iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ computer
جزئیات خدمات ترجمه در ترجمه تخصصی
network
memory
intelligence
artificial
[]
TrustPort Internet
your
Five Tips to Enhanc
Five Tips to Enhanc
cluster
cluster
also
دیکشنری کامپیوتر
Computer
engineering
systems
systems
computer
engineering
An Optimization of Security and Trust Management
6 List of Table Table 1 classification of detection principal
6 List of Table Table 1 classification of detection principal
6 List of Table Table 1 classification of detection principal
:i'..1:::-':
:i'..1:::-':
CHAPTER 13 Audience Demand for TV Over the Internet John
123 Artificial Intelligence: Applications Now and into the Future A.I. Future Tech Joshuah Landon Tiesman, Yahoo Contributor Network
The small company where you work needs to implement a
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
286 Nikolai Matni et al. / Procedia Computer Science 28 ( 2014 ) 285 – 293
Nikolai Matni et al. / Procedia Computer Science 28 ( 2014 ) 285 – 293 287
288 Nikolai Matni et al. / Procedia Computer Science 28 ( 2014 ) 285 – 293
Nikolai Matni et al. / Procedia Computer Science 28 ( 2014 ) 285 – 293 289
290 Nikolai Matni et al. / Procedia Computer Science 28 ( 2014 ) 285 – 293
Nikolai Matni et al. / Procedia Computer Science 28 ( 2014 ) 285 – 293 291
292 Nikolai Matni et al. / Procedia Computer Science 28 ( 2014 ) 285 – 293
286 Nikolai Matni et al. / Procedia Computer Science 28 ( 2014 ) 285 – 293
Nikolai Matni et al. / Procedia Computer Science 28 ( 2014 ) 285 – 293 287
288 Nikolai Matni et al. / Procedia Computer Science 28 ( 2014 ) 285 – 293
Nikolai Matni et al. / Procedia Computer Science 28 ( 2014 ) 285 – 293 289
290 Nikolai Matni et al. / Procedia Computer Science 28 ( 2014 ) 285 – 293
Nikolai Matni et al. / Procedia Computer Science 28 ( 2014 ) 285 – 293 291
292 Nikolai Matni et al. / Procedia Computer Science 28 ( 2014 ) 285 – 293
Available online at www.sciencedirect.com
286 Nikolai Matni et al. / Procedia Computer Science 28 ( 2014 ) 285 – 293
286 Nikolai Matni et al. / Procedia Computer Science 28 ( 2014 ) 285 – 293
Nikolai Matni et al. / Procedia Computer Science 28 ( 2014 ) 285 – 293 287
288 Nikolai Matni et al. / Procedia Computer Science 28 ( 2014 ) 285 – 293
Nikolai Matni et al. / Procedia Computer Science 28 ( 2014 ) 285 – 293 289
290 Nikolai Matni et al. / Procedia Computer Science 28 ( 2014 ) 285 – 293
Nikolai Matni et al. / Procedia Computer Science 28 ( 2014 ) 285 – 293 291
292 Nikolai Matni et al. / Procedia Computer Science 28 ( 2014 ) 285 – 293
Available online at www.sciencedirect.com
000 From Peter Thiel To Ditch College An inventor behind
000 From Peter Thiel To Ditch College An inventor behind
5 Myths of Antivirus Everyone wants to keep their computers
A hack shown off by Dutch security researchers allows an
changes to home page and search engine settings in the
changes to home page and search engine settings in the
This process ends with a check to ensure the very
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012
CHAPTER 2
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 1, November 2012
CHAPTER 2
CHAPTER 2
CHAPTER 2
5.7. Comparison of the SIMD and MIMD models of computation. As the
is a system that perceives its environment and takes actions
is a system that perceives its environment and takes actions
is a system that perceives its environment and takes actions
history of artificial intelligence and timeline of artificial intelligence In
THE COMPLEXITY OF ANALOG COMPUTATION †
CHAPTER 3
22 CHAPTER 1 / INTRODUCTION
22 CHAPTER 1 / INTRODUCTION
161
Kabul Education University Hardware Natural Science Faculty
161
Haag−Cummings: © The McGraw−Hill
ﻪﺳﺭﺪﻣ ﻭ ﻩﺎﮕﺸﻧﺍﺩ ﻊﺟﺮﻣ ﻝﻮﭘﻮﭘ
Haag−Cummings: © The McGraw−Hill
Haag−Cummings: © The McGraw−Hill
A personal computer (PC) is a general-purpose computer, whose size, capabilities and original sale price makes it useful for individuals, and is
A personal computer (PC) is a general-purpose computer, whose size, capabilities and original sale price makes it useful for individuals, and is
A personal computer (PC) is a general-purpose computer, whose size, capabilities and original sale price makes it useful for individuals, and is
Haag−Cummings: © The McGraw−Hill
While film used in cinema contains pigments that create an
and which is intended to be operated directly by an
It works under the control of a set of Instructions
It works under the control of a set of Instructions
such as running a spreadsheet program or accessing information from
It works under the control of a set of Instructions
Procedia Computer Science 17 ( 2013 ) 426 – 433
Procedia Computer Science 17 ( 2013 ) 426 – 433
Available online at www.sciencedirect.com
Seeking an Appropriate Thecnology
Seeking an Appropriate Thecnology
Seeking an Appropriate Thecnology
The Internet has made it possible for people all over
ACSIJ Advances in Computer Science: an International Journal, Vol. 3, Issue 1, No.7 , January 2014
IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.10, October 2006
time habit of writing only of work that has been
4.5 (Time semantics). Let N a STPN
International Journal of Engineering and Advanced Technology (IJEAT)
Weighing the rules of justice and the role of individual
Weighing the rules of justice and the role of individual
Weighing the rules of justice and the role of individual
338 15 Virus and Content Filtering
S. J. Gath et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (6), 2012,5315-5321
10 widescreen LCD monitor A monitor or a display is
Computer monitor Cathode ray tube The first computer monitors used
Software Development
or trade show attendees change the settings on a public
injected genetic algorithms for learning to play computer games We
International Journal Multimedia and Image Processing (IJMIP), Volume 1, Issue 1, March 2011
Cathode ray tube The first computer monitors used cathode ray
Cathode ray tube The first computer monitors used cathode ray
computer monitor
Lee has expressed sadness that the web has mirrored the
ISSN 1392 – 0758 SOCIALINIAI MOKSLAI. 2012. Nr. 2 (76)
ISSN (Print) : 2319-5940
1 Introduction Since the first computer virus Creeper appeared in
1 Introduction Since the first computer virus Creeper appeared in
into a numerical IP address that is used to route
1 Introduction Since the first computer virus Creeper appeared in
1 Introduction Since the first computer virus Creeper appeared in
Robust Fragments-based Tracking using the Integral Histogram
in Windows 7 or Vista Have you ever wanted to
How Computer Viruses Work Computer viruses tend to grab our
This article was downloaded by: [Jyvaskylan Yliopisto]
American Journal of Networks and Communications
American Journal of Networks and Communications
American Journal of Networks and Communications
American Journal of Networks and Communications
E-C ommer c e S ecurit y and F r aud
English for IT and Software Engineering H.A.Kiasari-2013
the autopilot is more accurately described as the automatic flight
MIPS Instruction Set
Available online at www.sciencedirect.com
Shoulder pain from
Unit 8 The early 1970s saw the birth of the
1
The element that the fields of AI have in common
Oriental Journal of Computer Science & Technology Vol. 4(1), 209-212 (2011)
is usually used to refer to the internal storage locations
There are several behavioral strategies that can help smokers reschedule
Available online at www.sciencedirect.com
Exam Ref
CYBERCRIME
So what exactly is programming?
Concept Abstract Most computer systems are currently being integrated into
ConceptAbstractMost computer systems are currently being integrated into
athode ray tube essentially consists of an electron gun for
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 1, November 2011
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 1, November 2011
UDC 621.398: 681.3
ve brought together some of brightest minds In the computer
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 1, November 2011
Cyber Attack Simulator This section presents a model for simulating
Cyber Attack Simulator This section presents a model for simulating
9 This section presents a model for simulating the behavior
TeamViewer
that was to change the face of commercial computing profoundly
Security in computer networks is one of the most interesting
A computer can store or handle any data even if
A computer can store or handle any data even if
4
4
General Measu remen t Principles
4
4
4
496 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS, VOL. 45, NO. 3, MARCH 2015
496 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS, VOL. 45, NO. 3, MARCH 2015
THE ART OF DECEPTION
15
STEVE 1JOBS3 AND APPLE AESTHETIC SENSITIVITY I want to put
UNIT 1
Some questions are not as simple as they seem on
Which Accounting Software Are You Familiar With
STEVE JOBS AND APPLE
STEVE JOBS AND APPLE
accounting software tips down
1
STEVE JOBS AND APPLE
STEVE JOBS AND APPLE
Quantum computing may be moving out of science fiction Progress
Wearable Computing
Wireless Finger Ring
Now was the calm before the storm. Literally. Going by the plan he had worked
Now was the calm before the storm. Literally. Going by the plan he had worked
Now was the calm before the storm. Literally. Going by the plan he had worked
2012 Electricity has become a life line of the home
Comprehensive Study
CYBERCRIME
Interface Design: A Focus on Cognitive Science
Journal of Accounting and Taxation Vol.1 (1), pp. 001-007, April, 2009
Interface Design: A Focus on Cognitive Science
Available online at www.sciencedirect.com
Journal of Accounting and Taxation Vol.1 (1), pp. 001-007, April, 2009
Journal of Accounting and Taxation Vol.1 (1), pp. 001-007, April, 2009
Nicolas Sklavos/Wireless Security and Cryptography 8771_C007 Final Proof page 213 27.1.2007 2:40pm
UFRGSMUN | UFRGS Model United Nations
Introduction to Queueing
3.2.4 The Growth of the Hacker Community
3.3 Security Threat Motives
, . ~ ....• ~ ......, .. ':... ' .•.-.. ;'-';'.: ..... .:....:.:::-:;.,~~':~~ ::...'~~}.::....':'-~.,;;..,.!:.:
Complexity
Complexity
3.3.5 Vendetta/Revenge
computer network security بﺎﺗﮐ زا هدﺎﻔﺗﺳا تﺳاوﺧرد
CHAPTER
CHAPTER
CHAPTER
guide to computer network security بﺎﺗﮐ زا هدﺎﻔﺗﺳا تﺳاوﺧرد
guide to computer network security بﺎﺗﮐ زا هدﺎﻔﺗﺳا تﺳاوﺧرد
C09 06/30/2010 23:58:31 Page 175
CHAPTER 3 Systems Development and Documentation Techniques INTRODUCTION Questions to
94
Malware Protection Malware on person computers takes the forms of
CHAPTER 3 Systems Development and Documentation Techniques INTRODUCTION Questions to
1
Available online at www.sciencedirect.com
Downloaded form http://iranpaper.ir
Available online at www.sciencedirect.com
Journal of Analytical Psychology, 2015, 60, 2, 198–219
Journal of Analytical Psychology, 2015, 60, 2, 198–219
Available online at www.sciencedirect.com
Technology teacher training in a remote region of Armenia
when the device senses a loss of power from the
The benefits of using an Uninterruptible Power Supply By A1
It can potentially damage your data in a number of
is primarily used to provide a backup power source to
Lenovo Z41-70
Applied Mathematics and Approximation Theory Volume 441 of the series
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
The Politics of Information and the Fate of the Earth [Progressive Librarian] Page 1 of 7
It can potentially damage your data in a number of
CORE CONCEPTS OF
MS Industrial Engineering of Amirkbair University of Technology Statement of
Electronic Notes in Theoretical Computer Science 170 (2007) 101–124
CORE CONCEPTS OF
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
performance
2
Available online at www.sciencedirect.com
a ship disappearing into hyperspace left behind one of the
62 Prajyoti Lopes and Bidisha Roy / Procedia Computer Science 45 ( 2015 ) 60 – 69
WHITE PAPER
at’s studies, the authors reconfigure the place of public libraries, scriptions to journals and the use of Internet-delivered ab-
The Return of Artificial Intelligence It is becoming acceptable again
C Most researchers agree that AI peaked around 1985. A public reared on sciencefiction
Information technology
Information technology
Information technology
managing organizational resources and using them optimally is also an
managing organizational resources and using them optimally is also an
Why You Absolutely Need a Backup Hard Drive Whether due
Buying a UPS battery backup is something that you should
is primarily used to provide a backup power source to
How do I properly size my UPS? Introduction
2016 The power supply unit is the piece of hardware
Sudden loss of power and power surges are two of
Buying a UPS battery backup is something that you should
is primarily used to provide a backup power source to
Buying a UPS battery backup is something that you should
is primarily used to provide a backup power source to
How do I properly size my UPS? Introduction
2016 The power supply unit is the piece of hardware
Sudden loss of power and power surges are two of
Available online at www.sciencedirect.com
replicating computer that replaces silicon chips with processors made from
replicating computer that replaces silicon chips with processors made from
8
8
8
ISSN: 2278 – 1323
s.M. DUNPHY ET
THE INNOVATION FUNNEL
s Path to Success Landis Fields has a resume that
International Journal of Security and Networks 2016 Vol. 11 No. 4 1 Title: Secure mobile agent-based English auction protocol using identity-based signature scheme Author: AbubakerWahaballa; HuXiong; Fagen Li; Zhen Qin; Zhiguang Qin Addresses:
ISSN:2229-6093
World Academy of Science, Engineering and Technology
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎-∎∎∎ 1 2 3 4 5 6 7 8 9 10 11 12
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎-∎∎∎ 1 2 3 4 5 6 7 8 9 10 11 12
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎-∎∎∎ 1 2 3 4 5 6 7 8 9 10 11 12
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎-∎∎∎ 1 2 3 4 5 6 7 8 9 10 11 12
World Academy of Science, Engineering and Technology
World Academy of Science, Engineering and Technology
International Journal of Computer Science & Information Technology (IJCSIT) Vol 3, No 6, Dec 2011
button at the bottom of the page On the next
Harvard Business School 9-799-158
Harvard Business School 9-799-158
Exam Ref
The 1980s continued the revolution of the personal computer first beginning with
chapter14
chapter14
and Storage Technologies The right peripherals can make all the
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Determining the Role of Parent-Child Relationship and Self-Control in University Students’ Tendency towards Computer Games First/corresponding author: Sina Karbasizadeh Clinical Psychology Department
World Academy of Science, Engineering and Technology
World Academy of Science, Engineering and Technology
Abstract The paper submitted covers advanced methods of cybercrime fighting
immediately imports a concept that has developed in the physical
A more expansive view was adopted by the Supreme Court
Seyed Hossein Mirian
For Peer Review Only
StrategicManagementJournal
Power factor regulators
DOI 10.1007/s10559-019-00107-w
®
The Virtual Reconstruction of One of the First Computer Art
Ergonomics, 2015
Ergonomics, 2015
NETWORK TECHNOLOGY PPLICATION
to increase the throughput of data and the number of
Computer Network Types A computer network is a group of
Computer Network Architecture Computer Network Architecture is defined as the
Features Of Computer network A list Of Computer network features
Unit 7
A Avai vaillabl able e onl onliine ne at at w ww ww w..s sc ciienc encedi edir rec ectt..c com om
A Avai vaillabl able e onl onliine ne at at w ww ww w..s sc ciienc encedi edir rec ectt..c com om
0006D_c12_541-587.qxd 10/13/03 21:35 Page 558
ENCYCLOPEDIAOF
ENCYCLOPEDIAOF
is intrusive software that is designed to cause damage to
Received: 30 June 2020 Revised: 6 August 2020 Accepted: 31 August 2020
How it works and how to remove it Ransomware definition
All you have to do is drop off any suspected
or if you want to learn more and is setting
or if you want to learn more and is setting
Av a i l a b l e o n l i n e a t w w w . s c i e n c e d i re c t . c o m
کامپیوتر
Arshi Naim
Arshi Naim
Available online at www.sciencedirect.com