering to the complex and dynamically varying needs of business
Catering to the complex and dynamically varying needs of business
Amazon Web Services - Architecting for The Cloud: Best Practices January 2010
Amazon Web Services - Architecting for The Cloud: Best Practices January 2010
Amazon Web Services - Architecting for The Cloud: Best Practices January 2010
How to Write a
Simplifying Client-Server Application Development
Simplifying Client-Server Application Development
www.ijecs.in
Chapter 8
A SURVEY ON SQL INJECTION: VULNERABILITIES, ATTACKS, AND
effective to they spread at the same
effective to they spread at the same
effective to they spread at the same
IEC 27000 international standard have been developed to deal withrisk
IEC 27000 international standard have been developed to deal withrisk
CompRef8 / Cloud Computing: A Practical Approach / Anthony Velte, Toby Velte & Robert Elsenpeter / 694-8
IEEE TRANSACTIONS ON HUMAN-MACHINE SYSTEMS, VOL. 43, NO. 1, JANUARY 2013 115
Enabling Effective Programming and Flexible Management of Efficient Body Sensor
Enabling Effective Programming and Flexible Management of Efficient Body Sensor
此欄由辦理機關處理
香 港 特 別 行 政 區 政 府 入 境 事 務 處 此 欄 由 辦 理 機 關 處 理
Immigration Department
Immigration Department
s patent application shows how the smart lock system could
کامپايلر
کامپايلر
A WSN is a highly dynamic network because nodes die
A WSN is a highly dynamic network because nodes die
A WSN is a highly dynamic network because nodes die
A WSN is a highly dynamic network because nodes die
A WSN is a highly dynamic network because nodes die
A WSN is a highly dynamic network because nodes die
WSNs invariably operate in an unattendedmode and inmany scenarios it
AGGREGATE CONSISTENCY MODELS 17
P1: TIX/XYZ P2: ABC
J.ParallelDistrib.Comput.72(2012)525–535
provides both data and control channels and handles up to
Austroads Provisional Sprayed Seal Design Method - Revision 2000
Austroads Provisional Sprayed Seal Design Method - Revision 2000
Back End System The cron daemon is a long running
*†
Thrift: Scalable Cross-Language Services Implementation
Back End System The cron daemon is a long running
1
Hype Cycle for Application Services This Hype Cycle focuses on
Hype Cycle for Application Services This Hype Cycle focuses on
Hype Cycle for Application Services This Hype Cycle focuses on
Hype Cycle for Application Services This Hype Cycle focuses on
Journal of Systems Architecture 59 (2013) 60–76
s PRESTIGE are specially developed to maintain the balanced condition
IX: A Protected Dataplane Operating System for
The Journal of Systems and Software 86 (2013) 3013– 3023
The Journal of Systems and Software 86 (2013) 3013– 3023
IEEE-20180
The Journal of Systems and Software 86 (2013) 3013– 3023
Computers and Electrical Engineering 38 (2012) 1785–1797
2013 8th International Conference on Information Technology in Asia (CITA)
Mobile Marketing Strategies for Permission-based Communication:
The Journal of Systems and Software 86 (2013) 3013– 3023
NATIONAL
2013 8th International Conference on Information Technology in Asia (CITA)
2013 8th International Conference on Information Technology in Asia (CITA)
Part II
SQL Injection Attacks and Defense
AU2310 half title 8/10/05 1:57 PM Page 1
AU2310 half title 8/10/05 1:57 PM Page 1
AU2310 half title 8/10/05 1:57 PM Page 1
American Journal of Plant Sciences, 2014, 5, 541-548
0 and later versions is quite different from that of
2011 Fourth International Conference on Intelligent Networks and Intelligent Systems
2011 Fourth International Conference on Intelligent Networks and Intelligent Systems
5.14 Problems 287
Constructing a Remote Monitoring and Control
We do not mean to suggest that there are no
Defining Code-injection Attacks
2 3 2 C h a p t e r 1 3 • U n d e r s t a n d i n g A v a i l a b i l i t y
SALTZER ET AL. End-to-End Arguments in System Design 1
Advanced Android Tutorial
Android Tutorial
Advanced Android Tutorial
Android Tutorial
Pak. J. Bot., 45(3): 933-940, 2013.
Pak. J. Bot., 45(3): 933-940, 2013.
We do not mean to suggest that there are no
We do not mean to suggest that there are no
Consider expedited examination Prioritized Examination Accelerated Examination Program First Action
Consider expedited examination Prioritized Examination Accelerated Examination Program First Action
Consider expedited examination Prioritized Examination Accelerated Examination Program First Action
Consider expedited examination Prioritized Examination Accelerated Examination Program First Action
YOUR INQUIRY We understand that you are seeking general information
DRAFT CLOUD COMPUTING SYNOPSIS AND RECOMMENDATIONS
Title
In 21st century the world faces various energy problems. Economical growth depends too
Mobile photo sharingservice enables mobile users to upload images
CONTENTS Main technical data Main equipment list Introduction of main
CONTENTS Main technical data Main equipment list Introduction of main
CONTENTSMain technical dataMain equipment listIntroduction of main
Int. J. Production Economics 142 (2013) 205–210
Security in distributed systems is a complex issue which can
J. econ. finance adm. sci, 18(34), 2013, 16-23
578 IEEE TRANSACTIONS ON RELIABILITY, VOL. 55, NO. 4, DECEMBER 2006
2010 Second International Conference on Future Networks
SALTZER ET AL. End-to-End Arguments in System Design 1
chapter 1 ■ INtrODUcING the cataLYSt WeB appLIcatION FraMeWOrK 13
Edible coatings based on hydroxyl propylmethylcellulose containing an ethanolicextract of
INTEGRATION OF CONCEPTUAL DATA
Volume 4, Issue 8, August 2014 ISSN: 2277 128X
Preface
There is no offloading of replication tasks and replication management
G Model
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
The extension of database application to handle multimedia objects requires
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
TinyOS – An Operating System for Tiny Embedded Networked Sensors
TinyOS – An Operating System for Tiny Embedded Networked Sensors
s camera and instead focus on image stabilization and software
s camera and instead focus on image stabilization and software
s camera and instead focus on image stabilization and software
STEP MODEL OF MIGRATION INTO A CLOUD Typically migration initiatives
Tests of validity ensure that for a process that is
There are economic and business reasons why an enterprise application
There are economic and business reasons why an enterprise application
Sensors 2015, 15, 7571-7595; doi:10.3390/s150407571
SLA-Based Resource Provisioning for
Replication 299
There is no offloading of replication tasks and replication management
Replication 299
In order to be able to change the design of
App launched for helping deaf people to communicate Sanad Relay
definition One of the most important papers that discusses related
2014 IEEE 10th World Congress on Services 2014 IEEE 10th World Congress on Services 2014 IEEE 10th World Congress on Services
I.J.Modern Education and Computer Science, 2013, 9, 45-52
Agile, Dynamic Provisioning of Multi-tier Internet Applications
Jaeger uses data mining to reduce losses from crime and
149011
IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 16, NO. 1, FIRST QUARTER 2014 393
Abstract
Abstract
WANG3_LAYOUT_Layout 5/30/14 1:12 PM Page 32
CROSS-LAYER SCHEDULING IN CLOUD COMPUTING
Dear!
2012 Network Technologies
journal of information security and applications 18 (2013) 130e137
Lecture Notes in Computer Science 5525
Grid: An Architectural Pattern
CHAPTER
+An Evaluation of Web Services in the Design of a B2B Application
Model-Driven Product-Line Architectures for
2011Academic Journals Full Length Research Paper Construction planning supported in
Prevention of Cross-Site Scripting Attacks
XSS-GUARD: Precise Dynamic Prevention of
TheJournalofLogicandAlgebraicProgramming 78(2009)340–358
Abstract Efficient provisioning of resources is a challenging problem in
Abstract Efficient provisioning of resources is a challenging problem in
Abstract Efficient provisioning of resources is a challenging problem in
Build your first Node.js website, Part 1
How to work with services and notifications Some types of
How to work with services and notifications Some types of
intensive applications that are mission critical to your business perform
intensive applications that are mission critical to your business perform
intensive applications that are mission critical to your business perform
intensive applications that are mission critical to your business perform
intensive applications that are mission critical to your business perform
J Supercomput
J Supercomput
Agile, Dynamic Provisioning of Multi-tier Internet Applications
J Supercomput
J Supercomput
Autonomic Resource Provisioning for
This article was downloaded by: [Memorial University of Newfoundland]
This article was downloaded by: [Memorial University of Newfoundland]
END ARGUMENTS IN SYSTEM DESIGN This paper presents a design
Pjur med pro-long spray Description An enhancement product to prolong a man's pleasure
CHAPTER
FutureGenerationComputerSystems32(2014)27–40
Contents lists available at ScienceDirect
performance of the application at peak load was a single
Journal of Network and Computer Applications 58 (2015) 42–59
R.W. Ahmad et al. / Journal of Network and Computer Applications 58 (2015) 42–59 49
Aluminium Brazing with Non-corrosive Fluxes
Aluminium Brazing with Non-corrosive Fluxes
01-P1503 10/24/2000 5:07 PM Page 1
R.W. Ahmad et al. / Journal of Network and Computer Applications 58 (2015) 42–59 49
Journal of Network and Computer Applications 58 (2015) 42–59
dimensions
R h a i n f o s e c . c o m
348 Abstracts / Photodiagnosis and Photodynamic Therapy 12 (2015) 325–375
an automated technique that tests Android apps via their Graphical
348 Abstracts / Photodiagnosis and Photodynamic Therapy 12 (2015) 325–375
348 Abstracts / Photodiagnosis and Photodynamic Therapy 12 (2015) 325–375
348 Abstracts / Photodiagnosis and Photodynamic Therapy 12 (2015) 325–375
Security
Int. J. Environ. Sci. Technol. (2014) 11:927–934
Int. J. Environ. Sci. Technol. (2014) 11:927–934
Int. J. Environ. Sci. Technol. (2014) 11:927–934
data compression zlib
Int. J. Environ. Sci. Technol. (2014) 11:927–934
Int. J. Environ. Sci. Technol. (2014) 11:927–934
Int. J. Environ. Sci. Technol. (2014) 11:927–934
Then the resource everyone takes for granted is a major
computers & security 43 (2014) 205e218
AGREEMENT FOR SERVICES AND FEES
Product Data
Product Data
Product Data
TSplus White Paper
P P a a r r t t I I I I I I :: C C ll o o u u d d C C o o m m p p u u t t ii n n g g a a t t W W o o r r k k
is dedicated to the advancement of a fuller understanding of
from developing countries who are interested in coming to New
285 Notre-Dame Street West, 4th Floor
Software-Defined Cloud Computing: Architectural
intrusive process that captures a facial image with a digital
Important Information This version of the TRA Migration Skills Assessment
Important Information This version of the TRA Migration Skills Assessment
, . ~ ....• ~ ......, .. ':... ' .•.-.. ;'-';'.: ..... .:....:.:::-:;.,~~':~~ ::...'~~}.::....':'-~.,;;..,.!:.:
A Survey of Commercial Frameworks for
AnalyzingInter-ApplicationCommunicationinAndroid
AnalyzingInter-ApplicationCommunicationinAndroid
AnalyzingInter-ApplicationCommunicationinAndroid
Journal of Network and Computer Applications 48 (2015) 99–117
Journal of Network and Computer Applications 48 (2015) 99–117
IJCST V o l . 4, ISSue 1, J a n - M a r C h 2013 ISSN : 0976-8491 (Online) | ISSN : 2229-4333 (Print)
Ambitious applications must fight OS
Dark Silicon Aware Runtime Mapping for Many-core Systems: A
Ambitious applications must fight OS
Journal of Network and Computer Applications 47 (2015) 99–106
Journal of Network and Computer Applications 47 (2015) 99–106
Information Management and Business Review
Information Management and Business Review
Information Management and Business Review
of the variance. SEM is a set of statistical techniques that allow the testing of a set of relationships that are
management accounting information systems. This is in accordance with the findings mentioned by
Information Management and Business Review
of the variance. SEM is a set of statistical techniques that allow the testing of a set of relationships that are
management accounting information systems. This is in accordance with the findings mentioned by
management accounting information systems. This is in accordance with the findings mentioned by
The Effect of Organizational Culture on the Application of Management Accounting Information
Y = 0.364X + 0.484 X + 0.168 X + 0.105
World Academy of Science, Engineering and Technology
CHAPTER
World Academy of Science, Engineering and Technology
1
6 IEEETRANSACTIONSONCLOUDCOMPUTING, VOL.4, NO.1, JANUARY-MARCH2016
Software-Defined Cloud Computing: Architectural
C H A P T E R 2
Available online at www.sciencedirect.com
IMPROVING RESOURCE EFFICIENCY IN CLOUD COMPUTING
قابلیت های امنیتی فایروال های juniper
1 WSSO System
1 WSSO System
Processor share received by dhrystones MPEG decoding with background compilations Interactive application with background simulations
Processor share received by dhrystones MPEG decoding with background compilations Interactive application with background simulations
I am replying to your email of 21 June 2015
DroidGlove: An Android-Based Application for
Journal of Network and Computer Applications 34 (2011) 1–11
Chapter 4
Chapter 4
Chapter 4
It may require tailoring to suit a specific client and
It may require tailoring to suit a specific client and
It may require tailoring to suit a specific client and
Available online at www.sciencedirect.com
OWASP Papers Program
Reviewed Paper ISSN (Online): 2348-8557
Laravel is a web application framework with expressive, elegant syntax. We believe
The Natural Solution
The Natural Solution
Chapter 3 provides an introduction to some of these disciplines
Chapter 3 provides an introduction to some of these disciplines
Chapter 3 provides an introduction to some of these disciplines
بحثits recombinogenic activity is alsoknown and it has
Bartłomiej Kołakowski
The Perfect Online Application Businesses are increasingly turning to online
which confuses the issue of which messaging system an application
which confuses the issue of which messaging system an application
Aligning RFID applications with supply chain strategies Many large retailers
Aligning RFID applications with supply chain strategies Many large retailers
c o m p u t e r m e t h o d s a n d p r o g r a m s i n b i o m e d i c i n e 1 3 0 ( 2 0 1 6 ) 154–161
ISSN 2409-26 65
Science of Computer Programming 102 (2015) 1–19
ISSN(Online) : 2319-8753
ARTICLE IN PRESS
Information Technology & People
Information Technology & People
ARTICLE IN PRESS
Several provisions of the BPCI Act will impact patent prosecution
JournalofBusinessResearch68(2015)360–370
JournalofBusinessResearch68(2015)360–370
NET to create the class files associated with your data
C H A P T E R 2
C H A P T E R 2
Computer Networks 113 (2017) 17–28
Downloaded from http://iranpaper.ir
32 The Counseling Practicum and Internship Manual
J. Eng. Technol. Manage. 29 (2012) 3–21
Accessing Cloud Storage using the Android Storage Access Framework Recent
Accessing Cloud Storage using the Android Storage Access Framework Recent
belonging to the activity class being called when the button
Accessing Cloud Storage using the Android Storage Access Framework Recent
belonging to the activity class being called when the button
Accessing Cloud Storage using the Android Storage Access Framework Recent
Information technology
Information technology
Information technology
بررسی راهکاری برای بالا بردن امنیتWeb Application و Website مرتضی
Computer Network Project
09 January 2017
Growth Retardants and Cereals Pioneering studies in the 19th century
c o m p u t e r m e t h o d s a n d p r o g r a m s i n b i o m e d i c i n e 1 3 0 ( 2 0 1 6 ) 154–161
tCloud computing and the Internet of Things are the two
2016 IEEE First International Conference on Internet-of-Things Design and Implementation
Journal of Network and Computer Applications xx (xxxx) xxxx–xxxx
Proceedings of the 50th Hawaii International Conference on System Sciences | 2017
2016 This document is required to be completed for all
s PCT publishes 3 millionth international patent application By Catherine
Islamic Republic Of Afghanistan جمهوری اسلامی افغانستان Passport Application Form فورمه درخواست پاسپورت
Fortiweb and FortiAnalyzer Devices
GreenPeak White Paper
JACC: BASIC TO TRANSLATIONAL SCIENCE VOL. -,NO. -,2016
Distributed Systems
denim
IX: A Protected Dataplane Operating System for
Distributed Systems
168 Essentials of Cloud Computing
168 Essentials of Cloud Computing
_______________________________________________________PROCEEDING OF THE 16TH CONFERENCE OF FRUCT ASSOCIATION
Dictionary Attack on Wordpress: Security and
CHAPTER 2
CHAPTER 2
CHAPTER 2
The existence of a dispute has to stand objectively by
existing literature reviews fall into either of the following two
existing literature reviews fall into either of the following two
existing literature reviews fall into either of the following two
Downloaded from http://iranpaper.ir
Journal of Theoretical and Applied Electronic Commerce Research This paper is available online at
Journal of Theoretical and Applied Electronic Commerce Research This paper is available online at
Journal of Theoretical and Applied Electronic Commerce Research This paper is available online at
Journal of Theoretical and Applied Electronic Commerce Research This paper is available online at
Journal of Theoretical and Applied Electronic Commerce Research This paper is available online at
middleware is an important enabler which provide communication among heterogeneous
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
168 Essentials of Cloud Computing
CHAPTER 2
ARTICLE IN PRESS
1
CHAPTER 2
CHAPTER 2
CHAPTER 2
BOINC: A System for Public-Resource Computing and Storage
International Journal of Computer Applications (0975 – 8887)
Guide for the Selection of Chemical,
FortiWeb Unprotected web applications are the easiest point of entry
Submit Comment Please confirm your email address to complete your
Parallels RAS v16 Virtual application and desktop delivery can be
8/31/2017 API Service Terms and Conditions | Envato API
Computers in Human Behavior 63 (2016) 392e407
Storage Area
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 8 2 2 9 3 4 8 7
Kindly note that it is not possible to modify the
Kindly note that it is not possible to modify the
Kindly note that it is not possible to modify the
Kindly note that it is not possible to modify the
Kindly note that it is not possible to modify the
white background Passport Must be valid for no less than
Charitable or Voluntary Activities Documents Required Visa application form Completed
Conferences Documents Required Visa application form Completed Visa application Form
Visits to Family or Friends Documents Required Visa application form
Medical Visit Documents Required Visa application form Completed Visa application
Research Documents Required Visa application form Completed Visa application Form
white background Passport Must be valid for no less than
Study Purposes Documents Required Visa application form Completed Visa application
Int J Syst Assur Eng Manag
FortiGuard Security Subscriptions New cyber threats emerge every moment of
Kindly note that it is not possible to modify the
Passport Photograph
Passport Photograph
Farid Vosoughi
Applied Computing and Informatics xxx (2017) xxx–xxx
1
1 Overview Operating a mature Architecture Capability within a large
SQLiteOpenHelper
Accessibility Testing Criteria for Android Applications
s application for Victorian Government visa nomination under the 188A
Freezone Sohar General Trading License Application Form, version
Potential Options for Appropriate Business Visa Applications We refer to
erable attention over the past two decades in photovoltaic and
erable attention over the past two decades in photovoltaic and
Form
24 Feb 2018
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 3 0 8 9 6 8 9 3 6
Helmholtz Innovation Labs
based understanding of the underpinning natural and physical sciences and
2015 IEEE 8th International Conference on Cloud Computing
BIAN How-to Guide Design Principles & Techniques V6.0
sensors
Cloud-FogInteroperabilityinIoT-enabledHealthcareSolutions
Cloud-FogInteroperabilityinIoT-enabledHealthcareSolutions
Citizenship and Citoyenneté et
The ultimate guide to becoming a database administratorWhat is
What Is Software Risk And
Information System
Previous research in the area of SMS security can be
Previous research in the area of SMS security can be
Based on the results of our analysis on how SMS
Concatenated SMS Messages Concatenation provides the means to compose SMS
7.1 TLS Usage
and 3 sets of the photocopies of the original Completed
DPR OF KOREATHE 22nd PYONGYANG SPRING INTERNATIONAL TRADE FAIR
isolatescloser dependencies between specific hardware architectureand software systems to achieve
Date: June 15, 2019
Date: June 15, 2019
4in order to determine the handling of a subscriber initiated
Student Visa Letter When a student wishes to apply for
A letter of Employment for Visa application is written to
welcome back to another one through eight application development tutorial
قرارداد وکالت مهاجرت
•
is a simulated cyber attack against your computer system to
attack What is MITM attack A man in the middle
Apache CouchDB is an Open Source database management software published
7 Integrating bioherbicides into weed management programmes With many years
7/7/2021 Call for applications Scholarship - Academic Year 2021/2022 Summary Page Art. 1 reference standards ........................
2
3
In consideration of the fees paid and the matter stated
Phone 1: +1 604 566 2230
How To Choose the Best Refractory Material We commonly hear
How to Implement a Zero Trust Security Strategy How Does
How to Implement a Zero Trust Security Strategy How Does
explain how to find and exploit various kinds of SQL
These advanced firewalls cover the gamut of traditional firewall services
+1 (236) 335-2020
Response:
RETAINER AGREEMENT
Guide for Applicants for Admission as a Lawyer (Version 2.0) 22 July 2016
OW ASP Mobile Application Security T esting Guide v1.6.0