iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ data
جزئیات خدمات ترجمه در ترجمه تخصصی
mean
network
data
data
تخصصی
memory
energy
energy
energy
computing
data
BioSec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human
BioSec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human b - Parallel Processing Workshops, 2003. Proceedings. 2003 International Conference on
BioSec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human
idle
data
BioSec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human
[]
[]
[]
data
Register
cluster
failures
cluster
grid
were
cryptography
–
E
sensor
sensors
–
mining
±
±
detection
detection
security
security
traffic
[]
cache
SWIFT
The Society for Wor
SWIFT
trans
SWIFT
E
data
data
–
–
phishing
phishing
phishing
phishing
data
organic
data
111111111
information
IMFs
SWIFT
memory
sensor
Connecting Mobile Things to Global Sensor Network Middleware using System-generated Wrappers
soil
security
software
biometric
consistency
[BLANK_AUDIO]Hi, m
[]
radiation
system
system
system
radiation
biometric
biometric
biometric
method
soil
data
data
data
data
knowledge
knowledge
information
classification
SWIFT
SWIFT
data
information
knowledge
knowledge
[]
data
al
CC
Accounting Systems Ethics
information
intrusion
intrusion
intrusion
glass
customer
customer
customer
بخشی از کتاب زبان مدیریت بازرگانی
customer
برق
e
e
Observing geomagnetic induction in magnetic satellite measurements and associated implications for mantle conductivity
nodes
also
دیکشنری کامپیوتر
signal
[]
[]
بخش 3
بخش 4
data
information
image
data
performance
data
data
data
data
data
taghigh dar amaliat
data
data
[]
[]
network
node
[]
[]
power
sensor
time
[]
data
data
data
[]
data
data
data
data
data
parameter
–
–
school
V
laser
Fuzzy Logic in Medicine and Bioinformatics
[]
precipitation
[]
This
migration
university
communication
The 10th Annual IEEE- CCNC Smart Spaces and Sensor Networks
An Optimization of Security and Trust Management
A Novel Autonomous Management Distributed
2013 27th International Conference on Advanced Information Networking and Applications Workshops
Unit 3
PERGAMON Computers & Geosciences 25 (1999) 355–363
data
Acta Astronautica 90 (2013) 367–377
based program that facilitates analysis of tipping bucket and other
Rank_Prelims.qxd 1/18/06 11:39 AM Page i
Rank_Prelims.qxd 1/18/06 11:39 AM Page i
Rank_Prelims.qxd 1/18/06 11:39 AM Page i
Computers and Electrical Engineering 38 (2012) 746–755
Available online at www.sciencedirect.com
Financial early warning system model anddata mining application for risk
Available online at www.sciencedirect.com
International Journal of Computer Applications (0975 – 8887)
Energy and Buildings 51 (2012) 56–63
Expert Systems with Applications 40 (2013) 315–322
Intrusion Detection
data center
is the convergence of IT and building facilities functions within
EROSION IN VENT PLUGS, THE EFFECT OF
Journal of Transport Geography 31 (2013) 181–191
•
FutureGenerationComputerSystems ( ) –
AuthorClaim registration service The service Purpose The AuthorClaim registration service
Ad Hoc Networks xxx (2012) xxx–xxx
Ad Hoc Networks xxx (2012) xxx–xxx
Cloudlet-Screen Computing: A Multi-core-based, Cloud-computing-oriented,
Cloudlet-Screen Computing: A Multi-core-based, Cloud-computing-oriented,
Expert Systems with Applications 40 (2013) 7513–7518
Pattern Recognition 47 (2014) 1485–1493
Pattern Recognition Letters 38 (2014) 63–69
Pattern Recognition Letters 37 (2014) 32–40
1Introduction The landslides are very complex in nature and forgetting
J Technol Transf (2009) 34:255–285
J Technol Transf (2009) 34:255–285
Information & Management 51 (2014) 27–42
Priorwork Prior workon CTPmostlyfocused onevaluatingthe performance of this protocolinstaticwireless sensor
IEEE TRANSACTIONS ON COMPUTERS, VOL. 60, NO. 3, MARCH 2011 335
consuming servers which host products and services from a remote
consuming servers which host products and services from a remote
consuming servers which host products and services from a remote
consuming servers which host products and services from a remote
ITEA Journal 2009; 30: 117–125
With the passage of the Mine Improvement and New Emergency
WIRELESS SENSOR
The current issue and full text archive of this journal is available at
mm mortar round designed to defeat personnel under protective cover
Available online at www.sciencedirect.com
Expert Systems with Applications xxx (2011) xxx–xxx
System decomposition On the supposition that a speed or position
International Journal of Heat and Mass Transfer 47 (2004) 407–411
Pool boiling heat transfer experiments
Rethinking Data Management for Storage-centric
TopDisc Algorithm The first coloring algorithm of TopDisc uses a
Cypriot Journal of Educational
that fits within the round and can be used throughout
Journal of Applied Geophysics 92 (2013) 103–109
Market analysts have been following the progress of us electricals
Market analysts have been following the progress of us electricals
Abuffer-sizingAlgorithmforNetworksonChipusing
EUSFLAT-LFA 2011 July 2011 Aix-les-Bains, France
a gile an d ar c hit e c t ur e
that experiences a renaissance since the last century throughout sev
Sensors 2012, 12 1238
Lung Cancer Diagnosis using MR Imaging Abstract Accurate diagnosis of
Int. J. Production Economics 148 (2014) 37–50
®
®
®
Materials and Design 58 (2014) 543–550
Materials and Design 58 (2014) 543–550
ABSTRACT
ABSTRACT
ABSTRACT
that experiences a renaissance since the last century throughout sev
Wu et al. Environmental Health 2012, 11:47
11
American Journal of Scientific Research
Amazon Web Services - Architecting for The Cloud: Best Practices January 2010
Amazon Web Services - Architecting for The Cloud: Best Practices January 2010
Amazon Web Services - Architecting for The Cloud: Best Practices January 2010
374
CHAPTER 35
Data Link Management: SDLC and HDLC 211
Data Link Management: SDLC and HDLC 211
1.1. The inner loop
Academic Press is an imprint of Elsevier
2 Convolutional Decoders Much of the popularity of convolutional codes
2 Convolutional Decoders Much of the popularity of convolutional codes
SWIFT
that experiences a renaissance since the last century throughout sev
Field Techniques Manual:
Hemant P.Kasturiwale / International Journal of Engineering Research and Applications (IJERA)
Protocol Management in
Protocol Management in
Procedia - Social and Behavioral Sciences 62 ( 2012 ) 114 � 121
Applied Soft Computing 11 (2011) 652–657
Expert Systems with Applications 41 (2014) 1432–1462
Technical Information
Technical Information
Technical Information
www.ijecs.in
AutomationinConstruction43(2014)23–29
Computers in Human Behavior 29 (2013) 90–102
Computers in Industry 64 (2013) 565–580
Expert Systems with Applications 37 (2010) 8705–8710
Expert Systems with Applications 39 (2012) 2584–2589
Expert Systems with Applications 39 (2012) 4729–4739
Protocol Management in
COLLABORATIVE POLICY MAKING
Suvarna Patil et al Int. Journal of Engineering Research and Applications www.ijera.com
Available online at www.sciencedirect.com
Practical Database
IEEE TRANSACTIONS ON NANOTECHNOLOGY, VOL. 11, NO. 4, JULY 2012 739
8
Chapter 8
Graph Databases
Creating a Candlestick Stock chart with volume in Excel
the target genome is searched for sequences that are similar
the target genome is searched for sequences that are similar
Expert Systems with Applications 36 (2009) 3614–3622
Chapter 14
Revenue Management
Designation: G 139 – 96
232 TRANSPORTATION PLANNING
Longitudinal Analysis of Car Ownership in Different Countries 233
Time Shading Languages l Types of Shaders l Texture Mapping
Spreadsheets_ Forecasting Seasonal Data with Excel
IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 21, NO. 2, MAY 2006 869
Longitudinal Analysis of Car Ownership in Different Countries 233
Computers and Electrical Engineering 39 (2013) 47–54
Computers and Electrical Engineering 39 (2013) 47–54
Graph Databases
CHAPTER 5
CHAPTER 1
CHAPTER 5
CHAPTER 1
CHAPTER 1
CHAPTER 1
CHAPTER 1
Graph databases
CHAPTER 1
Computers and Electrical Engineering 39 (2013) 47–54
Computers and Electrical Engineering 39 (2013) 47–54
Circuit implementation: The ASK demodulator consists of a front-end
IEEE TRANSACTIONS ON COMPUTERS, VOL. 60, NO. 3, MARCH 2011 335
Available online at www.sciencedirect.com
Winter Road Maintenrre
fncreased
Winter Road Maintenrre
Computers and Electrical Engineering 39 (2013) 47–54
Computers and Electrical Engineering 39 (2013) 47–54
Vol.
Computers and Electrical Engineering 39 (2013) 47–54
Longitudinal Analysis of Car Ownership in Different Countries 233
Computer Communications 35 (2012) 619–627
ICDS 2012 : The Sixth International Conference on Digital Society
Shi et al. BMC Research Notes 2011, 4:189
Journal of Accounting and Economics 57 (2014) 76–88
The data analyzed refer to the mutual funds under Italian
The data analyzed refer to the mutual funds under Italian
HAN 10-ch03-083-124-9780123814791 2011/6/1 3:16 Page 111 #29
Seven Principles for Change Management
Security for Cloud Based Services
IEEE TRANSACTIONS ON HUMAN-MACHINE SYSTEMS, VOL. 43, NO. 1, JANUARY 2013 115
HOLOGRAPHIC VERSATILE DISC
www.ccsenet.org/ijef International Journal of Economics and Finance Vol. 4, No. 5; May 2012
1422 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 24, NO. 8, AUGUST 2012
Database Systems Journal vol. IV, no. 3/2013 31
A Model for Utilizing Cloud Computing in the Smart Grid
A Model for Utilizing Cloud Computing in the Smart Grid
A Model for Utilizing Cloud Computing in the Smart Grid
International Journal of Future Generation Communication and Networking
lllllllllllllllllIllllIllllllllllllllIlllllllllllllllllllllllllllllllllllll
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
1
1
1
Pattern Recognition 34 (2001) 299}314
Pattern Recognition 34 (2001) 299}314
Chapter 9 - end
PART1-29000
PART2-29000
Prof. Swati Vitkar / IJAIR ISSN: 2278-7844
Computer Network Security Protocols
XBRL-driven Business Process Improvement:
afheye 805
NATO/PFP UNCLASSIFIED
computer law & security review 29 (2013) 601e609
computer law & security review 30 (2014) 75e79
Cloud Computing: Network Security in E-
HOLOGRAPHIC VERSATILE DISC
The worm will then search all drives which are connected
Contents
facts are represented as data units having a timestamp which
The set of all relation schemas of a database and
0 UAV DATA LINKS AND TECHNOLOGY TRENDS One of the
Design Considerations for Military Data Link Architecture in Enabling Integration
Design Considerations for Military Data Link Architecture in Enabling Integration
0 UAV DATA LINKS AND TECHNOLOGY TRENDS One of the
0 INTEROPERABILITY Interoperability becomes highly desirable requirement when UAVs have
employs a polling protocol and netted communication techniques using standard
VMF messages provide a common means of exchanging digital data
employs a polling protocol and netted communication techniques using standard
VMF messages provide a common means of exchanging digital data
24 CHAPTER 10. UNSUPERVISED LEARNING AND CLUSTERING
The current issue and full text archive of this journal is available at
1 Overview This chapter addresses river basin planning and management
1 Overview This chapter addresses river basin planning and management
7
Ground Penetrating Radar Fundamentals
OpenDataStructures(inC++)
OpenDataStructures(inC++)
Chapter 1. Principles of Synthetic Aperture Radar
Semantic query optimization in the presence of types Both semantic
ISSN 1945-6123
Introduction More than half of incident cancer cases and two
OpenDataStructures(inC++)
Journal of Biomechanics 46 (2013) 19–25
A Survey of Middleware for Sensor Network and Challenges
Applied Mathematics and Computation 175 (2006) 1375–1384
Advances in Engineering Software 71 (2014) 34–45
Fuzzy Sets and Systems 186 (2012) 26–46
Environmental Geology, 5 Geological, Hydrogeological etc. Investigations
OUP CORRECTED PROOF – FINAL, 6/12/2011, SPi
Downloaded from http://jn.physiology.org/ at Brown University on January 26, 2013
ISSN: 2277-3754
TOWARDS OF SECURED COST-EFFECTIVE MULTI-CLOUD
Volume 3, Issue 3, March 2013 ISSN: 2277 128X
Volume 3, Issue 3, March 2013 ISSN: 2277 128X
ISSN: 2277-3754
Abstract�Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In the
Secure Storage in Cloud Computing & Emergence
TOWARDS OF SECURED COST-EFFECTIVE MULTI-CLOUD
Abstract�Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In the
Cloud Computing Although cloud computing is based on a collection
SecureSharingofElectronicMedicalRecordsinCloudComputing
Chapter 2
718 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 2, SECOND QUARTER 2013
Geostatistical analyses and hazard assessment on soil lead in Silvermines
IEEE TRANSACTIONS ON RELIABILITY, VOL. 55, NO. 3, SEPTEMBER 2006 559
1 Paper No.: 12-3971
Small Multiples The technique of putting a bunch of small
941
IIIT, Hyderabad
صفحه 16 تا 20
Chapter 8
Chapter 9
PART3
Implementation of a hardware and software
J.ParallelDistrib.Comput.71(2011)1075–1084
Implementation of a hardware and software
Practical Point Pattern Analysis 173
2010 Second WRI World Congress on Software Engineering 2010 Second WRI World Congress on Software Engineering 2010 Second WRI World Congress on Software Engineering 2010 Second WRI World Congress on Software Engineering
Applications of Qualitative Multi-Attribute
JOHNSON-COOK STRENGTH MODEL CONSTANTS FOR
the administrators possess too much data to dissect effectivelyto determine
941
7693-PART1
Available online at www.sciencedirect.com
روشهای موثر بازاریابی در شبکه های اجتماعی METHODS AND SYSTEMS
روشهای موثر بازاریابی در شبکه های اجتماعی METHODS AND SYSTEMS
روشهای موثر بازاریابی PART2
MapReduce in the Clouds for Science
METHODS AND SYSTEMS FOR TRACKING OF USER INTERACTIONS WITH CONTENT
METHODS AND SYSTEMS FOR TRACKING OF USER INTERACTIONS
Expert Systems with Applications 40 (2013) 621–633
S e n t i m e n t C l a S S i f i C a t i o n
Downloaded from http://bioinformatics.oxfordjournals.org/ at Universiti Teknologi Malaysia on December 4, 2012
Journal of Machine Learning Research 13 (2012) 27-66 Submitted 12/10; Revised 6/11; Published 1/12
Journal of Machine Learning Research 13 (2012) 27-66 Submitted 12/10; Revised 6/11; Published 1/12
شبکه
The extension of database application to handle multimedia objects requires
th
Copyright(c)JCPDS-International Centre for Diffraction Data 2001,Advances in X-ray Analysis,Vol.44 Copyright(c)JCPDS-International Centre for Diffraction Data 2001,Advances in X-ray Analysis,Vol.44 408 1
International Journal of Economic Sciences and Applied Research 5 (3): 7-32
This technology uses both the internet and the central servers
INFOCOMP 2013 : The Third International Conference on Advanced Communications and Computation
European Journal of Radiology 68 (2008) 362–368
European Journal of Radiology 68 (2008) 362–368
Expert Systems with Applications 40 (2013) 7513–7518
Biometrics & Security:
Data Management in the Cloud: Limitations and Opportunities
Improving Smart Card Security using Self-timed Circuits
European Journal of Radiology 68 (2008) 362–368
European Journal of Radiology 68 (2008) 362–368
The many advantages of cloud computing are increasingly attracting individualsand
The many advantages of cloud computing are increasingly attracting individuals
The many advantages of cloud computing are increasingly attracting individuals
The many advantages of cloud computing are increasingly attracting individuals
The many advantages of cloud computing are increasingly attracting individuals
The many advantages of cloud computing are increasingly attracting individuals
The many advantages of cloud computing are increasingly attracting individuals
CHAPTER14
Planning and
Planning and
Planning and
2.13.3 Finding Good Wind Sites
2.13.3 Finding Good Wind Sites
TSINGHUASCIENCEANDTECHNOLOGY
Presentation and Evaluation of Inconsistencies in
Breaking Up Is Hard To Do: Modeling Security
KEY CONCEPTS The main concepts dealing in this paper are
Cloud computing offers different types of services depending on business
Young Introduction Consumer behavior at the point of purchase is
FloMax
This specification covers transmission of digitally recorded electrophysiologic waveform data
CLOUD SERVICES DEPLOYMENT MODEL There are different types of deployment
CLOUD SERVICES DEPLOYMENT MODEL There are different types of deployment
There are different types of deployment model depending on the
SECURITY ISSUES OF CLOUD COMPUTING Security issues of cloud computing
This specification covers transmission of digitally recorded electrophysiologic waveform data
Chapter 12
Expert Systems with Applications 37 (2010) 6293–6301
Expert Systems with Applications 37 (2010) 6293–6301
Security Analysis of Contactless
A Model for Utilizing Cloud Computing in the Smart Grid
A Model for Utilizing Cloud Computing in the Smart Grid
A Model for Utilizing Cloud Computing in the Smart Grid
A Model for Utilizing Cloud Computing in the Smart Grid
Ad Hoc Networks 11 (2013) 1062–1074
The Journal of Systems and Software 84 (2011) 559–572
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012
12
IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 1, No 2, January 2013
Downloaded from http://bioinformatics.oxfordjournals.org/ by guest on July 20, 2014
Global Information Assurance Certification Paper
Solving the straggler problem with bounded staleness
Virtualize Storage, Not Disks
and Future Directions Abstract This paper discusses approaches and environments
Characterizationofanearth-filleddamthroughthecombineduseof
Implicationsofsurfacewavedatameasurementuncertaintyonseismic
Pattern Recognition 46 (2013) 3030–3039
Pattern Recognition 46 (2013) 3030–3039
Ali Ismail Awad
Ali Ismail Awad
30 GENERAL CONCEPTS
2014 IEEE World Forum on Internet of Things (WF-IoT)
FUNCTIONAL PREDICTION OF BIOACTIVE TOXINS IN
P1: TIX/XYZ P2: ABC
Description Download the all new Teenage Mutant Ninja Turtles Official
Description Download the all new Teenage Mutant Ninja Turtles Official
Scuba: DivingintoDataatFacebook
CHAPTER 2
718 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 2, SECOND QUARTER 2013
based measure model for data envelopment analysis with negative data
Green computing
defined Storage Predictions for 2014 This past year was full
LMS Adaptive Filter
Chapter 18
Chapter 18
ISO/IEC 15437:2001(E)
Baseband Processing for SDR Many technologies require substantial research and
Expert Systems with Applications 39 (2012) 12001–12013
ISO/IEC 15437:2001(E)
security is a domain in which one or more individual
Chapter 7 Measurement of Cyber Situation Awareness in a Human
Foreword
Foreword
Chapter 7 Measurement of Cyber Situation Awareness in a Human
Author manuscript, published in "International Biometric Performance Testing Conference (IBPC), gattersburg : United States (2014)"
A Computationally Efficient Fingerprint Matching Algorithm for
Data converters are one of the key enabling technologies for
4
Available online at www.sciencedirect.com
International Journal of Economic Sciences and Applied Research 5 (3): 7-32
Tree and Consistent Hashing Abstract This paper proposed a novel
Tree and Consistent Hashing Abstract This paper proposed a novel
Vegan: ecological diversity
SCIENTIFIC COMMUNICATION
2.3.4. Commercially Available Wireless Sensor Systems Many commercially available wireless communications nodes are available including Lynx Technologies, and various Bluetooth kits, including the Casira devices from Cambridge Silicon Radio, CSR.
Many commercially available wireless communications nodes are available including Lynx Technologies, and various Bluetooth kits, including the Casira devices from Cambridge Silicon Radio, CSR.
Biometrics & Security:
Data Clustering: A Review
Structure-Activity Relationships in
OpenDataStructures(inC++)
OpenDataStructures(inC++)
Toward an Integrated Framework of Situation Awareness The previous chapter
security Cues through Interviews and Surveys The first of the
security Cues through Interviews and Surveys The first of the
Toward an Integrated Framework of Situation Awareness The previous chapter
PIC-et Radio II: How to Receive AX.25 UI Frames Using Inexpensive PIC Microcontrollers
PIC-et Radio: How to Send AX.25 UI Frames Using Inexpensive PIC Microprocessors
PIC-et Radio: How to Send AX.25 UI Frames Using Inexpensive PIC Microprocessors
Cyclic redundancy check circuit
security Cues through Interviews and Surveys The first of the
CHAPTER 2
HYDROLOGICAL PROCESSES
concentration of toxic materials in space and time at the
CHAPTER 2
security This chapter outlines two different technology domains that have
security This chapter outlines two different technology domains that have
Future Work The work of implementing data fusion capabilities in
Finding a needle in Haystack: Facebook’s photo storage
Finding a needle in Haystack: Facebook’s photo storage
ScalingMemcacheatFacebook
International Journal of Economic Sciences and Applied Research 5 (3): 7-32
Full Papers
Biometrics & Security:
Northrop Grumman White Paper
Downloaded from http://nar.oxfordjournals.org/ by guest on July 14, 2014
Downloaded from http://nar.oxfordjournals.org/ by guest on July 14, 2014
processes and personnel for collecting, processing,
Security and Performance Evaluation Platform
Sensing and Sensor Fundamentals Sensors utilize a wide spectrum of
PART2
CONCLUSIONS Operating systems represent complex interactive softwaresystems that control access
Journal of Network and Computer Applications 40 (2014) 1–11
Journal of Network and Computer Applications 40 (2014) 1–11
CONCLUSIONS Operating systems represent complex interactive softwaresystems that control access
ABSTRACT Buffer overflow vulnerabilities are caused by programmingerrors that allow
ABSTRACT Buffer overflow vulnerabilities are caused by programmingerrors that allow
s toxicity towards microorganisms water solubility of the compound presence
s toxicity towards microorganisms water solubility of the compound presence
s toxicity towards microorganisms water solubility of the compound presence
s toxicity towards microorganisms water solubility of the compound presence
s toxicity towards microorganisms water solubility of the compound presence
Computer Standards & Interfaces 36 (2014) 278–287
Ad Hoc Networks 11 (2013) 1237–1253
Ad Hoc Networks 11 (2013) 1237–1253
Computer Standards & Interfaces 36 (2014) 278–287
2 Smart Card Technology and Biometrics
Its biggest advantages are the reduced costs since a physical
This page intentionally left blank Microeconometrics
Evaluation Copy
increased productivity is a necessity in order to improve living
Efficient and Fault-Diagnosable Authentication
TIME SERIES ANALYSIS
Ensemble Clustering via Heuristic Optimisation
Ensemble Clustering via Heuristic Optimisation
Ensemble Clustering via Heuristic Optimisation
PART1
PART2
PART2
and machine learning The simplest AI applications can be divided
Classifiers and statistical learning methods The simplest AI applications can
Classifiers and statistical learning methods The simplest AI applications can
Classifiers and statistical learning methods The simplest AI applications can
Omega ∎ (∎∎∎∎) ∎∎∎–∎∎∎
108 IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 21, NO. 1, JANUARY 2006
Finding a needle in Haystack: Facebook’s photo storage
DIEFFENBACHER
oriented nonlinear models for modeling and identification of aircraft nonlinear
oriented nonlinear models for modeling and identification of aircraft nonlinear
Somaveh Jafari, et al International Journal of Computer and Electronics Research [Volume 3, Issue 3, June 2014]
DIEFFENBACHER
DIEFFENBACHER
DIEFFENBACHER
Journal of Microbiological Methods 94 (2013) 86–87
Stat Papers
International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064
Accounting intelligence
JOURNAL OF GEOPHYSICAL RESEARCH, VOL. 117, C05035, doi:10.1029/2011JC007390, 2012
ScalingMemcacheatFacebook
JMol Model(2014) 20:2067
It can beapplicable to any launch site in the US
Back End System The cron daemon is a long running
Introduction
2010 IEEE International Conference on Granular Computing
public and private researchers have been looking at small and
PROJECT REPORT
PROJECT REPORT
PROJECT REPORT
acquiring and processing surface electromyography signals and correlate them with
Resource and Energy Economics 26 (2004) 77–97
CHAPTER 3
DRA886TX
Available online at www.sciencedirect.com
LSM303DLHC
LSM303DLHC
1368 IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, VOL. 39, NO. 7, JULY 2001
www.it-ebooks.info www.it-ebooks.info Learn how to turn
Plugge
5 adds a number of features and improvements to the
Journal of Computational Science 5 (2014) 90–98
Journal of Computational Science 5 (2014) 90–98
Journal of Computational Science 5 (2014) 90–98
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
AbstractSigning documents is something that most every adult is
1.4 / SECURITY SERVICES 15
1.5 / SECURITY MECHANISMS 17
18
1.11 / KEY TERMS, REVIEW QUESTIONS,AND PROBLEMS 25
26 CHAPTER 1 / INTRODUCTION
1.4 / SECURITY SERVICES 15
1.5 / SECURITY MECHANISMS 17
18
1.11 / KEY TERMS, REVIEW QUESTIONS,AND PROBLEMS 25
26 CHAPTER 1 / INTRODUCTION
Information Systems 44 (2014) 22–33
Available online at www.sciencedirect.com
Industry Solutions Banking and Financial Sector The use of InfoWatch
Constructionandoperatingtests Samplingandtestforms For testsof quick couplingpipes the forms1 and2 are
Constructionandoperatingtests Samplingandtestforms For testsof quick couplingpipes the forms1 and2 are
In spite of an increasing preference by many 433 MHz users for more sophisticated wireless data approaches,
2012 International Symposium on Pervasive Systems, Algorithms and Networks
With the rapid growth of emerging applications like social network
Water Projections and Scenarios:
Abstract
Thrift: Scalable Cross-Language Services Implementation
11
Identifying Suspicious URLs: An Application of Large-Scale Online Learning
5 Rainfall-Runoff Modelling: Integrating Available Data and Modern Techniques 63
60 S. Srinivasulu and A. Jain
5 Rainfall-Runoff Modelling: Integrating Available Data and Modern Techniques 61
62 S. Srinivasulu and A. Jain
5 Rainfall-Runoff Modelling: Integrating Available Data and Modern Techniques 63
Back End System The cron daemon is a long running
IEEETRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL.63,NO.2,FEBRUARY 2014 859
Scuba: DivingintoDataatFacebook
IEEETRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL.63,NO.2,FEBRUARY 2014 859
8
Olap Security
Comparative study of crystallization rates
Comparative study of crystallization rates
analog and digital circuits came into use for high level
NBER WORKING PAPER SERIES
analog and digital circuits came into use for high level
analog and digital circuits came into use for high level
IEEETRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL.63,NO.2,FEBRUARY 2014 859
Kabul Education University Hardware Natural Science Faculty
Communications of the Association for Information Systems (Volume13, 2004) 177-195 177
1010
Introduction Recent years have seen a proliferation of research articles
Information & Management 42 (2005) 781–787
Overview of Dynamic Test Techniques for Flight Dynamics
Proceedings of the National Conference on Innovations in Emerging Technology-2011
MASARYK UNIVERSITY
Abstract
Informatica36(2012)347–357 347
Building an Efficient and Scalable DeepLearning Training System TrishulChilimbi Yutaka
Informatica36(2012)347–357 347
Informatica36(2012)347–357 347
ArtificialImmuneSystemInspiredIntrusionDetectionSystemUsingGenetic
IDS
CHAPTER 4
CHAPTER 4
CHAPTER 4
3. SIMD PROGRAMMING: THE CONNECTION MACHINE 101
A n A ly s i s
5-Layered Architecture of Cloud Database Management System
MASARYK UNIVERSITY
Parallel Algorithms for Constructing Data Structures for Fast Multipole Methods
ArtificialImmuneSystemInspiredIntrusionDetectionSystemUsingGenetic
Hype Cycle for Application Services This Hype Cycle focuses on
Hype Cycle for Application Services This Hype Cycle focuses on
Hype Cycle for Application Services This Hype Cycle focuses on
Hype Cycle for Application Services This Hype Cycle focuses on
View Image URL View Video URL View Data File URL View Spreadsheet URL View Document URL View HTML file URL View Item URL
Parallel Algorithms for Constructing Data Structures for Fast Multipole Methods
Parallel Algorithms for Constructing Data Structures for Fast Multipole Methods
Parallel Algorithms for Constructing Data Structures for Fast Multipole Methods
M-data at l . We only need compute M-data and box types
Decision Support Systems 51 (2011) 176–189
Available online at www.sciencedirect.com
Seminar
Settings have been successfully updated Unable to write to file
International Journal of Computer Applications (0975 – 8887)
Egyptian Informatics Journal (2013) 14, 109–115
The ne xt three data perspectives are based on a current-state analysis of the
NASA Conference Publication
International Journal of Knowledge www.ijklp.org
Sensors 2012, 12, 12606-12633; doi:10.3390/s120912606
Expert Systems with Applications 41 (2014) 7653–7670
Journal of Enterprise Information Management
6.0 Crosscutting Technical Management
American Politics Workshop, University of Maryland 1
American Politics Workshop, University of Maryland 1
American Politics Workshop, University of Maryland 1
Computers in Biology and Medicine 41 (2011) 182–189
Computer Networks 72 (2014) 140–155
ﻪﺳﺭﺪﻣ ﻭ ﻩﺎﮕﺸﻧﺍﺩ ﻊﺟﺮﻣ ﻝﻮﭘﻮﭘ
Correlation 35
03-Drew-45303.qxd 9/7/2007 3:07 PM Page 73
Expert Systems with Applications 41 (2014) 445–456
Expert Systems with Applications 41 (2014) 445–456
Expert Systems with Applications 41 (2014) 445–456
IEEE-20180
Expert Systems with Applications 41 (2014) 445–456
Expert Systems with Applications 41 (2014) 445–456
A Software Defined Wireless Sensor Network
Research in International Business and Finance 21 (2007) 316–325
2013 International Conference on Computer Sciences and Applications
2013 International Conference on Computer Sciences and Applications
Subsidies and transfers Wages Capital Other currentChange in Overall
Introduction to
Customer Relationship
Customer Relationship
Expert Systems with Applications 36 (2009) 2592–2602
UNIVERSAL HEALTH COVERAGE
CHAPTER 9
Lecture Notes in Artificial Intelligence 3782
Available online at www.sciencedirect.com
International Journal of Bio-Science and Bio-Technology
A survey on Data Mining approaches for Healthcare
International Journal of Bio-Science and Bio-Technology
Journal of Computer Sciences and Applications, 2013, Vol. 1, No. 3, 46-54
eAbstract The paper presents the new approach to optimizing automatic
Wireless Pers Commun (2014) 74:585–599
Heriot-Watt University Study Guide
Business Horizons (2011) 54, 509—514
Business Horizons (2011) 54, 509—514
ARTICLE 29 DATA PROTECTION WORKING PARTY
3
CHAPTER2. LITERATUREREVIEW 15
“Just as our eyes need light in order to see,
بازاريابي الکترونيکي
Journal of Computer Sciences and Applications, 2013, Vol. 1, No. 3, 46-54
Expert Systems with Applications 38 (2011) 5428–5437
The Critical Security Controls
International Business Review 12 (2003) 193–214
A control system is a device or set of d eus vied ces to manage, command, dire,c or t
Computer
eAbstract The paper presents the new approach to optimizing automatic
Marine Pollution Bulletin xxx (2014) xxx–xxx
CHAPTER THREE OUTLINE
6-7-8
103
Distributed Data Mining in Peer-to-Peer Networks
An Efficient Bandwidth Management Algorithm for
The principal pathophysiology of asthma is chronic inflammation of the
Cloud-enabled wireless body area networks for pervasive healthcare
Nature Reviews Genetics | AOP, published online 2 May 2012; doi:10.1038/nrg3208
430 JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 16, NO. 4, AUGUST 2014
A Guide to Setting up an Urban Observatory
MACROSYSTEMS ECOLOGY
47627c13.qxd:WroxPro 9/29/07 3:35 PM Page 525
Adaptive Software Cache Management for
This situation arose due to the rapid expansion of the
B2B FB 31/8/05 10:30 am Page 1
Advances in Engineering Software 67 (2014) 125–135
5.3. Validity and reliability of interviews structural intangible class. Although the participants had freedom to
ICIAfS'12 1569626783
Information Sciences 263 (2014) 175–185
Broadcast This covers a number of approaches to sending data
Vladimir Šimovi ć
NationalScienceReview
Self-Tuning Spectral Clustering
While film used in cinema contains pigments that create an
Preface
a single program can retrieve information stored in millions of
Journal of Computer Sciences and Applications, 2013, Vol. 1, No. 3, 46-54
Journal of Computer Sciences and Applications, 2013, Vol. 1, No. 3, 46-54
European Journal of Operational Research xxx (2014) xxx–xxx
Computer Networks 70 (2014) 312–329
th
One of the two core security protocols in IPSec is
it can be difficult to reproduce the composition variability of
it can be difficult to reproduce the composition variability of
it can be difficult to reproduce the composition variability of
it can be difficult to reproduce the composition variability of
Available online at www.sciencedirect.com
TheCostofaCloud:
Intro_Predictive_Maintenance7-8 (1)
594 Chapter 10 Mining Object, Spatial, Multimedia, Text, and Web Data
the generalization of an object can be performed by referring
Comparative evaluation of information
آمار
SPRINGER BRIEFS IN COMPUTER SCIENCE
SPRINGER BRIEFS IN COMPUTER SCIENCE
SPRINGER BRIEFS IN COMPUTER SCIENCE
Modelling the strength of steel plates using regression analysis and neural networks
Neural Net w Analysis of Steel Pro essing c
Journal of Applied Statistics
000_Prelim_CI.qxd 02/09/2004 1:15pm Pagei
some methods require modifying the source code of OS kernel
Journal of Accounting and Economics 57 (2014) 76–88
Vladimir Šimovi ć, Matija Varga, Predrag Oreški
Vladimir Šimovi ć, Matija Varga, Predrag Oreški
Data centers are becoming increasingly popular for the provisioning of
Early solutions implemented distributed algorithms formaking data center hardware energy
Business Intelligence Vendors It is important to remember that business
Information Systems 44 (2014) 22–33
Kernel Memory Protection by an Insertable Hypervisor
Toward Comprehensive Traffic Generation
296 IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, VOL. 53, NO. 1, JANUARY 2015
296 IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, VOL. 53, NO. 1, JANUARY 2015
2013 8th International Conference on Information Technology in Asia (CITA)
LEARNING
Computer Physics Communications 140 (2001) 45–55
A New Parallel Sorting Algorithm based on Odd-Even Mergesort
We continue with the description of our liquidity and credit
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
and scalability ofa typicalcloudDBaaSwithdataconfidentiality is demonstrated through a prototype of
and scalability ofa typicalcloudDBaaSwithdataconfidentiality is demonstrated through a prototype of
Expert Systems with Applications 41 (2014) 7789–7796
Data from the national Institute of child Health and Human
..
2 Data and Metdodology
CHAPTER 13
equating data collection design provides a means of obtaining data
Mining Medical Images
Proceedings of the World Congress on Engineering and Computer Science 2009 Vol II
Computers and Electrical Engineering xxx (2014) xxx–xxx
Computers and Electrical Engineering xxx (2014) xxx–xxx
www.ietdl.org
National bodies that aremembers of ISO or IEC participate in
It is assumed that a disk selected for recording has
It is assumed that a disk selected for recording has
Journal of Network and Computer Applications 35 (2012) 1367–1373
Das 25-ch14-361-388-9780124158153 2011/12/19 12:26 Page 361 #1
Proceedings of the World Congress on Engineering and Computer Science 2009 Vol II
Business Intelligence Vendors It is important to remember that business
A general perspectiveLi Xiaoming Valon Sejdini Hasan ChowdhurySchool
UNIVERSIDAD DE CHILE
CRM in
Underpinning our earlier discussion on research design has been the
FutureGenerationComputerSystems29(2013)1645–1660
in writing by letter signed by you or your Designated
Challenges and open research problems of the WSN solutions for
Local, national, and global applications of GIS in agriculture
Human Performance Technology (HPT), a systematic approach to improving productivity and competence,
M is a data management and analysis systemfor microbial community
Human Performance Technology (HPT), a systematic approach to improving productivity and competence,
Comparison of ARIMA and Artificial Neural Networks Models
PART1-15057
PART2-15057
PART3-15057
STOCK EXCHANGE INDEX PREDICTION USING HYBRID MODELS
ABSTRACT
ABSTRACT
ABSTRACT
1. Introduction bothresearchersandindustrialpractitioners.Asstatedin[4],
ABSTRACT
1. Introduction bothresearchersandindustrialpractitioners.Asstatedin[4],
ABSTRACT
Remote Sensing of Environment 113 (2009) S17–S24
Journal of Systems Architecture 46 (2000) 397–410
Geophysics
Journal of Systems Architecture 46 (2000) 397–410
Journal of Systems Architecture 46 (2000) 397–410
Journal of Systems Architecture 46 (2000) 397–410
Journal of Systems Architecture 46 (2000) 397–410
and that greater use should be made of physiological and
PART4
3510
Eur. Phys. J. C (2012) 72:1960
Journal of Systems Architecture 46 (2000) 397–410
Visualizing the Quality of GNSS Multivariate Data
there has not been much work in supporting security in
Eur. Phys. J. C (2012) 72:1960
Visualizing the Quality of GNSS Multivariate Data
Expert Systems with Applications 40 (2013) 7444–7456
Eur. Phys. J. C (2012) 72:1960
2010Cloud Computing Research and Development Trend The factors that impel
Ohuma et al. BMC Medical Research Methodology 2013, 13:151
Ohuma et al. BMC Medical Research Methodology 2013, 13:151
Data Mining Technology and Its Application
Data Mining Technology and Its Application
2009 International Forum on Computer Science-Technology and Applications
Disk Infant Mortality in Large Storage Systems
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
Cloud computing is rapidly growing as an alternative to conventional
2013 8th International Conference on Information Technology in Asia (CITA)
2013 8th International Conference on Information Technology in Asia (CITA)
Accepted Manuscript
Accepted Manuscript
4. Proposed approach for computing initial cluster centers
Doing qualitative field research in management accounting:
Signature
Cloud computing is rapidly growing as an alternative to conventional
Security in the Cloud Despite the tremendous business and technical
Security in the Cloud Despite the tremendous business and technical
Security in the Cloud Despite the tremendous business and technical
International Journal of Innovations & Advancement in Computer Science
MOUFTAH_LAYOUT_Layout 7/2/14 3:44 PM Page 150
MOUFTAH_LAYOUT_Layout 7/2/14 3:44 PM Page 150
MOUFTAH_LAYOUT_Layout 7/2/14 3:44 PM Page 150
2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing
2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing
Opinion Mining, Analysis and its Challenges
Agent-Based Decision Support
Information Sciences 281 (2014) 248–264
and scalability ofa typicalcloudDBaaSwithdataconfidentiality is demonstrated through a prototype of
and scalability ofa typicalcloudDBaaSwithdataconfidentiality is demonstrated through a prototype of
Efficient Object Storage Journaling in a Distributed Parallel File System
Evaluation of WCDMA Receiver Baseband
9049 Contents lists available at ScienceDirect Expert Systems with Applications
9049 Contents lists available at ScienceDirect Expert Systems with Applications
Proceedings of the National Conference on Innovations in Emerging Technology-2011
The area of human behavior representation is at least as
J.ParallelDistrib.Comput.74(2014)1789–1801
Accepted Manuscript
2012 Ninth International Conference on Information Technology - New Generations 2012 Ninth International Conference on Information Technology- New Generations
Journal of Systems Architecture 46 (2000) 397–410
2012 International Conference on Uncertainty Reasoning and Knowledge Engineering
Journal of Network and Computer Applications 35 (2012) 1013–1021
Authentication
The key parameters of these programs include theclustering similarity cutoff
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
586 IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, VOL. 16, NO. 4, JULY 2012
in that it allows each organisation to set up an
SECURITY AND COMMUNICATION NETWORKS
SECURITY AND COMMUNICATION NETWORKS
SECURITY AND COMMUNICATION NETWORKS
Hajira Jabeen et al. / International Journal of Engineering Science and Technology
University of California at Berkeley, Haas School of Business, Berkeley, CA 94720, USA
PART1-16183 - نیازی به ترسیم نمودار نیست
Disk Infant Mortality in Large Storage Systems
CHAPTERS DATA WAREHOUSING, ACQUISliION, MINING, BUSINESS ANALYLTICS AND VISUALIZATION 263
P1: JYS/XYZ P2: ABC
SQL Injection Attacks and Defense
AU2310 half title 8/10/05 1:57 PM Page 1
AU2310 half title 8/10/05 1:57 PM Page 1
Downloaded from http://bib.oxfordjournals.org/ at Zabol University on December 3, 2014
AU2310 half title 8/10/05 1:57 PM Page 1
Need to undelete erased documents or recover a bunch of
Pullan et al. Parasites & Vectors 2014, 7:37
Abstract Background Quantifying the burden of parasitic diseases in relation
IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 26, NO. 4, NOVEMBER 2011 2509
International Journal of Heat and Mass Transfer 79 (2014) 876–884
CHAPTER 13
International Journal of Heat and Mass Transfer 79 (2014) 876–884
International Journal of Heat and Mass Transfer 79 (2014) 876–884
Early Attack Reaction Sensor (EARS), a Man-wearable Gunshot
FedEx Improves Customer Experience with Integrated Mapping and Location Data
IAEG2006 Paper number 437
IAEG2006 Paper number 438
International Journal of Engineering and Advanced Technology (IJEAT)
Statistics for Biology and Health
450 Example 29 The posterior distribution of the indirect effect
Relational and XML
combines computers from multiple administrative domains to reach a common
Information Systems 47 (2015) 98–115
Healthcare monitoring applications and wirelesssensor network prototypes
Abstract
Available online at www.sciencedirect.com
template view
News Mining Using Evolving Fuzzy Systems
60 JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 1, NO. 1, AUGUST 2009
health monitoring
HOW TO WRITE A WORLD CLASS PAPER
text mining
The aim of the virtual layer is to capture interactionswithout
wireless sensor network prototypes
OC13030
OC13030
OC13030
Big Data Using Cloud Computing
II. BIG DATA MANAGEMENT SYSTEM challenge. Moreover, simple distributed file systems men-
Int J Syst Assur Eng Manag (July-Sept 2012) 3(3):194–208
64 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 23, NO. 1, JANUARY 2011
FRAUD DETECTION IN COMMUNICATIONS NETWORKS USING NEURAL AND
Data Mining in Financial Application Dongsong Zhang and Lina Zhou
زرواشک یاقآ همجرت
Available online at www.sciencedirect.com
There are inherent vulnerabilities in the networking of computers for
CLOUD COMPUTING
Analysis of Variance in the Modern Design of Experiments
CLOUD COMPUTING
CLOUD COMPUTING
1
2. Literature review 3.1. The field site: FurTime meets {collides} with Kaleidoscape
2. Literature review 3.1. The field site: FurTime meets {collides} with Kaleidoscape
DecisionSupportSystemsforRisk-Based
2. Literature review 3.1. The field site: FurTime meets {collides} with Kaleidoscape
Available online at www.sciencedirect.com
Research Data Management in Economic Journals
Information technology — Digitally recorded media for information interchange and storage — Data migration method for DVD-R, DVD-RW, DVD-RAM, +R, and +RW disks
MAMOULIS SPATIAL DATA MANAGEMENT MORGAN&CLAYPOOl
Atmospheric Environment 99 (2014) 64e76
Accepted Manuscript
MAMOULIS SPATIAL DATA MANAGEMENT MORGAN&CLAYPOOl
Applied Statistics Using SPSS, STATISTICA,
Request for Proposal–Research
Neurocomputing 108 (2013) 45–57
Preface
Basic Network Concepts This chapter covers the fundamental networking concepts
Basic Network Concepts This chapter covers the fundamental networking concepts
BinaryXMLStorageandQueryProcessinginOracle11g
An Adaptive Cross-Layer Multichannel QoS-MAC
2011 International Conference on Broadband and Wireless Computing, Communication and Applications
CLOUD COMPUTING
International Journal of P2P Network Trends and Technology- Volume1Issue1- 2011
Physica A 338 (2004) 166–172
Physica A 338 (2004) 166–172
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
2014 International Conference on Reliability, Optimization and Information Technology -
Billions of devices are expected tobe associated into the system
Comparison of Strategies and Policies 43
EUROLAB International Workshop: Investigation and Verification of Materials Testing Machines 21
5.5. PATH MATERIALIZATION TECHNIQUES 79
Coding RNA SOX2OT in SOX2 Regulation in Breast Cancer Abstract
5.5. PATH MATERIALIZATION TECHNIQUES 79
Constructing a Remote Monitoring and Control
5.5. PATH MATERIALIZATION TECHNIQUES 79
5.5. PATH MATERIALIZATION TECHNIQUES 79
5.5. PATH MATERIALIZATION TECHNIQUES 79
ComputerStandards&Interfaces38(2015)64–71
The Journal of Systems and Software 86 (2013) 751– 758
2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
2014 Conference on Information Assurance and Cyber Security (CIACS)
Course Technology’s Management Information Systems
2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
2014 Conference on Information Assurance and Cyber Security (CIACS)
Introduction
5
242 IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 22, NO. 2, FEBRUARY 2014
2014 IEEE World Forum on Internet of Things (WF-IoT)
2014 IEEE World Forum on Internet of Things (WF-IoT)
global economy & develo pment
2014 IEEE World Forum on Internet of Things (WF-IoT)
Transductive learning is a method that is closely connected with
Universal Journal of Management and Social Sciences Vol. 4, No.4; April 2014
Issues in Informing Science and Information Technology Volume 11, 2014
Härdle · Simar
1
1
2012 13th International Conference on Parallel and Distributed Computing, Applications and Technologies
Applied Ergonomics xxx (2014) 1e12
Faculty of Economics and Management Universiti Putra Malaysia Abstract This
640 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—II: EXPRESS BRIEFS, VOL. 51, NO. 11, NOVEMBER 2004
640 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—II: EXPRESS BRIEFS, VOL. 51, NO. 11, NOVEMBER 2004
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 61, NO. 4, APRIL 2014 1811
Downloaded from http://jpubhealth.oxfordjournals.org/ by guest on December 24, 2014
Downloaded from http://jpubhealth.oxfordjournals.org/ by guest on December 24, 2014
206 IEEETRANSACTIONSONSMARTGRID,VOL.2,NO.1,MARCH2011
182
206 IEEETRANSACTIONSONSMARTGRID,VOL.2,NO.1,MARCH2011
182
206 IEEETRANSACTIONSONSMARTGRID,VOL.2,NO.1,MARCH2011
The Global VSAT Forum
3.4 Virtual Clusters and Resource Management 161
These are worthy of investigation and are intensively considered in
Understanding
Understanding
the latter class of algorithms require enormous amount of timeand
This part of ISO 2846 specifies the colour and transparency
Journal of Network and Computer Applications 39 (2014) 191–201
Abstract— Internet-of-Things (IoT) is the convergence of Internet with RFID, Sensor and smart objects.
Int J CARS (2014) 9:241–253
This part of ISO 2846 specifies the colour and transparency
Tunnelling and
Web Mining Research: A Survey
16th Euromicro Conference on Parallel, Distributed and Network-Based Processing 16th Euromicro Conference on Parallel, Distributed and Network-Based Processing
_.QXD 16/4/09 11:09 Page 163
Energy Conversion and Management 45 (2004) 1681–1692
System Name The operating system for which the disc is
G Model
System Name The operating system for which the disc is
System Name The operating system for which the disc is
will measure land surface temperature in two thermal bands with
Macroeconomic Analysis and International Finance
Thermal infrared sensor
Progress in Propulsion Physics 4 (2013) 167- 184
Engineering Applications of Artificial Intelligence 26 (2013) 1532–1539
G Model
SECURITY AND COMMUNICATION NETWORKS
SALTZER ET AL. End-to-End Arguments in System Design 1
Fig. 5. Operations to embed a linkage within a mesh. The blue arrow
Sign language recognition using depth camera and hand features
International Marketing Review
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
System Intrusion Detection
EUROLAB International Workshop: Investigation and Verification of Materials Testing Machines 21
Computer Communications 42 (2014) 1–23
System Name The operating system for which the disc is
technology; that is, new property rights would be necessary in order to protect the new technology, and
SAGE UNIVERSITY PAPERS
Photonirvachak
Photonirvachak
Miller/Handbook of Research Methods in Public Administration AU5384_C000 Final Proof page i 4.10.2007 5:16pm Compositor Name: BMani
Deploying Video-on-Demand Services on Cable
Economics of Education Review 42 (2014) 64–77
Sign language recognition using depth camera and FMLRF Neda khanbani1
Measuring value added in higher education Consider a generic educational
Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)
An Overview of Query Optimization in Relational Systems
Development of Future Curriculum via Futures Studies Observation on best
Observation on best future choices is not something that happens
Observation on best future choices is not something that happens
Journal of Machine Learning Research 3 (2003) 1157-1182 Submitted 11/02; Published 3/03
Journal of Systems Architecture 46 (2000) 397–410
PRIMATEs v1
The National Autism Center’s
Dynamic Data Allocation Methods in Distributed
Case Studies in
Data Mining
5
S. Gu et al. / Real-time Compliance Control of an Assistive Joint Using QNX Operating System 509
Effects of plant species coexistence on soil enzyme activities Yang
D. Delen et al./Expert Systems with Applications 40 (2013) 3970–3983 3971
3976 D. Delen et al./Expert Systems with Applications 40 (2013) 3970–3983
3978 D. Delen et al./Expert Systems with Applications 40 (2013) 3970–3983
4CORRELATION COMPONENTS AND ANALYSIS RESULTS Alert correlation is a multicomponent
1 Data Analysis The alert fusion component is particularly relevant
8 Attack Session Reconstruction The goal of the attack session
2014 IEEE 3rd Symposium on Network Cloud Computing and Applications 2014 IEEE 3rd Symposium on Network Cloud Computing and Applications 3rd Symposium on Network Cloud Computing and Applications
International Journal Multimedia and Image Processing (IJMIP), Volume 1, Issue 1, March 2011
Home Search Collections Journals About Contact us My IOPscience
4.10 MultistepCorrelat ion
8 Attack Session Reconstruction The goal of the attack session
8 Attack Session Reconstruction The goal of the attack session
Lee has expressed sadness that the web has mirrored the
Data streams have some unique properties which make them applicable
Evolution and Human Behavior 30 (2009) 286–300.e2
To study the transmission of weaving techniques and the designs
3
Campaigner recently
Computers & Graphics 23 (1999) 389}403
5
5
4.4 Nonlocking Schedulers 171
computer law & security review 30 (2014) 482e491
computer law & security review 30 (2014) 482e491
G Model
TELE 632 No. of Pages 10, Model 3G
Neurocomputing ∎ (∎∎∎∎)∎∎∎–∎∎∎
Source: https://assist.dla.mil -- Downloaded: 2014-12-28T10:18Z
Copyright © 2010 by SAGE Publications, Inc.
A neural network bid/no bid model: the case for
Predicting Software Project E�ort:
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
1
Parallel Computing 39 (2013) 120–131
Semester Thesis
1
DRAFT CLOUD COMPUTING SYNOPSIS AND RECOMMENDATIONS
FutureGenerationComputerSystems25(2009)528–540
Title
Expert Systems with Applications 37 (2010) 1784–1789
Grønholt Olesen et al. BMC Pediatrics 2014, 14:229
Available online at www.sciencedirect.com
Specification and Description
Engineering Applications of Artificial Intelligence 29 (2014) 191–200
Access Control in
are likely to give us the ability to predict accurately
Semester Thesis
Available online at www.sciencedirect.com
MODELLING OF METALLURGICAL PROCESSES USING CHAOS THEORY AND
APPROPRIATE DECISION SUPPORT
APPROPRIATE DECISION SUPPORT
APPROPRIATE DECISION SUPPORT
Computers in Industry 65 (2014) 657–674
COPYRIGHT
(a) (b)
Bulletin of the Seismological Society of America, Vol. 104, No. 1, pp. 513–528, February 2014, doi: 10.1785/0120130136
Bulletin of the Seismological Society of America, Vol. 104, No. 1, pp. 513–528, February 2014, doi: 10.1785/0120130136
Each MU is responsible for switching one output between 2
Bulletin of the Seismological Society of America, Vol. 104, No. 1, pp. 513–528, February 2014, doi: 10.1785/0120130136
The Attenuation of Fourier Amplitudes for Rock Sites in Eastern North America 517
110m) generally leading to higher recorded amplification than the deeper boreholes (220-450m),
INTRODUCTION
WHAT IS A DSS?
ISSN (Print) : 2319-5940
Volume 4, Issue 4, April 2014 ISSN: 2277 128X
University \Alexandru Ioan Cuza" of Iasi, Romania
An Integration and Empirical Examination THEORETICAL BACKGROUND AND HYPOTHESES The
2014 Fourth International Conference on Communication Systems and Network Technologies 2014 Fourth International Conference on Communication Systems and Network Technologies
Computers and Electrical Engineering 38 (2012) 1062–1072
International Journal of Computer Science & Information Technology (IJCSIT) Vol 3, No 6, Dec 2011
A Design and Implementation of Intrusion
Automatic network intrusion detection: Current techniques
NETWORK INTRUSION DETECTION USING DATA
A Design and Implementation of Intrusion
International Journal of Information Technology, Control and Automation (IJITCA) Vol.2, No.3, July 2012
International Journal of Engineering Research (ISSN:2319-6890)(online),2347-5013(print)
Research Journal of Applied Sciences, Engineering and Technology 4(23): 5010-5015, 2012
Hippocratic Databases
Hippocratic Databases
Available online at www.sciencedirect.com
Marissa Mayer Data mining is going through a signifi cant
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 21, NO. 9, SEPTEMBER 2009 1233
The area of human behavior representation is at least as
A Simplified Prediction Model for Urban Traffic
Air Traffic Flow of Genetic Algorithm to Optimize
Deep Architecture for Traffic Flow Prediction: Deep
Using Long-Term Prediction for Web Service
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
With an explosive growth of the mobile applications and emerging
Mobile photo sharingservice enables mobile users to upload images
2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
Accepted in Wireless Communications and Mobile Computing - Wiley
Computer Networks 57 (2013) 179–196
Chapter 4
Chapter 4
European Journal of Operational Research 173 (2006) 921–937
European Journal of Operational Research 173 (2006) 921–937
European Journal of Operational Research 173 (2006) 921–937
European Journal of Operational Research 173 (2006) 921–937
European Journal of Operational Research 173 (2006) 921–937
European Journal of Operational Research 173 (2006) 921–937
Comparison of MANOVA and ANOVA Now that we have presented
Comparison of MANOVA and ANOVA Now that we have presented
For the large Lookout Creek (LOOK) catchment, our analyses indicate a 10 –30%
embedded systems and support preliminary allocation in Figure 2. In this figure, blocks in the upper row
Hardware Models for Automated Partitioning
Security in distributed systems is a complex issue which can
J Netw Syst Manage (2011) 19:298–304
INNOVATE
Vol.12, No.4 EARTHQUAKE ENGINEERING AND ENGINEERING VIBRATION December, 2013
Vol.12, No.4 EARTHQUAKE ENGINEERING AND ENGINEERING VIBRATION December, 2013
Digital Watermarking
or ways to integrate code from other programming languages into
And so this brings us to the end of SPSS
or ways to integrate code from other programming languages into
And so this brings us to the end of SPSS
Sampling and data collectionData for the study was collected
1.23418
INNOVATE
satisfaction of the existinginformation on online environmentAbstractThe
2 Collaborative Intrusion Detection Networks A collaborative intrusion detection network
4 Selected Intrusion Detection Networks In the previous section we
Downloaded from http://aje.oxfordjournals.org/ at Libraries of the ClaremontColleges on February 8, 2015
Limiting Disclosure in Hippocratic Databases
w w w . e v e r m o t i o n . o r g archmodels vol. 58
INNOVATE
INNOVATE
www.it-ebooks.info PHP and MongoDB
A. Vahidian Kamyad, M. shokohi nia, M. R. shokohi nia/ TJMCS Vol .2 No.2 (2011) 241-254
1
Identification of Software Instabilities
A. Vahidian Kamyad, M. shokohi nia, M. R. shokohi nia/ TJMCS Vol .2 No.2 (2011) 241-254
J. Sens. Actuator Netw. 2012, 1, 217-253; doi:10.3390/jsan1030217
1
5
A. Vahidian Kamyad, M. shokohi nia, M. R. shokohi nia/ TJMCS Vol .2 No.2 (2011) 241-254
Expert Systems with Applications 42 (2015) 259–268
HindawiPublishingCorporation
2010 Second International Conference on Computer Engineering and Applications
IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 2, No 1, March 2010
distributed hydrologic models seek to simulatehydrologic state variables in space
distributed hydrologic models seek to simulatehydrologic state variables in space
distributed hydrologic models seek to simulatehydrologic state variables in space
distributed hydrologic models seek to simulatehydrologic state variables in space
distributed hydrologic models seek to simulatehydrologic state variables in space
distributed hydrologic models seek to simulatehydrologic state variables in space
Landscape and Urban Planning 98 (2010) 210–219
distributed hydrologic models seek to simulatehydrologic state variables in space
transmitting command and control from the operators to the UAV
Part I
Frequency shift keying uses the following two basis functions for the two dimensional signal
Service-Oriented Architectures Testing: A Survey
INNOVATE
Information Sciences xxx (2014) xxx–xxx
BARRIERS TO GOVERNMENT CLOUD ADOPTION ABSTRACT Besides the benefits are
Dynamic Hooks: Hiding Control Flow Changes
a b s t r a c t Kernel queue
a b s t r a c t Kernel queue
UNDERSTANDING WiMAX:
Special Publication 800-86
International Journal of Advanced Science and Technology
Business Intelligence Solutions
Business Intelligence Solutions
Business Intelligence and
Microsoft offers a competitive and expanding set of BI and
OECD/OCDE 443
Vaccine 32 (2014) 4365–4368
Vaccine 32 (2014) 4365–4368
Over the past centuries, technologies have
security Situation Awareness Problem This section highlights some of the
sensor data fusion has been recommended as a methodology to
Journal of Loss Prevention in the Process Industries 27 (2014) 21e31
security Situation Awareness Problem This section highlights some of the
s SA is the ability to recognize salient cues from
The recent economic and social changes that occurred in Europe
The support of an association rule indicates howfrequently that rule
ISSN (Online) : 2278-1021
protocol were used to simulate data representing five proportions of
Multi-Dimensional Relational Databases Operational Databases
The Gynecologic Cancer InterGroup aimed to provide an overview of
The Gynecologic Cancer InterGroup aimed to provide an overview of
Limiting Disclosure in Hippocratic Databases
INNOVATE
INNOVATE
A Review of Operations Research Applications in
Bayesian Forecasting of Multinomial Time Series
Kuyoro S. O., Ibikunle F. & Awodele O.
2010 Second International Conference on Future Networks
Journal of Strategic Information Systems 18 (2009) 178–191
Computers & Geosciences 75 (2015) 57–65
364 CHAPTER 6 E-commerce Mark eting and Advertising Concepts
2012 Fourth International Conference on Multimedia Information Networking and Security
DECODING THE CITY
1
Computers 2014, 3, 1-35; doi:10.3390/computers3010001
Available online at www.sciencedirect.com
تانكذخيرهسيمان 750 و 1050 فوتمكعبي تانكاندازهگيريسيمان 500 فوتمكعبي تانكتهيهمحلولسيمان 500
Ensemble classifier for mining data streams Abstract The problem addressed
Expert Systems with Applications 39 (2012) 9054–9063
Introduction to
SALTZER ET AL. End-to-End Arguments in System Design 1
What reports are available There are five different ways you
only the best features to optimize your contents Focus on
The shift from physical presentation to digital delivery is putting
IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 1, FEBRUARY 2014 3
Labour Economics 19 (2012) 198–210
The Material Balance method is by no means a universal
algorithm parallel
64 Chapter 3 Parallel Computers
[3B2-11] mmi2011020086.3d 22/3/011 15:27 Page 86
The Material Balance method is by no means a universal
1
A A//D D
9
ComputerStandards&Interfaces37(2015)9–19
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Theauthors provide evidence that the divergence between CLV that includes
Definition of Functional Urban Areas (FUA) for the OECD
TWO
20
G Model
Understanding
Engineering Applications of Artificial Intelligence 24 (2011) 717–732
A.H. Gandomi et al. / Engineering Applications of Artificial Intelligence 24 (2011) 717–732 721
724 A.H. Gandomi et al. / Engineering Applications of Artificial Intelligence 24 (2011) 717–732
A.H. Gandomi et al. / Engineering Applications of Artificial Intelligence 24 (2011) 717–732 727
TELE 630 No. of Pages 18, Model 3G
this study considers useful for discriminative customerrelationship managementThe results ofthis
this study considers useful for discriminative customerrelationship managementThe results ofthis
Available Online at www.ijcsmc.com
Cluster Comput
Information Science and Statistics
Research Design 31
thischapter focuses on challenges and approaches to integration of information
�.
2013 IEEE International Conference on Big Data
The Ophidia project is a research effort addressing big data
ComputerStandards&Interfaces37(2015)9–19
Surveying Victims: Options for Conducting the
Structures Congress 2012 © ASCE 2012 2279
This article was downloaded by: [Jyvaskylan Yliopisto]
CSA is diffi cult due to the dynamic nature of
CSA is diffi cult due to the dynamic nature of
CSA is diffi cult due to the dynamic nature of
Nodes or elements of thenetwork change very quickly and the
Nodes or elements of thenetwork change very quickly and the
Available online at www.sciencedirect.com
Introduction Data clustering is the process of placing data items
Trim Size: 6in x 9in Goldsmith c03.tex V2 - 07/26/2014 9:36am Page 58
Chapter 7
116 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS, VOL. SMC-15, NO. 1, JANUARY/FEBRUARY 1985
DecisionSupportSystems69(2015)82–91
The requirement for advanced security equipment to scan data streams for
are one of the major techniques used to protect such
Although the ultimate goal of research in Cyber Situational Awareness
European Journal of Operational Research 158 (2004) 146–172
Data Communication Networks
network layer
The requirement for advanced security equipment to scan data streams for
The requirement for advanced security equipment to scan data streams for
E-C ommer c e S ecurit y and F r aud
10.5 The Information Assurance Model and Defense Strategy 487
Creating a social network dataset requires us to
NamedDataNetworking
Simulation of X-ray tubes for imaging applications
*
Mobile Agent Information Security in Ad-Hoc Network
Functional connectivity in resting-state fMRI: Is linear correlation
M M M Mar ar ar ark k k ke e e ettttiiiing ng ng ng R R R Re e e es s s sear ear ear earc c c ch h h h and and and and D D D De e e ec c c ciiiis s s siiiion on on on S S S Suppor uppor uppor upport t t t
Computers and Electronics in Agriculture 76 (2011) 266–276
the autopilot is more accurately described as the automatic flight
When positioned over the part of the brain that controls
This page
Business Intelligence
INTEGRATION OF CONCEPTUAL DATA
Encyclopedia of Biometrics
*
Pattern Anal Applic
Rev. Confirming Pages
Tcpcrypt maintains the confidentiality of data transmitted in TCP segments
PATTERNS IN COLORED PETRI NETS
20I4 INTERNATIONAL CONFERENCE ON COMPUTATION OF POWER, ENERGY, INFORMATION AND COMMUNICATION (ICCPEIC)
IEEEJOURNALOFSOLID-STATECIRCUITS,VOL.49,NO.12,DECEMBER2014 3079
Ad Hoc Networks 10 (2012) 1497–1516
ve already given you a teaser about fundamental analysis during
ve already given you a teaser about fundamental analysis during
ve already given you a teaser about fundamental analysis during
Fundamental Analysis Fundamental analysis is a way of looking at
VOL. 3, NO.11 Nov, 2012 ISSN 2079-8407
Forest Ecology and Management 331 (2014) 12–18
information sets and decisions for a large sample of private
interest
International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.3, May 2012
JOURNAL OF SOFTWARE, VOL. 4, NO. 10, DECEMBER 2009 1119
International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.6, November 2012
Proceedings of the 2005 IEEE
Proceedings of the 2005 IEEE
Securing Distributed Storage: Challenges, Techniques,
and helps avoid firing a CEO for bad luck or
Monitoring Managers
K22172
SHOPWELL
A
Gowri.K et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (6) , 2014, 7122-7125
Southern Cross University
Knowl Inf Syst (2008) 14:1–37
ANF: A Fast and Scalable Tool for Data Mining
A
What is metadata?
How Monetary Policy Affects the Forex Market As we mentioned
INNOVATE
Proceedingsofthe6thWorldCongressonIntelligentControl
Proceedingsofthe6thWorldCongressonIntelligentControl
Proceedingsofthe6thWorldC
؟Monitoring Managers: Does It Matter
information sets and decisions for a large sample of private
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Hierarchical Disaster Tolerant Architecture Based on Virtual Storage Technology Abstract
resources of multiple cloud service providers can be utilized cooperatively
1 Introduction More and more services rely on IT systems
the status of data is becoming increasing important in information
Rev. Confirming Pages
1 Introduction More and more services rely on IT systems
s main function starts with capital M and is named
s main function starts with capital M and is named
Classes and structs Classes and structs are same as in
Neurocomputing ∎ (∎∎∎∎)∎∎∎–∎∎∎
Neurocomputing ∎ (∎∎∎∎)∎∎∎–∎∎∎
Neurocomputing ∎ (∎∎∎∎)∎∎∎–∎∎∎
Neurocomputing ∎ (∎∎∎∎)∎∎∎–∎∎∎
Neurocomputing ∎ (∎∎∎∎)∎∎∎–∎∎∎
324 Hooper
Electron Commer Res
Principles and Techniques
324 Hooper
Sparse representation-based robust face recognition by graph
Sparse representation-based robust face recognition by graph
SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013
124 THE RESPONSIVE CITY As others with new ideas have
a prosecution would taint that entire market with the possibility
making it possible for Goldsmith to set up joint inspection
SMART CITY 133 identifier data field that united the data
136 THE RESPONSIVE CITY When data is routinely released to
in which both the training and test samples mightbe corrupted
in which both the training and test samples mightbe corrupted
has caught a lot of attention in computervision and machine
Identification of Individual Walking Patterns
Identification of Individual Walking Patterns
says Mark Zuckerberg Facebook founder and CEO hopes to bring
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
Journal of Machine Learning Research 3 (2003) 1265-1287 Submitted 5/02; Published 3/03
J Med Syst (2012) 36:1731–1743
to generate and transmit your orders to your brokerage for
P1: JYS
Efficient Resource Management for Cloud
Computer Networks 54 (2010) 2787–2805
w
w w
Selecting the Right Interestingness Measure for
w w
w w
Statistical
w w
اینترنت اشیا
w w
اینترنت اشیا
A Survey of View Selection Methods
Available online at www.sciencedirect.com
Information Processing and Management 49 (2013) 51–66
CISCO 7200VXR SERIES ROUTER
Neurocomputing 156 (2015) 68–78
G Model
J Ind Eng Int (2014) 10:54
14
14
17
Statistical
Our portfolio can meet any requirement Gearmotors and inverter technology
Our portfolio can meet any requirement Gearmotors and inverter technology
Part I
TECHNOLOGY AND APPLICATION OF STRUCTURAL
TECHNOLOGY AND APPLICATION OF STRUCTURAL
that doubles the performance of the previous generation engine for
Optimization of Clustering in SPIN-C
Introduction
Hawkish and Dovish Central Banks We just learned that currency
Hawkish and Dovish Central Banks We just learned that currency
Part 5
Electron Commer Res
This chapter presents replication and snapshot technologies and how they
Chapter
G Model
www.ietdl.org
the indicators of each dimension can be aggregated to reveal
the indicators of each dimension can be aggregated to reveal
OWNER’S MANUAL
CAD\CAM
European Medicines Agency
European Medicines Agency
2014 China International Conference on Electricity Distribution (CICED 2014) Shenzhen, 23-26 Sep. 201 4
NUMERO 2 - giugno 2011 ISSN 2036 1602
Latches and Flip-Flops 341
and business forces has led corporate practitioners in training and
and business forces has led corporatepractitioners in training and development
Uncertainty is encountered when an experiment such as sampling is
Uncertainty is encountered when an experiment such as sampling is
Uncertainty in Learning from Big Data Edited By Xizhao Wang
2012 15th International IEEE Conference on Intelligent Transportation Systems
2012 15th International IEEE Conference on Intelligent Transportation Systems
Expert Systems with Applications 40 (2013) 1054–1060
Available online at www.sciencedirect.com
Data encryption and authentication tcpcrypt encrypts and authenticates all application
An Exhaustive Study on Data Mining Techniques in Mining of
COMPUTER SCIENCE REVIEW ( ) –
ARTICLE IN PRESS
An Exhaustive Study on Data Mining Techniques in Mining of
An Exhaustive Study on Data Mining Techniques in Mining of
ASAR: An ant-based service-aware routing algorithm for
Delay-Constrained High Throughput Protocol for Multi-Path Transmission
Error Control and Flow Control TCP uses port numbers to
Principles and Techniques
Scheduling Real-time Workflow on
JaR anu –Fe y BR R au y 2013
Utterback, Abernathy--Dynamic Model of Process and Product
generational pedigrees The reconstruction of pedigrees from genetic marker data
Graph Database Design Challenges using HPC Platforms Graph Database Design
have recently gained popularity in the database research community due
have recently gained popularity in the database research community due
have recently gained popularity in the database research community due
have recently gained popularity in the database research community due
An Exhaustive Study on Data Mining Techniques in Mining of
Chapter 12: Game Data Mining
Multi-hypothesis nearest-neighbor classifier based
Chapter 12: Game Data Mining
Chapter 12: Game Data Mining
AA, for example, the left most plot shows the level/time history plot of a specific
Performance Evaluation of Routing Protocols for
JaR anu –Fe y BR R au y 2013
This article was downloaded by:[Atiquzzaman, Mohammed]
A Survey on Concept Drift Adaptation
A Survey on Security Issues in Cloud Computing
Essential Image Processing
COMPUTER SCIENCE REVIEW ( ) –
Journal of Environmental Statistics
MiningBigData: CurrentStatus,andForecasttothe
MiningBigData: CurrentStatus,andForecasttothe
MiningBigData: CurrentStatus,andForecasttothe
MiningBigData: CurrentStatus,andForecasttothe
MiningBigData: CurrentStatus,andForecasttothe
MiningBigData: CurrentStatus,andForecasttothe
MiningBigData: CurrentStatus,andForecasttothe
Bonfring International Journal of Data Mining, Vol. 5, No. 1, February 2015 1
Overview
Journal of Operations Management 24 (2006) 711–727
MiningBigData: CurrentStatus,andForecasttothe
The extension of database application to handle multimedia objects requires
Applied Soft Computing 30 (2015) 72–82
Journal of Environmental Statistics
2013 IEEE 27th International Conference on Advanced Information Networking and Applications
Next-Generation Tax Provision Software:
Learning Objectives Describe text mining and understand the need for
Available online at www.sciencedirect.com
A Av vailab ailable online at le online at www www.sciencedirect.com .sciencedirect.com
Journal of Operations Management 24 (2006) 711–727
DATA WAREHOUSING
Journal of Environmental Statistics
Next-Generation Tax Provision Software:
Springer Texts in Business
Southern Cross University
Southern Cross University
DomainAdaptiveObjectDetection
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Text Mining Sholom M. Weiss
Companies that understand the value that security brings to the
Companies that understand the value that security brings to the
Companies that understand the value that security brings to the
An Evaluation Model of Supply Chain Performances Using 5DBSC and
1 The Difference between Electronic and Paper
Available online at www.sciencedirect.com
Z02_TURB9235_03_SE_WAP2.QXD 8/18/10 10:50 AM Page 1
AnArchitectureforaGeneralPurposeMulti-Algorithm
Design and Implementation of A Content-aware Switch using A Network
aware Switch using A Network Processor Abstract Cluster based server
aware Switch using A Network Processor Abstract Cluster based server
Design and Implementation of A Content-aware Switch using A Network
aware Switch using A Network Processor Abstract Cluster based server
Oct OBeR 2012
Design and Implementation of A Content-aware Switch using A Network
Z02_TURB9235_03_SE_WAP2.QXD 8/18/10 10:50 AM Page 1
is usually used to refer to the internal storage locations
MiningBigData: CurrentStatus,andForecasttothe
Bonfring International Journal of Data Mining, Vol. 5, No. 1, February 2015 1
models have been established for qualitative and quantitative prediction of
models have been established for qualitative and quantitative prediction of
214 Applications and Examples
DATA WAREHOUSING
CHAPTER 5
CHAPTER 5
CHAPTER 5
CHAPTER 5
CHAPTER 5
Gholami
Gholami
CHAPTER 4
Ad Hoc Networks 25 (2015) 38–53
Design and Implementation of A Content-aware Switch using A Network
CHAPTER 8
CHAPTER 8
Running Head: Dining Experience 1
A Guide to ERP: Benefits,
Springer Texts in Business
56 The International Journal of Digital Accounting Research 57
Providing easy public access to XBRLformatted data of company
COMPNW 5477 No. of Pages 22, Model 3G
A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems
A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems
Information Processing and Management 49 (2013) 51–66
Chapter 2 The Information Architecture of Meaning Making Terence Fenn
متن در مورد یک نرم افزار تحت اکسل می باشد
A2B08: Committee on Highway Traffic Monitoring
is a language based on XML for theelectronic communication
Research in Nursing & Health, 2000, 23, 334–340
5/12/2015 Data Mining: Classification VS Clustering (cluster analysis) | Paras Doshi - Blog
in process foressential reporting with eXtensible Business Reporting Language
in process foressential reporting with eXtensible Business Reporting Language
Noghrei
Two Can Keep a Secret: A Distributed Architecture for
This regular paper was presented as part of the main
This regular paper was presented as part of the main
This regular paper was presented as part of the main
Available online at www.sciencedirect.com
Fig. 12.4. Hard assignment of data samples to cluster centroids for AA (top left), k-means (top right),
Automation in Construction 35 (2013) 238–253
2008 Workshop on Knowledge Discovery and Data Mining 2008 Workshop
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
BraceForce: AMiddlewaretoEnableSensingIntegration
Research on Parallel Algorithm for Polygon
CRM
10.1109/ULTSYM.2014.0537
Applied Soft Computing 14 (2014) 81–87
IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS, VOL. 34, NO. 4, NOVEMBER 2004 513
System Architecture The system architecture vaguely shows how any honeypot
dundancy for L1 caches corresponding to the L2 cache with
2012 Third International Conference on Emerging Intelligent Data and Web Technologies
2014 Annual IEEE India Conference (INDICON)
2014 International Conference on Computational Science and Computational Intelligence 2014
2041 IEEE 2 8-th Convention of Electrical and Electronics Engineers in Israel
Analysis of Linux Scheduling with VAMPIR
created applications on a development platform that a cloud service
created applications on a development platform that a cloud service
created applications on a development platform that a cloud service
created applications on a development platform that a cloud service
created applications on a development platform that a cloud service
created applications on a development platform that a cloud service
A Content-Centric Architecture
A Content-Centric Architecture
Hindawi Publishing Corporation
TinyOS – An Operating System for Tiny Embedded Networked Sensors
focus. However, when the variation in the intensity of the
TinyOS – An Operating System for Tiny Embedded Networked Sensors
Interactions and issues of urban water management 67
.. · ... ·.·.
Int. Fin. Markets, Inst. and Money 26 (2013) 30– 45
GEOPHYSICS, VOL. 77, NO. 5 (SEPTEMBER-OCTOBER 2012); P. WC173–WC190, 17 FIGS.
CHAPTER 6
TheMobileDataChallenge:
O on same link Data transferred at a fixed rate
O on same link Data transferred at a fixed rate
O on same link Data transferred at a fixed rate
A streaming approach abstract Requirements in computational power have grown
Knowledge-Based Systems 79 (2015) 36–42
Available online at www.sciencedirect.com
A case study of the NetInf architecture abstract A large
Software defined networking for security enhancement in wireless mobile networks
The θ–S curve is also useful, like vertical profiles of salinity and potential temperature
increased sensitivity and precision, has helped a great deal to distinguish between different water
A Computationally Efficient Fingerprint Matching Algorithm for
International Journal of Security and Its Applications
Nearest Neighbor Queries Abstract Supporting aggregate range queries on remote
Journal of Strategic Information Systems 24 (2015) 3–14
3. GeNeri C re Co NCiLiATio N MeTHodo Lo Gy
Household Production Household production is the production of goods and
Virtualization and Resiliency for Data Center Computing INTRODUCTION Cloud computing
cloud computing offers IT to be treated as an ongoing
. (کامپیوتر-امنیت-شبکه)
Holz als Roh- und Werkstoff 60 (2002) 159–164 � Springer-Verlag 2002
772 IEEE TRANSACTIONS ON MEDICAL IMAGING, VOL. 20, NO. 8, AUGUST 2001
ISSN 2348 – 9928
ScalingBigDataMiningInfrastructure:
ISSN No: 2348-4845
Vitthal Yenkar et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.4, April- 2014, pg. 97-102
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 26, NO. 1, JANUARY 2014 97
Presenting Structural Equation Model for Measuring OrganizationalLearning Capability From a
is a wireless network consists of large number of sensor
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Ecology, 95(1), 2014, pp. 22–29
www.it-ebooks.info www.it-ebooks.info HARNESSING GREEN IT
Workbook
This Page Intentionally Left Blank Advanced Petroleum
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
Robust Data Clustering
This chapter presents replication and snapshot technologies and how they
level data to evaluate the distribution of debt across households
This chapter presents replication and snapshot technologies and how they
Provide a method for dynamic data replication to enhance data
This chapter presents replication and snapshot technologies
Experimentation
TransportaTion
TransportaTion
European Journal of Economics, Finance and Administrative Sciences
European Journal of Economics, Finance and Administrative Sciences
European Journal of Economics, Finance and Administrative Sciences
J.R. Cutcliffe
Understanding Conceptual Development 65
European Journal of Economics, Finance and Administrative Sciences
J.R. Cutcliffe
Understanding Conceptual Development 65
Understanding Conceptual Development 65
J.R. Cutcliffe
European Journal of Economics, Finance and Administrative Sciences
Understanding Conceptual Development 65
J.R. Cutcliffe
European Journal of Economics, Finance and Administrative Sciences
Understanding Conceptual Development 65
Data Communications and Networking
Knowledge-Based Systems 73 (2015) 335–346
Genetic Algorithm for the Determination of Linear
Macromolecules 2003, 36, 4443-4451 4443
A streaming approach abstract Requirements in computational power have grown
Genetic Algorithm for the Determination of Linear
Expert Systems with Applications 38 (2011) 1039–1052
CYBERCRIME
PHASE BEHAVIOR
we developers have seen many changes in terms of how
Machine Learning for Natural Language Processing
Replication 299
Replication 299
In order to be able to change the design of
FAULT DETECTION IN PROCESS CONTROL
IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 1, FIRST QUARTER 2013 5
LIU LAYOUT 11/5/08 3:40 PM Page 26
Integrating RFID Tags with Sensors Integration of this class enables
3.4.3 Undersaturated-Oil Compressibility. With measured data
Integrating Readers with WSN Nodes and Wireless Devices Another type
Information Science and Statistics
Master’s thesis
is used to customer segmentation of a health and beauty
definition One of the most important papers that discusses related
since multimedia data are unstructured by nature therefore mining the
1.3 Book organization
1.3 Book organization
2
2
2014 IEEE 10th World Congress on Services 2014 IEEE 10th World Congress on Services 2014 IEEE 10th World Congress on Services
2015 29th International Conference on Advanced Information Networking and Applications Workshops
On the use of Markov chain models for the analysis
1
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
High Speed Wind Tunnel and
Lecture Notes in Computer Science 1
Introduction Modern software systems manage and process an increasing amount
PEACEW RKS
2011 IEEE International Symposium on Information Theory Proceedings
Mohammadi
1
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
2013 IEEE International Conference on Big Data
2012 Third International Conference on Emerging Intelligent Data and Web Technologies
2014 International Conference on Computational Science and Computational Intelligence 2014
2012 Third International Conference on Emerging Intelligent Data and Web Technologies
2014 International Conference on Computational Science and Computational Intelligence 2014
Extension of Negative Binomial
Applied Soft Computing 7 (2007) 29–40
2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 26, NO. 1, JANUARY 2014 97
NISTIR 7956
97
Data Mining with Big Data
1
2013 46th Hawaii International Conference on System Sciences 2013 46th Hawaii International Conference on System Sciences
The Power of Prediction:
Mohammadi
The Power of Prediction:
At this stage the user who has commissioned or procured
a b s t r a c t Development of
a b s t r a c t Development of
International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868
ZHENG LAYOUT_Layout 1 6/21/13 12:00 PM Page 34
Global Assessment Programme Toolkit Module 1
This page
Database Systems Journal vol. III, no. 3/2012 داده کاوی با استفاده از رایانش ابری
Jaeger uses data mining to reduce losses from crime and
Global Assessment Programme Toolkit Module 3
USENIX Association
Proceedings of the 2010 IEEE
White Paper
White Paper
White Paper
Developing an Integrated Drug Information System
782 JOURNAL OF NETWORKS, VOL. 5, NO. 7, JULY 2010
IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 16, NO. 1, FIRST QUARTER 2014 393
Omega 41 (2013) 431–440
was developed in the 1990s and came into clinical use
CBCT in orthodontics using a single type of CBCT scanner
G Model
Abstract The development of mechanisms to ease human machine interaction
1. Introduction
we have also designed a proposal to enhance an existing
As a third contribution of this paper and in order
There is outstanding research that considers the modeling of contextual data in information systems:
2.3. Context in database querying
2.4. Context, databases and fuzzy set theory
3. An architecture for Context-Aware Fuzzy Databases
4.1. Context-dependent data
4.2. Context dependency in our implementation
Fig. 8. LE of Ana Perez raw data.
ARTICLE IN PRESS
Makes
ARTICLE IN PRESS
Makes
Fuzzy Domain
We have also applied the proposed architecture to enhance a widely extended object-relational system like Oracle so that linguistic
18th World Conference on Nondestructive Testing, 16-20 April 2012, Durban, South Africa
1. Introduction
we have also designed a proposal to enhance an existing
As a third contribution of this paper and in order
There is outstanding research that considers the modeling of contextual data in information systems:
2.3. Context in database querying
2.4. Context, databases and fuzzy set theory
3. An architecture for Context-Aware Fuzzy Databases
4.1. Context-dependent data
4.2. Context dependency in our implementation
Fig. 8. LE of Ana Perez raw data.
ARTICLE IN PRESS
Makes
Fuzzy Domain
We have also applied the proposed architecture to enhance a widely extended object-relational system like Oracle so that linguistic
ISSN 01476882, Scientific and Technical In formation Processing, 2012, Vol. 39, No. 3, pp. 173–178. © Allerton Press, Inc., 2012.
st
st
أ
03-88450_c1-4_pr.qxd 27/04/2004 10:17 Page 1
03-88450_c1-4_pr.qxd 27/04/2004 10:17 Page 1
ZHENG LAYOUT_Layout 1 6/21/13 12:00 PM Page 34
is therefore desired. Several corresponding-states viscosity correla-
is therefore desired. Several corresponding-states viscosity correla-
is therefore desired. Several corresponding-states viscosity correla-
2014 22nd International Conference on Pattern Recognition
Fig. 8. LE of Ana Perez raw data.
2. SECURITY CONCERNS IN A COMPUTER-BASED ACCOUNTING SYSTEM
Decision Support Systems market a decision-support software package, The Expert Business
4. MODEL DEVELOPMENT
4. MODEL DEVELOPMENT
4. MODEL DEVELOPMENT
r 0 0.1 0.2 0.3 . . . . . . 0.7 0.8 0.9 1.0
Available online at www.sciencedirect.com
In addition to the header information that is also used
14
17
Incremental processing for iterative computation. Incre-
Marketing Information Systems
Marketing Information Systems
DESY 02–037
61
85
85
Vehicular delay- toler ant
Vehicular delay- toler ant
Marketing Information Systems
2011 IEEE International Symposium on Information Theory Proceedings
Vehicular delay- toler ant
03-88450_c1-4_pr.qxd 27/04/2004 10:17 Page 1
Proceedings of the 2010 IEEE
CalvinFS: Consistent WAN Replication
CalvinFS: Consistent WAN Replication
weHelp: AReferenceArchitectureforSocialRecommender
weHelp: AReferenceArchitectureforSocialRecommender
09 has kept some RNs in the workforce who might
09 has kept some RNs in the workforce who might
first break volume 30, March 2012 technical article
6th International Conference on Internet Technology and Secured Transactions, 11-14 December 2011, Abu Dhabi, United
p u b l i c a t i o n / 2 3 2 6 1 8 2
Many literatures have reviewed the application of data mining technology
Available online at www.sciencedirect.com
Genetic Algorithm for the Determination of Linear
Information Sciences 180 (2010) 62–70
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Database Management will be audited approximately once every three years
Itiseasytosee that different modalities have different contributions in soccer goaldetection
results primarily in video of events where a home run
Improve the classification and Sales management of products using
ScienceDirect
ASP.NET 4
This paper used clustering techniques as one of the methods
ENGINEERING TOOLS, TECHNIQUES AND TABLES
Geographical Information
A survey on summarizability issues in
A survey on summarizability issues in
Global Assessment Programme Toolkit Module 3
Chapter 8
بررسی و ارزیابی روشهای انتشار اطلاعات در شبکه حسگر بیسیم
categorise and interpret this life of a woman from another
r r
Marketing Information Systems
Marketing Information Systems 149
150 Marketing Information Systems
Marketing Information Systems
Marketing Information Systems
Geographical Information
Data & Knowledge Engineering 70 (2011) 732–752
N. Prat et al. / Data & Knowledge Engineering 70 (2011) 732–752 735
736 N. Prat et al. / Data & Knowledge Engineering 70 (2011) 732–752
N. Prat et al. / Data & Knowledge Engineering 70 (2011) 732–752 739
740 N. Prat et al. / Data & Knowledge Engineering 70 (2011) 732–752
CROSS-LAYER SCHEDULING IN CLOUD COMPUTING
Information Sciences 175 (2005) 1–19
Wisdom Development Scale (WDS©)
Examples such as the following travel scenario are used throughout
Architecture of the World Wide Web Introduction The World Wide
The Internet’s TCP guarantees the reliable, in-order delivery of a stream of
Deep Learning-Based Goal Recognition in Open-Ended Digital Games
Discovery ANALYSIS
SMART CITIES READINESS GUIDE
Chapter 8
Available online at www.sciencedirect.com
424 JOURNAL OF COMMUNICATIONS, VOL. 6, NO. 6, SEPTEMBER 2011
SMART CITIES READINESS GUIDE
بررسی و ارزیابی روشهای انتشار اطلاعات در شبکه حسگر بیسیم
core designs migrated from Symmetric Multi Processing to cache coherent
core designs migrated from Symmetric Multi Processing to cache coherent
Expert Systems with Applications 37 (2010) 8793–8798
Expert Systems with Applications 37 (2010) 8793–8798
CalvinFS: Consistent WAN Replication
CalvinFS: Consistent WAN Replication
This page
Master’s Thesis
2011 Fourth IEEE International Conference on Software Testing, Verification and Validation
A Grid-based Clustering Algorithm using Adaptive Mesh Refinement
Australasian Universities Power Engineering Conference, AUPEC 2013, Hobart, TAS, Australia, 29 September - 3 October 2013
CalvinFS: Consistent WAN Replication
Part 5 Examples of Instrumentation Applications The goal of Part
Taxonomy of Linux Kernel Vulnerability Solutions
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011
www.it-ebooks.info Getting Started with SQL
(IJCSIS) International Journal of Computer Science and Information Security,
Context of Systems Analysis
Applying Text Analytics to Social Media It presents great challenges
Least Squares Support Vector Machines for Clustering
we present one real world application to further illustratehow to
Text preprocessing aims to make the inputdocuments more consistent to
Applying Text Analytics to Social Media It presents great challenges
we present one real world application to further illustratehow to
Text preprocessing aims to make the inputdocuments more consistent to
Text preprocessing aims to make the inputdocuments more consistent to
Applying Text Analytics to Social Media It presents great challenges
we present one real world application to further illustratehow to
Applying Text Analytics to Social Media It presents great challenges
we present one real world application to further illustratehow to
Applying Text Analytics to Social Media It presents great challenges
Text preprocessing aims to make the inputdocuments more consistent to
Biomedical Signal Processing and Control 21 (2015) 82–89
ُُُShaban
Cloud computing Abstract Due to the increasing use of Cloud
Atmospheric Environment 82 (2014) 172e182
Journal of Manufacturing Processes 19 (2015) 1–13
3
1--7--41855--33278
Computers and Electrical Engineering 39 (2013) 640–654
16_050845 ch09.qxp 11/21/06 1:15 PM Page 140
Economic Decision Making Using Fuzzy Numbers
Proceedings of the 43rd Hawaii International Conference on System Sciences - 2010
Proceedings of the 43rd Hawaii International Conference on System Sciences - 2010
International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.3, May 2014
GEOPHYSICS, VOL. 68, NO. 3 (MAY-JUNE 2003); P. 1065–1074, 14 FIGS.
Chapter Overview
Journal of Information & Computational Science 9: 4 (2012) 1083–1096
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 26, NO. 1, JANUARY 2014 97
Evaluating Geostatistical and Neural Network Methods in Estimating Soil Saturated
Analysis of the Effectiveness of the City of Durham Fire
Volume 4, Issue 5, May 2014 ISSN: 2277 128X
Abstract—BigDataconcernlarge-volume,complex,growingdatasetswithmultiple,autonomoussources.Withthefastdevelopment
MiningBigData: CurrentStatus,andForecasttothe
Analysis of the Effectiveness of the City of Durham Fire Departments" Fire Prevention and Life Safety Public
www.sciedu.ca/ijba International Journal of Business Administration Vol. 3, No. 6; 2012
Jurnal Kemanusiaan bil.11, Jun 2008
Jurnal Kemanusiaan bil.11, Jun 2008
16_050845 ch09.qxp 11/21/06 1:15 PM Page 140
The research community is all internet customers shopping for mobile
Journal of Operations Management 21 (2003) 405–435
ANNALS OF THE ORADEA UNIVERSITY
HEALTH INFORMATION TECHNOLOGY INFRASTRUCTURE TO
Ethical
How To Choose an Effective Backup Strategy for your VPS
2015 29th International Conference on Advanced Information Networking and Applications Workshops
Power Line Communication Technology
2013 Ninth International Conference on Computational Intelligence and Security
Course Technology’s Management Information Systems
1
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
ARTICLE IN PRESS
22 IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 1, FEBRUARY 2014
Abstract—k-meansisundoubtedlyoneofthemostpopularclusteringalgorithmsowingtoitssimplicityandefficiency.However,this
Abstract—k-meansisundoubtedlyoneofthemostpopularclusteringalgorithmsowingtoitssimplicityandefficiency.However,this
Computer Networks 54 (2010) 2787–2805
Computer Networks 54 (2010) 2787–2805
Computer Networks 54 (2010) 2787–2805
Computer Networks 54 (2010) 2787–2805
Computer Networks 54 (2010) 2787–2805
Available online at www.sciencedirect.com
Voyager 1450g
IJITKMI Volume 7 • Number 1 • December 2013 pp. 87-91 (ISSN 0973-4414)
the computer is equipped with electronically controlled engine diagnostic hardware
CHAPTER V
5. AN ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEM
5. AN ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEM
Information Sciences 305 (2015) 357–383
Ouedraogo et al. Journal of Cloud Computing: Advances, Systems
The 22nd Iranian Conference on Electrical Engineering (ICEE 2014), May 20-22, 2014, Shahid Beheshti University
Computers & Industrial Engineering 61 (2011) 503–511
Analyses ZDM 2006 Vol. 38 (2)
Analyses ZDM 2006 Vol. 38 (2)
ACriticalAnalysisontheSecurityConcernsof
Analyses ZDM 2006 Vol. 38 (2)
consumption of resources, to solve this problem, lightweight
Study on Security Architecture in the Internet of
Study on Security Architecture in the Internet of
2009 International Conference of Soft Computing and Pattern Recognition 2009 International Conference of Soft Computing and Pattern Recognition
Wireless Netw (2014) 20:1295–1311
product development and is professional to the production of solar
Information and Software Technology 54 (2012) 467–478
Journal of Network and Computer Applications 37 (2014) 62–75
sensor data fusion has been recommended as a methodology to
sensor data fusion has been recommended as a methodology to
sensor data fusion has been recommended as a methodology to
Chapter 2
4 Design architecture of MSNP platform MSNP system architecture is
Chapter 3
INTERNATIONAL JOURNAL FOR RESEARCH IN EMERGING SCIENCE AND TECHNOLOGY E-ISSN: 2349-7610
Information and Knowledge Management www.iiste.org
Information Sciences 305 (2015) 357–383
Information Sciences 305 (2015) 357–383
364 M. Ali et al./Information Sciences 305 (2015) 357–383
372 M. Ali et al./Information Sciences 305 (2015) 357–383
The Internet of Things: Challenges & Security Issues
Efficientk-Means++Approximation
2013 Ninth International Conference on Computational Intelligence and Security
364 M. Ali et al./Information Sciences 305 (2015) 357–383
372 M. Ali et al./Information Sciences 305 (2015) 357–383
ASurveyontheInternetofThingsSecurity
Information Sciences 305 (2015) 357–383
368 M. Ali et al./Information Sciences 305 (2015) 357–383
364 M. Ali et al./Information Sciences 305 (2015) 357–383
372 M. Ali et al./Information Sciences 305 (2015) 357–383
USOO8972403B2
Computers and Electrical Engineering 38 (2012) 1062–1072
Information Services, Geography 581
computers & security 28 (2009) 18–28
sensor data fusion has been recommended as a methodology to
Sensors Sensors are devices that provide observation data for use
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 2 8 5 8 7 2 4 2
1. Introduction
1. Introduction
product development and is professional to the production of solar
Information and Software Technology 54 (2012) 467–478
VOL. 1, NO.8, November 2011 ISSN 2222-9833
Solarwinds Application 2
Vehicular Communications 1 (2014) 214–225
COMMUNICA TIONS
Performance Evaluation of Reliability Aware Photonic Network-on-Chip
along with most people who are seriously attempting to do
A Seminar Report on
A Seminar Report on
T6963CFG
COMMUNICA TIONS
COMMUNICA TIONS
COMMUNICA TIONS
WIDEBAND WIRELESS ACCESS TECHNOLOGIES
KNOSYS 3135 No. of Pages 10, Model 5G
P
03 provides automatic registration of seismic signals generated by natural
channel electrical exploration receiver IMVP is designed for carrying out
2011 International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11
SkipTree: A Scalable Range-Queryable Distributed Data
A Signal Analysis of Network Traffic Anomalies
08_050845 ch03.qxp 11/21/06 1:12 PM Page 43
SkipTree: A Scalable Range-Queryable Distributed Data
Features
SkipTree: A Scalable Range-Queryable Distributed Data
نرم افزار
®
®
1
1
World Academy of Science, Engineering and Technology
the first prerequisite for entry into theclub of smart cities
the first prerequisite for entry into theclub of smart cities
the first prerequisite for entry into theclub of smart cities
whose business empire was built on the delivery of financial
Fishing for Apps Chastened by the struggles to build municipal
whose business empire was built on the delivery of financial
whose businessempire was built on the delivery of financial data
8 A Planet of Civic Laboratories Peter Hirshberg spins his
whose businessempire was built on the delivery of financial data
8 A Planet of Civic Laboratories Peter Hirshberg spins his
11e EDCA providing QoS Guarantees Abstract One of the challenges
The Global VSAT Forum
تخصصی هوش مصنوعی - سیستم های خبره
PeerTIS – A Peer-to-Peer Traffic Information System
2 Gathering network information The first step in developing cyber
2 Gathering network information The first step in developing cyber
2 Gathering network information The first step in developing cyber
The dynamics of conflict continue to evolve over time and
Expert Systems with Applications 31 (2006) 337–344
Expert Systems with Applications 31 (2006) 337–344
Expert Systems with Applications 31 (2006) 337–344
Chapter 3. Body-Worn Camera
the intelligenceprocess is described as a cycle applicable for modelingthe
the intelligenceprocess is described as a cycle applicable for modelingthe
The proposed model addressed essential issues onthe design of data
The proposed model addressed essential issues onthe design of data
The proposed model addressed essential issues onthe design of data
Magento PHP
Jazari
Jazari2
computers & security 27 (2008) 30–47
THE COOING MANUAL FOR QUALITATIVE RESEARCHERS
Korean J. Chem. Eng., 26(6), 1504-1511 (2009)
Resource
agricultural water management 95 (2008) 439–446
agricultural water management 95 (2008) 439–446
agricultural water management 95 (2008) 439–446
agricultural water management 95 (2008) 439–446
agricultural water management 95 (2008) 439–446
Are you a shy person with a snarky sense of
Stellenbosch University http://scholar.sun.ac.za
Decision Support Systems 50 (2011) 439–448
Most websites will still work properly even when this content is blocked. has blocked content that isn't secure.
Decision Support Systems 50 (2011) 439–448
the rule base and the membership functions associated with the
Most websites will still work properly even when this content is blocked. has blocked content that isn't secure.
D.Selvaraj et.al / Indian Journal of Computer Science and Engineering (IJCSE)
Most websites will still work properly even when this content is blocked. has blocked content that isn't secure.
This article was downloaded by: [Memorial University of Newfoundland]
This article was downloaded by: [Memorial University of Newfoundland]
GOVINF-01098;No.ofpages:10;4C:
Spin is a quantized phenomena that occurs due to angular
ASurveyonTruthDiscovery
JoepCrompvoets and Danny Vandenbroucke Abstract Location information is of increasing
International Journal of Soft Computing and Engineering (IJSCE)
GapcompensationduringPETimagereconstructionbyconstrained,total
CHAPTER 5
GapcompensationduringPETimagereconstructionbyconstrained,total
GapcompensationduringPETimagereconstructionbyconstrained,total
Dent Clin N Am 52 (2008) 707–730
GOVINF-01098;No.ofpages:10;4C:
Risk Engineering
Behdani
x
way prefix tree data structure for strings matching We propose
way prefix tree data structure for strings matching We propose
way prefix tree data structure for strings matching We propose
END ARGUMENTS IN SYSTEM DESIGN This paper presents a design
agricultural water management 95 (2008) 439–446
184 IEEE Transactions on Consumer Electronics, Vol. 60, No. 2, May 2014
1
The use of the Internet
in linguistic rules and millions of bilingual dictionaries for each
different fields of science [4, 5, 6, 7, 8]. DBSCAN clusters data ob-
Big data is a popular term used to describe the
Expert Systems with Applications 42 (2015) 259–268
increasing the capacity and speed using a different radio interface
African Journal of Business Management Vol. 5(16), pp. 7017-7030, 18 August, 2011
Journal of International Money and Finance 58 (2015) 29–50
A Robust Watermarking method based on
A Robust Watermarking method based on
A Robust Watermarking method based on
in linguistic rules and millions of bilingual dictionaries for each
Editors: Frédéric Thiesse • frederic.thiesse@unisg.ch
The Science of Science Policy INNOVATION AND TECHNOLOGY IN THE WORLD ECONOMY
that was to change the face of commercial computing profoundly
CYBERCRIME AND
Scientometrics
Building the Internet
Building the Internet
CHAPTER
The use of the Internet
Programming
Available online at www.sciencedirect.com
Information Systems 56 (2016) 19–35
Parallel Processing of Data from Very Large-Scale
Hindawi Publishing Corporation
5
Parallel Processing of Data from Very Large-Scale
484 IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 35, NO. 4, JULY/AUGUST 2009
Distributed Storage and Parallel Processing in
Integration of Wireless Sensor Networks and
An Intrusive Analyzer for Hadoop Systems Based on Wireless Sensor Networks
COMMUNICATIONS SOFTWARE
InformatI on t echnology
InformatI on t echnology
InformatI on t echnology
Chapter 1
An Intrusive Analyzer for Hadoop Systems Based on Wireless Sensor Networks
Integration of Wireless Sensor Networks and
ResearchArticle
We can learn a great deal about the detailed structure
We can learn a great deal about the detailed structure
The nearly identical results in either currency are expected and
Factors that contribute to low correlations of stock returns across
Available online at www.sciencedirect.com
IoT Framework Security Considerations
Hindawi Publishing Corporation
NLSR: Named-data Link State Routing Protocol
CLOUD COMPUTING
Computing (2013) 95:723–738
Handbook on Constructing Composite Indicators METHODOLOGY AND USER GUIDE
MECHANICAL MEASUREMENTS
J.ParallelDistrib.Comput.73(2013)284–292
ISSN 2277-3061
Parallel Processing of Data from Very Large-Scale
MECHANICAL MEASUREMENTS
Techniques and
Temporal Analytics on Big Data for Web
Large-ScaleBehavioralTargeting
Distrib Parallel Databases (2009) 26: 3–27
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 5 9 2 2 1 0 4 9
Cloud Computing Risk Assessment: A
Parallel Processing of Data from Very Large-Scale
Amazon markets AWS as a service to provide large computing
1
JBR-08661;NoofPages5
ISSN: 2278 – 1323
the small molecules that are used by living organisms for
Herland etal. JournalofBigData2014,1:2
InformationSciences330 (2016)74–87
Available online at www.sciencedirect.com
2011 IEEE International Conferences on Internet of Things, and Cyber, Physical and Social Computing
2011 IEEE International Conferences on Internet of Things, and Cyber, Physical and Social Computing
CHAPTER 9
Chapter 44
on the underlying research topic indicated that relevant papers have
International Journal of Computer Applications (0975 – 8887)
Big Data Analysis with Dataset Scaling in Yet another
Distrib Parallel Databases (2009) 26: 3–27
An Efficient Voice Driven Face Animation Method
New products from market research
Big Data Processing Using Hadoop: Survey on
Available online at www.sciencedirect.com
Research Article
IEEETRANSACTIONSONVISUALIZATIONANDCOMPUTERGRAPHICS, VOL.20, NO.12D , ECEMBER2014 1803
C6696_01_CTP.4c 1/28/08 8:21 AM Page 1
Journal of Process Control 21 (2011) 302–308
IEEE Region 10 Conference on Computer and Communication Systems, September 1990, Hong Kong
2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC)
Cluster Comput (2015) 18:1157–1169
Cluster Comput (2015) 18:1157–1169
686
686
CHAPTER
The 10th International Conference on
Computers and Electrical Engineering xxx (2015) xxx–xxx
An Efficient Approach for Privacy Preserving in Data
Computers and Electrical Engineering xxx (2015) xxx–xxx
The 10th International Conference on
An Ontology-based P2P Network for
GOVINF-01098;No.ofpages:10;4C:
GOVINF-01098;No.ofpages:10;4C:
IEEE TRANSACTIONS ON SUSTAINABLE ENERGY, VOL. 6, NO. 1, JANUARY 2015 219
Parallel Processing of Data from Very Large-Scale
Parallel Processing of Data from Very Large-Scale
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Landset et al. Journal of Big Data (2015) 2:24
A survey of open source tools
A survey of open source tools
Chapter 8
Survey on MapReduce Scheduling Algorithms
Poisson Model of Construction Incident Occurrence
C6696_FM_CTP.4c 2/8/08 4:14 PM Page i
Survey on MapReduce Scheduling Algorithms
73 4.1 Neural network modelling
13.5 Fluid Inclusions in Hydrothermal Ore Deposits
5
An Efficient Voice Driven Face Animation Method
An Efficient Voice Driven Face Animation Method
CHAPTER V
Points to Consider When Self-Assessing Your
35th Annual International Conference of the IEEE EMBS
35th Annual International Conference of the IEEE EMBS
35th Annual International Conference of the IEEE EMBS
Expert Systems with Applications 40 (2013) 2889–2903
35th Annual International Conference of the IEEE EMBS
The hidden perils of cookie syncing
35th Annual International Conference of the IEEE EMBS
The Internet of Things allows objects to be sensed and
FutureGenerationComputerSystems ( ) –
Computers in Industry 73 (2015) 69–81
PC-3000 EXPRESS / UDMA / PORTABLE
Murlidher Mourya et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 4 (5) , 2013, 681-682
Paper PH10-2012
35th Annual International Conference of the IEEE EMBS
35th Annual International Conference of the IEEE EMBS
An Efficient Voice Driven Face Animation Method
An Efficient Voice Driven Face Animation Method
Risk Assessment of Work-Related Musculoskeletal
35th Annual International Conference of the IEEE EMBS
35th Annual International Conference of the IEEE EMBS
35th Annual International Conference of the IEEE EMBS
35th Annual International Conference of the IEEE EMBS
IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 16, NO. 1, FIRST QUARTER 2014 61
Available online at www.sciencedirect.com
Optics Communications 339 (2015) 153–156
Optics Communications 339 (2015) 153–156
International Journal of Engineering Research & Technology (IJERT)
686
686
is an emergingtechnology and day by day it is attracting
is an emergingtechnology and day by day it is attracting
INTRODUCTION
SECURITY PROBLEMS
SECURITY PROBLEMS
SECURITY PROBLEMS
J. Parallel Distrib. Comput. 68 (2008) 64–77
Noname manuscript No.
Design and Implementation of a Semantic
Design and Implementation of a Semantic
Overview of LTE-A Technology
HORNET:High-speedOnionRoutingattheNetworkLayer
HORNET:High-speedOnionRoutingattheNetworkLayer
Hoseini-Hesam06
Hoseini-Hesam09
Hoseini-Hesam10
Information Sciences 305 (2015) 357–383
Journal of Network and Computer Applications 39 (2014) 93–103
CLOUD COMPUTING
Introduction to
1136 IEEE SYSTEMS JOURNAL, VOL. 8, NO. 4, DECEMBER 2014
1136 IEEE SYSTEMS JOURNAL, VOL. 8, NO. 4, DECEMBER 2014
Information Processing and Management 48 (2012) 903–917
686
Hoseini-Hesam-San06
Hoseini-Hesam-San09
Hoseini-Hesam-San10
Hoseini-Hesam-San
Analyzing the Performance of Centralized Clustering Techniques for Realistic Wireless Sensor Network Topologies
Introduction to
Doing Applied Linguistics
01-P1503 10/24/2000 5:07 PM Page 1
ISSN: 2319-5967
6
J Internet Serv Appl (2010) 1: 7–18
Feature: Cloud Computing
NetLimiter overviewNetLimiter gives you full network control over your
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎–∎∎∎
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 7 0 5 9 7 7 9 5
DATAK-01511;NoofPages13
TransportaTion
examining ways ofPreserving privacy in social networks SECURITY AND PRIVACY
polymeric fittings and pipe industry is in need of using
Information & Management 51 (2014) 27–42
3.1 Introduction
3.1 Introduction
A Conceptual Model of Farm Management Information
SoF tw Are
WAN_LAYOUT.qxp_Layout 7/30/14 2:01 PM Page 106
SoF tw Are
Big data is also a wrapper for different types of
JID:BDR AID:27 /FLA [m5G; v1.152; Prn:14/05/2015; 16:34] P.1 (1-15)
let alone the global network community or the billions of
AVOID SOME CLASSIC PITFALLS How many times have you responded
Lawrence Berkeley National Laboratory
IEEETRANSACTIONSONVISUALIZATIONANDCOMPUTERGRAPHICS, VOL.20, NO.12D , ECEMBER2014 1803
International Journal of Engineering and Advanced Technology (IJEAT)
WORLD METEOROLOGICAL ORGANIZATION
SoF tw Are
SoF tw Are
Information & Management 51 (2014) 27–42
the provision of services such as network connectivity is usually
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
enterprise systems for management
in being the contributor for growth and development of an
Working document QAS/06.179
Information Sciences 293 (2015) 275–298
REFERENCES
REFERENCES
Information Fusion xxx (2013) xxx–xxx
WorldDevelopmentVol.36,No.10,pp.1665–1691,2008
228 S. de Leeuw, J.P. van den Berg / Journal of Operations Management 29 (2011) 224–235
14 contains data from two sets of sixth grade students
TransportaTion
Renewable and Sustainable Energy Reviews 53 (2016) 978–992
Renewable and Sustainable Energy Reviews 53 (2016) 978–992
Here the diagrams show data effective data transmission including various
in being the contributor for growth and development of an
level plans that artificially separate out features to get you
date and use the same encryption technologies employed by banking
JID:YJCSS AID:2905 /FLA [m3G; v1.159; Prn:14/07/2015; 15:44] P.1 (1-24)
Information Sciences 293 (2015) 275–298
Expert Systems with Applications 42 (2015) 4062–4080
ARTICLE IN PRESS
Information Sciences 293 (2015) 275–298
Expert Systems with Applications 42 (2015) 4062–4080
Information Sciences 293 (2015) 275–298
ASurveyonTruthDiscovery
Journal of Theoretical and Applied Information Technology
River Water Level Prediction Using Physically Based
International Journal of Geology, Earth and Environmental Sciences ISSN: 2277-2081 (Online)
ISSN: 2319-8753
The results
–
The Human Experience Summary of Risk Estimates The Latent Period
Information Sciences 293 (2015) 275–298
Information Sciences 293 (2015) 275–298
Information Sciences 293 (2015) 275–298
Information Sciences 293 (2015) 275–298
Understanding Decision-Making in Data Warehousing 235
REFERENCES
REFERENCES
Ž.
Ž.
Ž.
Ž.
Ž.
Journal of Network and Computer Applications 57 (2015) 85–101
REFERENCES
Computational Ecology and Software, 2014, 4(4): 276-288
Computational Ecology and Software, 2014, 4(4): 276-288
A Comparative Analysis
Location-Dependent Key Management Protocol for
Engineering Structures 45 (2012) 1–11
Biophysical Journal Volume 102 February 2012 661–671 661
Journal of Network and Computer Applications 39 (2014) 93–103
A distributed approach Introduction Vehicular applications fall into two broad
Computer-AidedDesign45(2013)105–112
while a method for small sample sizes is presented as
High hand forces tend to vary in causing both dorsopathy
Expert Systems with Applications 38 (2011) 306–313
Expert Systems with Applications 38 (2011) 306–313
Expert Systems with Applications 38 (2011) 306–313
Swiss privacy Tresorit handles data under Swiss privacy laws that
secure software as a service We document here an enterprise
From Research to Manuscript Michael Jay Katz
What is CRM?
Energyefficiencyofmobileclientsincloudcomputing
Large-ScaleBehavioralTargeting
we have the ability to design and implementsecurity mechanisms within
Mon. Not. R. Astron. Soc. (2012) doi:10.1111/j.1365-2966.2012.21559.x
Towards an Architecture of BI in the Cloud
Towards Cleaning-up Open Data Portals:
Biophysical Journal Volume 102 February 2012 661–671 661
Biophysical Journal Volume 102 February 2012 661–671 661
Security
2014 IEEE International Conference on Vehicular Electronics and Safety (ICVES)
Expert Systems with Applications 38 (2011) 306–313
businessprocesses Companies understand the importance of auditing the compliance of
Intelligent Transportation based on the Internet of
Towards Cleaning-up Open Data Portals:
3,5.2 M,r.ir,.rizar.rg
CHAPTER
www.sciedu.ca/ijhe International Journal of Higher Education Vol. 3, No. 2; 2014
Rapid development has promoted the 3D land use in the
LEARNING METHOD This section will review the learning methods applied
Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)
Expert Systems with Applications 38 (2011) 4234–4243
Enabling Public Verifiability and Data Dynamics
Enabling Public Verifiability and Data Dynamics for Storage Security in
Enabling Public Verifiability and Data Dynamics
Enabling Public Verifiability and Data Dynamics
Journal of Forecasting
The Analysis of the Security Strategy of Embedded Mobile Database
Applied Energy 157 (2015) 688–698
2012 Second International Conference on Advanced Computing & Communication Technologies 2012 Second International Conference on Advanced Computing & Communication Technologies
2014 Fourth International Conference on Communication Systems and Network Technologies 2014 Fourth International Conference on Communication Systems and Network Technologies
2013 International Conference on Advanced Electronic Systems (ICAES)
Data Link Layer Security Protocols in Wireless
Proceeding of the 2013 IEEE International Conference on Space Science and Communication (IconSpace), 1-3 July 2013, Melaka, Malaysia
IEEE-International Conference On Advances In Engineering, Science And Management (lCAESM -2012) March 30, 31, 2012 478
Who would have thought that modern manufacturing could be done
are a positive help in trying to dispel the poor
risk and compliance processes exist Most organizations have established security
risk and compliance processes exist Most organizations have established security
risk and compliance processes exist Most organizations have established security
risk and compliance processes exist Most organizations have established security
risk and compliance processes exist Most organizations have established security
data compression
data compression lz77 algorithm
data compression alogorithms
International Journal on Information Theory (IJIT),Vol.4, No.1, January 2015
International Journal on Information Theory (IJIT),Vol.4, No.1, January 2015
Information Sciences 305 (2015) 357–383
2015 IEEE 9th International Symposium on Embedded Multicore/Many-core Systems-on-Chip
Early adopters and new applications Cloud computing is still in
Early adopters and new applications Cloud computing is still in
2015 IEEE 9th International Symposium on Embedded Multicore/Many-core Systems-on-Chip
In ubiquitous computing environments, realizing a vision of
In ubiquitous computing environments, realizing a vision of
In ubiquitous computing environments, realizing a vision of
among these models is that they all provide resources
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Measuring
her own VM image or can use an image from
her own VM image or can use an image from
JID:BDR AID:25 /FLA [m5G; v1.152; Prn:6/05/2015; 10:12] P.1 (1-8)
Available online at www.sciencedirect.com
realitymining can characterize places according to the activity and movement
realitymining can characterize places according to the activity and movement
realitymining can characterize places according to the activity and movement
realitymining can characterize places according to the activity and movement
JID:BDR AID:25 /FLA [m5G; v1.152; Prn:6/05/2015; 10:12] P.1 (1-8)
Available online at www.sciencedirect.com
JID:BDR AID:25 /FLA [m5G; v1.152; Prn:6/05/2015; 10:12] P.1 (1-8)
Artificial Intelligence in Medicine (2009) 46, 5—17
Available online at www.sciencedirect.com
Mining sparse and big data by case-based reasoning
1388 IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, VOL. 26, NO. 7, JULY 2015
1388 IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, VOL. 26, NO. 7, JULY 2015
1388 IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, VOL. 26, NO. 7, JULY 2015
Hacking Web Apps
22 IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 1, FEBRUARY 2014
Expert Systems with Applications 38 (2011) 7609–7615
Expert Systems with Applications 38 (2011) 7609–7615
Expert Systems with Applications 38 (2011) 7609–7615
Bayesian Forecasting of Multinomial Time Series
Emotional Business Intelligence
Rev. Confirming Pages
QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, VOL. 9, 89-93 (1993)
Accident Analysis and Prevention 42 (2010) 384–392
3
2 012 International Conference on Information Engineering
Herland etal. JournalofBigData2014,1:2
InformatI on t echnology
Ore Geology Reviews 47 (2012) 126–135
FutureGenerationComputerSystems37(2014)127–140
FutureGenerationComputerSystems37(2014)127–140
FutureGenerationComputerSystems37(2014)127–140
JWBK024-FM JWBK024-Baltagi March 30, 2005 7:47 Char Count= 0
250
Journal of Microbiological Methods 51 (2002) 217–226
Journal of Microbiological Methods 51 (2002) 217–226
20 IEEE TRANSACTIONS ON SMART GRID, VOL. 1, NO. 1, JUNE 2010
20 IEEE TRANSACTIONS ON SMART GRID, VOL. 1, NO. 1, JUNE 2010
20 IEEE TRANSACTIONS ON SMART GRID, VOL. 1, NO. 1, JUNE 2010
20 IEEE TRANSACTIONS ON SMART GRID, VOL. 1, NO. 1, JUNE 2010
20 IEEE TRANSACTIONS ON SMART GRID, VOL. 1, NO. 1, JUNE 2010
Neurocomputing 146 (2014) 264–275
computers & security 50 (2015) 60e73
G Model
Based Studies INTRODUCTION Most analyses of decision making at the
J Geogr Syst (2009) 11:291–310
Parallel Programming Paradigms and Frameworks in Big Data Era Ciprian
2014 47th Hawaii International Conference on System Science
Personal Computer Data Recovery Services Our team of data recovery
2012 Second International Conference on Advanced Computing & Communication Technologies 2012 Second International Conference on Advanced Computing & Communication Technologies
2014 Fourth International Conference on Communication Systems and Network Technologies 2014 Fourth International Conference on Communication Systems and Network Technologies
2013 International Conference on Advanced Electronic Systems (ICAES)
Data Link Layer Security Protocols in Wireless
Proceeding of the 2013 IEEE International Conference on Space Science and Communication (IconSpace), 1-3 July 2013, Melaka, Malaysia
IEEE-International Conference On Advances In Engineering, Science And Management (lCAESM -2012) March 30, 31, 2012 478
forecasting 215
Pattern Recognition 48 (2015) 3739–3748
are responsible for the storage and processing of huge amounts
We’re driving
10 things you should know about deploying a UPS Uninterruptible
Check UPS If you are like many environments in that
Information Systems 47 (2015) 98–115
1
Journal of Network and Computer Applications 35 (2012) 1831–1838
1
Comprehensive Study
CYBERCRIME
Business Horizons (2015) 58, 431—440
political and professional arguments in support of linking theory to
Proceedings of the Sm World Congress on Intelligent Control
Shirmeneji
F-Given (Encyc)-45630:F-Given (Encyc)-45630 7/19/2008 10:21 AM Page 340
Field data are the most common type of data collected
Field data are the most common type of data collected
AcceptedManuscript
Motion and Real-World Sensing System of a Small Biped Entertainment Robot
International Journal of Advances in Engineering & Technology, Sept. 2013.
Motion and Real-World Sensing System of a Small Biped Entertainment Robot
Motion and Real-World Sensing System of a Small Biped Entertainment Robot
Motion and Real-World Sensing System of a Small Biped Entertainment Robot
3
3
Expert Systems with Applications 41 (2014) 8092–8100
Reliability Engineering and System Safety 144 (2015) 170–177
Expert Systems with Applications 41 (2014) 8092–8100
educators can then intervene early and effectively to actively shape
Time Stream Processing as Game Changer in a Big Data
Time Stream Processing as Game Changer in a Big Data
Application of Business
J Grid Computing (2011) 9:3–26
Time Stream Processing as Game Changer in a Big Data
Hindawi Publishing Corporation
Virtualization Cloud computing is one of the most useful technology
Virtualization Cloud computing is one of the most useful technology
Virtualization Cloud computing is one of the most useful technology
Hindawi Publishing Corporation
Fluid Phase Equilibria 400 (2015) 8–19
G Model
P. Gupta et al. / International Journal of Information Management 33 (2013) 861– 874 867
G Model
P. Gupta et al. / International Journal of Information Management 33 (2013) 861– 874 867
Many researchers have found that the KNN algorithm accomplishes very
Many researchers have found that the KNN algorithm accomplishes very
An Improved k-Nearest Neighbor Classification Using Genetic Algorithm
An Improved k-Nearest Neighbor Classification Using Genetic Algorithm
Introduction Nearest neighbor search is one of the most popular
International Journal of Modern Engineering Research (IJMER)
2
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 2 2 5 1 9 3 2 8
Improved Curvature-Based
Improved Curvature-Based
Improved Curvature-Based Registration
Improved Curvature-Based Registration
Computers and Electrical Engineering xxx (2013) xxx–xxx
Educational
CHAPTER 4
CHAPTER 4
CHAPTER 4
Farm machinery management information system Management of farming operations is
Transport Policy ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Transport Policy ∎ (∎∎∎∎) ∎∎∎–∎∎∎
FutureGenerationComputerSystems37(2014)127–140
FutureGenerationComputerSystems37(2014)127–140
FutureGenerationComputerSystems37(2014)127–140
Scaling up Kernel SVM on Limited Resources:
CHAPTER 4
DCDIS A Supplement, Advances in Neural Networks, Vol. 14(S1) 328--337
DCDIS A Supplement, Advances in Neural Networks, Vol. 14(S1) 328--337
Research on Data Mining Models for the Internet
DataEnvelopmentAnalysisandDecisionScience2014(2014)1-10
Salem Alelyani, Jiliang Tang and Huan Liu
Computers and Electrical Engineering xxx (2013) xxx–xxx
International Journal of Modern Engineering Research (IJMER)
Available online at www.sciencedirect.com
Computers and Electrical Engineering xxx (2013) xxx–xxx
A Survey on Different Clustering Algorithms in Data
Survey on Feature Selection
Bayesian Spatial Modeling of Extreme Precipitation Return Levels
2012 International Conference on Computer Communication and Informatics (ICCCI -2012), Jan. 10 – 12, 2012, Coimbatore, INDIA
the extent of our analyses is limited to basic statistics
the extent of our analyses is limited to basic statistics
Building on the skills you gained in Website Wireframing with
CHAPTER 4
1
PERSIANN-CDR
22 IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 1, FEBRUARY 2014
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 412 #20
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 413 #21
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 414 #22
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 415 #23
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 416 #24
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 419 #27
Overview Since people have been succeeded in making connections among
EuropeanJournal ofOperational Research 248 (2016)301–317
Data Recovery E-Book V1.5 (Visit http://www.easeus.com for more information)
Data Recovery E-Book V1.5 (Visit http://www.easeus.com for more information)
EuropeanJournal ofOperational Research 248 (2016)301–317
EuropeanJournal ofOperational Research 248 (2016)301–317
Design of a Trusted File System Based on Hadoop
2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies
A Survey on Security of Hadoop
Kerberos can be connected to corporate LDAPenvironments to centrally provision
Cloud computing has been flourishing in past years because of
it ensures the reliability and safety from the three levels
Chapter 3
I am certain it was not even considered as part
امنیت هادوپ
امنیت هادوپ
امنیت هادوپ
Kerberos can be connected to corporate LDAPenvironments to centrally provision
امنیت هادوپ
Kerberos can be connected to corporate LDAPenvironments to centrally provision
survey security of hadoop
Design of a Trusted File System Based on Hadoop
A Novel Triple Encryption Scheme for Hadoop-based Cloud Data Security
Cloud computing has been flourishing in past years because of
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 427 #35
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 430 #38
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 432 #40
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 433 #41
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 434 #42
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 435 #43
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 436 #44
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 437 #45
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 438 #46
(1)
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 427 #35
Department of Mathematics and Computer Science
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 408 #16
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 409 #17
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 412 #20
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 413 #21
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 408 #16
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 409 #17
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 412 #20
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 413 #21
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 18, NO. 6, DECEMBER 2014 873
873 Evolutionary Design of Decision-Tree Algorithms
873 Evolutionary Design of Decision-Tree Algorithms
آقای.حسینی
Farm machinery management information system Management of farming operations is
data analysis Input data included diagrams and planswhich are showing
Abstract A new system for grid and cloud services simulation
A middle layer solution to support ACID properties for NoSQL
data analysis Input data included diagrams and planswhich are showing
data analysis Input data included diagrams and planswhich are showing
International Journal of Database Management Systems ( IJDMS ) Vol.7, No.5, October 2015
2014 22nd International Conference on Pattern Recognition
data analysis Input data included diagrams and planswhich are showing
A middle layer solution to support ACID properties for NoSQL
Computers and Electronics in Agriculture 110 (2015) 131–138
Product Data
Product Data
2012 IEEE 12th International Conference on Data Mining Workshops 2012 IEEE 12th International Conference on Data Mining Workshops
Self Organizing Maps: Fundamentals
So far we have looked at networks with supervised training
Product Data
2012 IEEE 12th International Conference on Data Mining Workshops 2012 IEEE 12th International Conference on Data Mining Workshops
Scaling up Kernel SVM on Limited Resources:
2.1 مدیریت
2.1.2.مدیریت
Available online at www.sciencedirect.com
CIRP Annals - Manufacturing Technology 57 (2008) 433–436
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 419 #27
Skinflint DRAM System: Minimizing DRAM Chip Writes for Low Power
Apache Mahout Apache Mahout is an open source project aiming
CONCEPTS AND APPLICATIONS TO DATAWAREHOUSING ABSTRACT Information analysis is a
CONCEPTS AND APPLICATIONS TO DATAWAREHOUSING ABSTRACT Information analysis is a
Cloud Computing:
PART II
GeoJournal (2014) 79:1–14
Catalysis
Catalysis
Journal of Network and Computer Applications 59 (2016) 198–207
Procedia - Social and Behavioral Sciences 27 ( 2011 ) 150 – 159
Available online at www.sciencedirect.com
Chemometrics: Data Analysis for the Laboratory and Chemical Plant.
AYTEKIN et al.:LOCAL PRIMITIVE PATTERN FOR THE CLASSIFICATION OF SARIMAGES 2437
AYTEKIN et al.:LOCAL PRIMITIVE PATTERN FOR THE CLASSIFICATION OF SARIMAGES 2437
AYTEKIN et al.:LOCAL PRIMITIVE PATTERN FOR THE CLASSIFICATION OF SARIMAGES 2437
AYTEKIN et al.:LOCAL PRIMITIVE PATTERN FOR THE CLASSIFICATION OF SARIMAGES 2437
World Congress on Internet Security (WorldCIS-2013)
World Congress on Internet Security (WorldCIS-2013)
is a useful monitoring technique that is well suited for
public Internet but rather in a virtual private network (VPN). publishing their sensor data on behalf of the polled
public Internet but rather in a virtual private network (VPN). publishing their sensor data on behalf of the polled
public Internet but rather in a virtual private network (VPN). publishing their sensor data on behalf of the polled
public Internet but rather in a virtual private network (VPN). publishing their sensor data on behalf of the polled
Available online at www.sciencedirect.com
Saifi
Data Compression Methodologies for Lossless Data and Comparison between Algorithms
- If you're about to print a worksheet,
Expert Systems with Applications 42 (2015) 7110–7120
Case Study/
APPLIED GEOPHYSICS, Vol.12, No.1 (March 2015), P. 86-92, 14 Figures.
62 IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 15, NO. 1, JANUARY 2000
Available online at www.sciencedirect.com
Count Models Based on Weibull
Count Models Based on Weibull
Foundation Topics
O’Reilly-5980006 master October 28, 2010 22:0
Journal of Computer and Communications, 2015, 3, 164-173
Available online at www.sciencedirect.com
Big Data: Issues, Challenges, Tools and Good
2013 5th International Conference on Computer Science and Information Technology (CSIT) ISBN: 978-1-4673-5825-5
E1C04 09/14/2010 14:7:49 Page 158
CHAPTER
Phys316 Exploration 3: Measuring the Curie Point of a Magnet
It is designed to quickly perform standard file operations such
Computers & Industrial Engineering 84 (2015) 24–31
1 Spectrophotometer Purpose Measures the light reflectance of a color
Nooroozi2
Phys316 Exploration 3: Measuring the Curie Point of a Magnet
Phys316 Exploration 3: Measuring the Curie Point of a Magnet
Phys316 Exploration 3: Measuring the Curie Point of a Magnet
Phys316 Exploration 3: Measuring the Curie Point of a Magnet
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
B4: Experience with a Globally-Deployed
IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS, VOL. 42, NO. 6, NOVEMBER 2012 1257
SURVEILLANCE TARGET The target of surveillance is the entity or
Computer Networks 74 (2014) 92–102
94
the application level content-based middleware and the network
1136 IEEE SYSTEMS JOURNAL, VOL. 8, NO. 4, DECEMBER 2014
1136 IEEE SYSTEMS JOURNAL, VOL. 8, NO. 4, DECEMBER 2014
اثر شلاقی و محصولات جایگزین
A business process mining application for internal transaction fraud mitigation
Egyptian Informatics Journal (2015) xxx, xxx–xxx
SVM based Multi-index Evaluation for Bus Arrival
The Selwood data set is dealing with antifilarialantimycin activities contained
ID EN NEW 1 Enter number 2 Enter integer number
1136 IEEE SYSTEMS JOURNAL, VOL. 8, NO. 4, DECEMBER 2014
MULTICHANNEL FLUCTUATION DATA ANALYSIS BY
Procedia Computer Science
QSPR بکار گیریم و این پیاده سازی را با استفاده
124 IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, VOL. 1, NO. 1, JUNE 2007
QSPR بکار گیریم و این پیاده سازی را با استفاده
QSPR بکار گیریم و این پیاده سازی را با استفاده
Information
Information
Information
I must thank the entire team at Apress for giving
822 Chapter 18. Structure Learning in Bayesian Networks
Expert Systems with Applications 39 (2012) 11657–11665
Expert Systems with Applications 39 (2012) 11657–11665
Security in cloudcannot be simulated even though as different simulation
Security in cloudcannot be simulated even though as different simulation
Security in cloudcannot be simulated even though as different simulation
HindawiPublishingCorporation
Internet of Things:
Internet of Things:
Internet of Things:
GLADE:BigDataAnalyticsMadeEasy
Blue Skie S
Tupleware: “Big”Data,BigAnalytics,SmallClusters
2012 International Symposium on Pervasive Systems, Algorithms and Networks
Available online at www.sciencedirect.com
Multi-node Scheduling Algorithm
2014 International Conference on Electronics and Communication System (lCECS -2014)
Expert Systems with Applications 41 (2014) 6123–6130
OPTIMIZATION OF LZ77 DATA COMPRESSION ALGORITHM
Downloaded by http://iranpaper.ir ﺏﺎﺘﮐ ﻭ ﻪﻟﺎﻘﻣ ﻥﺎﮕﯾﺍﺭ ﺩﻮﻠﻧﺍﺩ ﻪﻧﺎﻣﺎﺳ
IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS, VOL. 42, NO. 6, NOVEMBER 2012 1257
ISSN:2229-6093
ONLINE PRIVACY
ISSN:2229-6093
Radiogenic Isotope Geology
CHAPTER 3
Measuring
Wireless Sensor Network Protocols
Wireless Sensor Network Protocols
ComputerNetworks38(2002)393–422
it is the growth and development of the Internet of
1 CharacteristicsVehicular ad hoc networks can be considered as
Matthew D. Ford
Matthew D. Ford
Matthew D. Ford
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
a centralized optimal scheduling algorithm can be realized in the
a power manager which dynamically adjusts the set of active
Software-Defined Cloud Computing: Architectural
Matthew D. Ford
Matthew D. Ford
Matthew D. Ford
d
The Future of ICT-Based
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Original Research Article
Software Defined Networks This page is intentionally left blank Software Defined Networks
University of Pennsylvania
ADVANCED DTM GENERATION FROM LIDAR DATA
Available online at www.pelagiaresearchlibrary.com
Computer Networks 52 (2008) 2292–2330
EnvironmentalTechnology&Innovation5(2016)106–116
Computers and Electrical Engineering xxx (2015) xxx–xxx
Zhangetal. JournalofCloudComputing:Advances,Systems
helping build the smart business
Zhangetal. JournalofCloudComputing:Advances,Systems
296 Choi & Kim
Contents
This page intentionally left blank PRINCIPLES OF SNOW HYDROLOGY
Using an improved rule match algorithm in an expert system to detect broken driving
SITUATIONAL AWARENESS
Gaining an Edge in Cyberspace with
1672 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 30, NO. 9, SEPTEMBER 2008
1672 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 30, NO. 9, SEPTEMBER 2008
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t :
LTE/SAE System Overview
WATER RESOURCES RESEARCH, VOL. 33, NO. 8, PAGES 1803–1811, AUGUST 1997
WATER RESOURCES RESEARCH, VOL. 33, NO. 8, PAGES 1803–1811, AUGUST 1997
2015 Property and Casualty
2015 Property and Casualty
ARTICLE IN PRESS
American Journal of Information Systems, 2014, Vol. 2, No. 2, 26-32
Computer Communications 42 (2014) 1–23
Chapter 15
FANG LAYOUT 7/8/10 12:10 PM Page 13
Dipank ar Dasgupta Stephanie F orrest
JID:VEHCOM AID:19 /REV [m5G; v 1.137; Prn:24/09/2014; 11:59] P.1 (1-12)
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
As it has become the norm for cloud providers to
1
Phase 2 Systems Analysis
Phase 2 Systems Analysis
Chapter 5 Data and Process Modeling
Cost Reducing The profits that cloud computing providers get is
cloud computing
FutureGenerationComputerSystems37(2014)496–511
cloud computing
E109
A Novel and Practical Algorithm for Generating 3D
A Novel and Practical Algorithm for Generating 3D
A Novel and Practical Algorithm for Generating 3D
A Survey on Cloud Computing
JOURNAL OF ELECTRONIC TESTING: Theory and Applications 20, 433–437, 2004
3GC08APPC 08/28/2014 2:17:36 Page 308 3GC09 08/28/2014 2:26:48 Page 309
J Technol Transf (2016) 41:25–59
JWBK016-04 JWBK016-Banks February 23, 2005 6:47 Char Count= 0
JWBK016-04 JWBK016-Banks February 23, 2005 6:47 Char Count= 0
ChahkandiPDF
IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. 16, NO. 4, FOURTH QUARTER 2014 1839
Journal of Network and Computer Applications 37 (2014) 216–228
A survey of privacy in multi-agent systems
Expert Systems with Applications 39 (2012) 11243–11249
MASTER‘S THESI S
588 BiometricalJournal56(2014)4,588–593 DOI:10.1002/bimj.201300226
Available online at www.sciencedirect.com
GIS for Housing and Urban Development
GIS for Housing and Urban Development
2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing
FMTOC.qxd 11/26/12 5:09 PM Page i
JIST 6(4) 2009
Chapter 6 Foundations of Business Intelligence: Databases and Information Management 257
Applying Data Mining
AppliedNursingResearch31(2016)1–5
3.3.5 Vendetta/Revenge
Estimating Storage Size Even if you have denormalized your physical
Information Security Technical Report, Vol 6, No. 2 (2000) 95-102
Security Implications of the Choice of Distributed Database
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Behavioural Targeting in On-Line Advertising:
Tutorials
Figure 29 Slope of linear regression line
Figure 29 Slope of linear regression line
Information Security Technical Report, Vol 6, No. 2 (2000) 95-102
Security Implications of the Choice of Distributed Database
JMEPEG (2011) 20:1264–1270 � ASM International
INTEGRATING GIS, REMOTE SENSING,
International Journal of
Chapter 15
8 Spacecraft Design Process
0
Corrective and Preventive Maintenance Maintenance of the UPS consists of
49895-1
49895-2
and network connectivity that enables these objects to collect and
Intelligent Traffic Information System Based on Integration of Internet of
based traffic monitoring and summarises the possible benefits in Intelligent
SRX Series gateways set new benchmarks with 100GbE interfaces and
Published in a special issue of Future Generation Computer Systems
106
2010 International Conference on High Performance Switching and Routing
It is an integration of wireless sensor network with mobile
Army is interested in locating and classifying hostile weapons fire
A Survey of Commercial Frameworks for
210 IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, VOL. 19, NO. 1, JANUARY 2015
Introduction In recent years the firms started changing faster and
Does the study adequately control for differences between the groups
CHAPTER
CHAPTER
CHAPTER
AnalyzingInter-ApplicationCommunicationinAndroid
AnalyzingInter-ApplicationCommunicationinAndroid
Journal of Financial Economics 106 (2012) 287–307
AnalyzingInter-ApplicationCommunicationinAndroid
Network-Based Modeling and Intelligent Data
8.5 PRINCIPALCOMPONENT ANALYSIS 289
International Journal of Scientific Engineering and Research (IJSER)
International Journal of Scientific Engineering and Research (IJSER)
International Journal of Computer Applications (0975 – 888)
International Journal of Scientific Engineering and Research (IJSER)
www.pwc.com/us/insurance
www.pwc.com/us/insurance
FEATURE
www.pwc.com/us/insurance
Algorithm 1 The Future-Demand-Friendly Heuristic at Time
the free encyclopedia low altitude aerial photograph for use in
(h) I(J) = 1,
1
فناوری
Mining
ISSN:2321-1156
ISSN:2321-1156
ISSN:2321-1156
IJCST V o l . 4, ISSue 1, J a n - M a r C h 2013 ISSN : 0976-8491 (Online) | ISSN : 2229-4333 (Print)
(w)
(h) I(J) = 1,
Chapter 2
74 PART I Overview of Accounting Information Systems
C09 06/30/2010 23:58:31 Page 175
C10 06/30/2010 14:48:30 Page 195
C12 06/30/2010 15:8:2 Page 225
Vision Research 47 (2007) 1362–1367
GovernmentInformationQuarterly32(2015)316–322
GovernmentInformationQuarterly32(2015)316–322
Algorithm 1 The Future-Demand-Friendly Heuristic at Time
Discussion The triads of stimuli tested in the present experiments
This article was downloaded by: [University of Montana]
(h) I(J) = 1,
–
Preface
CHAPTER 3 Systems Development and Documentation Techniques INTRODUCTION Questions to
Intelligent Traffic Information System Based on Integration of Internet of
based traffic monitoring and summarises the possible benefits in Intelligent
Chapter 2
is a nuclear medical imaging technique for quantitative measurement of
2013 IEEE 13th International Conference on Data Mining Workshops 2013 IEEE 13th International Conference on Data Mining Workshops
Online Social Network
Security
IJRM-01143;NoofPages14
Applications of Artificial Intelligence and Related Techniques to Improve the
220 IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 5, NO. 2, APRIL-JUNE 2012
There is an exponential growth in the use of the
This file can then be used to generate daily maintenance schedules and to project needs for repair
based traffic monitoring and summarises the possible benefits in Intelligent
Expert Systems with Applications 40 (2013) 7571–7578
3. ENERGY MANAGEMENT AND AUDIT
An introduction of LTE network
1
using 23 different distance or similarity measures and seven clustering
2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing
Make Sites Safe and Pretty Your website should be more
Abaqus Analysis User's Manual 23.2.2 Models for metals subjected to cyclic loading
Available online at www.sciencedirect.com
PART2
PART3
PART4
PART5
PART6
PART7
based traffic monitoring and summarises the possible benefits in Intelligent
2 Semantic Web The Web doubles in size every eight
2 Semantic Web The Web doubles in size every eight
ISSN 0031�0301, Paleontological Journal, 2014, Vol. 48, No. 14, pp. 1569–1572. © Pleiades Publishing, Ltd., 2014.
الگوریتم های وب کاوی و داده کاوی
Downloaded form http://iranpaper.ir
Downloaded form http://iranpaper.ir
Downloaded form http://iranpaper.ir
Downloaded form http://iranpaper.ir
2014 11th IEEE International
1 Artificial Intelligence and Related Techniques Applied to Semantic Web
1 Artificial Intelligence and Related Techniques Applied to Semantic Web
2 Semantic Web The Web doubles in size every eight
2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing
Journal of Visual Languages and Computing 31 (2015) 130–138
midas Civill
Powered Wireless Sensor Networks Basic security of data transmission in
The Model In order to analyze the dimensionality of the
of the variance. SEM is a set of statistical techniques that allow the testing of a set of relationships that are
Journal of Visual Languages and Computing 31 (2015) 130–138
Journal of Visual Languages and Computing 31 (2015) 130–138
48 H. Pretzsch
Injury, Int. J. Care Injured 47 (2016) 439–443
computer law & security review 28 (2012) 679e686
Downloaded form http://iranpaper.ir
Downloaded form http://iranpaper.ir
Downloaded form http://iranpaper.ir
Downloaded form http://iranpaper.ir
Downloaded form http://iranpaper.ir
forecasts will differ across the different stages of the newproduct
A new generation of 3D detection devices.
– USER´S MANUAL (english) –
564 BiometricalJournal56(2014)4,564–583 DOI:10.1002/bimj.201300077
The Journal of Systems and Software 43 (1998) 11–17
The Journal of Systems and Software 43 (1998) 11–17
Introducing the Market Research Analysis Application
Introducing the Market Research Analysis Application
What is Preference Mapping?
Your success is our satisfaction!
Overview
Big Data Research 2 (2015) 166–186
Big Data Research 3 (2016) 10–23
Big Data Research 3 (2016) 24–28
Journal of Strategic Information Systems 24 (2015) 149–157
Journal of Destination Marketing & Management 3 (2014) 198–209
International Journal of Information Management 34 (2014) 387–394
Title: Geospatial Big Data Handling Theory and Methods: A Review and
Big Data Research 3 (2016) 24–28
Journal of Strategic Information Systems 24 (2015) 149–157
Journal of Destination Marketing & Management 3 (2014) 198–209
International Journal of Information Management 34 (2014) 387–394
Title: Geospatial Big Data Handling Theory and Methods: A Review and
Your success is our satisfaction!
Engineering Geology 107 (2009) 118–129
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 8 2 2 8 1 1 7 1
Computer Networks 54 (2010) 527–544
Computer Networks 54 (2010) 527–544
564 BiometricalJournal56(2014)4,564–583 DOI:10.1002/bimj.201300077
3 Generation-X Technologies and IT Auditing
CHAPTER 3 Systems Development and Documentation Techniques INTRODUCTION Questions to
Mining
ARTICLE IN PRESS
ransomeware باج افزار ترجمه شود لینک ها نیز بر روی
Based Modeling and Intelligent Data Mining of Social Media for
Based Modeling and Intelligent Data Mining of Social Media for
Network-Based Modeling and Intelligent Data
Based Modeling and Intelligent Data Mining of Social Media for
Network-Based Modeling and Intelligent Data
210 IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, VOL. 19, NO. 1, JANUARY 2015
MA CA W A Media Access Proto col for Wireless LAN
Bosch Internet of Things & Services Lab
210 IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, VOL. 19, NO. 1, JANUARY 2015
CLOUD SECURITY
NMR Instrumentation
Middle-East Journal of Scientific Research 23 (7): 1450-1460, 2015
Egyptian Informatics Journal (2014) 15, 129–147
Advances in Internet of Things, 2016, 6, 19-29
http://www.google.com/patents/US 2 0 1 6 0 0 2 7 2 2 9
computer law & security review 28 (2012) 679e686
The Emerald Research Register for this journal is available at The current issue and full text archive of this journal is available at
The Emerald Research Register for this journal is available at The current issue and full text archive of this journal is available at
Cluster Comput (2008) 11: 213–227
attackers will hide their presence and move laterally within your
an improved version of the energy aware distributed unequal clustering
1
9
Chapter 4. Energy and Area E�cient TSV Signaling for 3D-IC NoCs
XenoDream Software Jux
www.ietdl.org
ASKING QUESTIONS AND DEFINING PROBLEMS
The Operational Auditing Handbook The Operational Auditing
Organizational Dynamics (2014) 43, 180—188
The Device Cloud - Applying Cloud Computing
Organizational Dynamics (2014) 43, 180—188
Based Modeling and Intelligent Data Mining of Social Media for
210 IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, VOL. 19, NO. 1, JANUARY 2015
random masking, TPA becomes unable to access the data content while it is
Designing of Energy Efficient Cluster Based Scalable Key Management Technique
is a powerful technology helping in protecting the precious data
Mining
IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 5, OCTOBER 2014 497
1. INTRODUCTION
شورknn k [2]
Hu et al. BMC Genomics 2012, 13:600
Hu et al. BMC Genomics 2012, 13:600
Abstract XML has recently emerged as the leading medium for
2928 IEEETRANSACTIONSONKNOWLEDGEANDDATAENGINEERING, VOL.26, NO.12, DECEMBER2014
New statistical analysis in marketing research with fuzzy data
ARTICLE IN PRESS
Expert Systems With Applications 51 (2016) 143–150
Dissertation Guides
Dissertation Guides
Software-Defined Cloud Computing: Architectural
Data Security Challenges and Its Solutions in Cloud Computing
Proceedings of the 2014 Winter Simulation Conference
Available online at www.sciencedirect.com
Downloaded from http://bib.oxfordjournals.org/ at Zabol University of Medical Sciences on May 29, 2016
Downloaded from http://bib.oxfordjournals.org/ at Zabol University of Medical Sciences on May 29, 2016
CONCEPTS OF
The Operational Auditing Handbook The Operational Auditing
Mining
Abstract
From DBMS to Decision Support
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Data mining and knowledge discovery in databases have been attracting
Fraud can be seen in all insurance types including health
Computer Networks 81 (2015) 308–319
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 8, AUGUST 2013 1535
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 8, AUGUST 2013 1535
1152 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS, VOL. 37, NO. 6, NOVEMBER 2007
Fundamentals of Telecommunications. Roger L. Freeman
2 Using Sets
Using Mobile Phones to Determine
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 6 0 2 9 7 8 6 3
1430 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS,VOL.13,NO.3,SEPTEMBER 2012
Transportation Research Part C xxx (2015) xxx–xxx
Transportation Research Part C 18 (2010) 568–583
6 Background 2
M o b i l e P h o n e L o c a t i o n A r e a B a s e d T r a f f i c F l o w
1430 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS,VOL.13,NO.3,SEPTEMBER 2012
6 Background 2
is an application layer protocol that facilitates the exchange of
66
s-XML: An Efficient Mapping Scheme for Storing XML Data in a Relational
Ullman ii This book evolved from material developed over several
MappingXMLtoOWLOntologies
توضیحات چند فایل آموزشی 06
Draft Guidance
1
2
The Importance of Analytics Metrics In order to make the
Available online at www.sciencedirect.com
406 Hakan Hac~giimiig, Bijit Hore, Bala Iyer, and Sharad Mehrotra
Search on Encrypted Data 407
408 Hakan Hac~gumug, Bijit Hore, Bala Iyer, and Sharad Mehrotra
Search on Encrypted Data 413
414 Hakan Hacigiimug, Bijit Hore, Bala Iyer, and Sharad Mehrotra
416 Hakan Hac~giimiig, Bijit Hore, Bala Iyer, and Sharad Mehrotra
Search on Encrypted Data 417
406 Hakan Hac~giimiig, Bijit Hore, Bala Iyer, and Sharad Mehrotra
Search on Encrypted Data 407
408 Hakan Hac~gumug, Bijit Hore, Bala Iyer, and Sharad Mehrotra
The Journal of Systems and Software 43 (1998) 11–17
Cell values of raster datasets associatedwith these criteria are extracted
An improvement upon static allocation made possible in LTE is
and bursty data are handled much more efficiently in OFDMA
the base station must inform each user which subcarriers have
The maximum fairness algorithm can be referred to as a
The PF scheduler is designed to take advantage of multiuser
C H A P T E R 2
Finding and Preventing Cross-
Finding and Preventing Cross-
Anatomy of methodologies for measuring consumer behavior in neuromarketing research
Available online at www.sciencedirect.com
Designing
Downloaded from http://bib.oxfordjournals.org/ at Zabol University of Medical Sciences on May 29, 2016
Downloaded from http://bib.oxfordjournals.org/ at Zabol University of Medical Sciences on May 29, 2016
GUIDELINES
Network and Complex Systems www.iiste.org
Global Journal of Computer Science and Technology:
Computational Statistics & Data Analysis 38 (2001) 191–201
Disco acts as a gateway that uses the network interfaces
3DgeologicalmodelingoftheKasserineAquiferSystem,CentralTunisia:
Integrating artificial neural networks and geostatistics for optimum 3D
confidentiality and disclosure of health care information Questions about confidentiality
Creating the Internet
6 Background 2
Detecting drought induced environmental changes in a Mediterraneanwetland by remote
the intelligent fault detection system plays a crucial role for
Chapter 2
7. Depth Analysis
Downloaded from http://bib.oxfordjournals.org/ at Zabol University of Medical Sciences on May 29, 2016
N. Sengupta et al. / Neurocomputing 111 (2013) 161–168 165
55
55803
JID:BDR AID:32 /FLA [m5G; v1.168; Prn:26/11/2015; 15:54] P.1 (1-14)
Hierarchical Storage Technique for Maintaining
A version of this paper has been published originally by
A Novel Approach to Enhance Security in WEP
A Novel Approach to Enhance Security in WEP
Applied Statistics
A Survey on Wireless Sensor Network Security
Int. J. Production Economics 137 (2012) 165–175
®
Chapter 2
: هدیکچ
is one of the three fundamental service models of cloud
ALE: AES-Based Lightweight Authenticated
DroidGlove: An Android-Based Application for
584 Vedran Podobnik and Ignac Lovrek / Procedia Computer Science 60 ( 2015 ) 583 – 592
Journal of Network and Computer Applications 34 (2011) 1–11
2012 NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING, NUiCONE-2012, 06-08DECEMBER, 2012
A
A
DEVELOPING SCOPE, PRELIMINARY PLAN, AND BUDGET 35
IEEETRANSACTIONSON SIGNAL PROCESSING,VOL.60,NO.8, AUGUST 2012 4163
T. Wang et al.: Rethinking the Data Center Networking
T. Wang et al.: Rethinking the Data Center Networking
T. Wang et al.: Rethinking the Data Center Networking
T. Wang et al.: Rethinking the Data Center Networking
Gone are the days when accountants only analyzed historical information. Today’s CPAs and accounting students need to tackle something much larger: Big Data.
Information Systems 27 (2002) 123–149
T. Wang et al.: Rethinking the Data Center Networking
2. Unit Value Indices
EXPORT AND IMPORT PRICE INDEX MANUAL: THEORY AND PRACTICE
2. UNIT VALUE INDICES
EXPORT AND IMPORT PRICE INDEX MANUAL: THEORY AND PRACTICE
This article was downloaded by: [Tulane University]
2. UNIT VALUE INDICES
5th IEEE International Workshop on Practical Issues in Building Sensor Network Applications SenseApp 2010, Denver, Colorado
Retail Banking Tune Up: Integrate the Channels, Tablet the Branches November 2014
Procedia Computer Science
Retail Banking Tune Up: Integrate the Channels, Tablet the Branches November 2014
Retail Banking Tune Up: Integrate the Channels, Tablet the Branches November 2014
6.2 Development of the Internet from the Users’ Perspective 41
Mining
J. lnorg. Nucl. Chem., 1958, Vol. 6, pp. 58 to 62. Pergamon Press Ltd., London
Efficient Live Migration of Virtual
“06-Ch04-SA272” 18/9/2008 page 259
The User Side of Sustainability: Modeling Behavior and
International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868
efficiency fuzzy Data Envelopment Analysis technique for performance evaluation of
efficiency fuzzy Data Envelopment Analysis technique for performance evaluation of
محصولات Linksys
A process model for EAF steelmaking
International Journal of
networks Determining a complete mixing network requires knowledge of every
The derivative effect
Journal Of Business And Economics Research Volume 1, Number 5
6.2 Development of the Internet from the Users’ Perspective 41
6.2 Development of the Internet from the Users’ Perspective 41
This will result in a parallelization of the real and
6.2 Development of the Internet from the Users’ Perspective 41
6.3 The Significance of Digitalization for a Sustainable City 43
6.2 Development of the Internet from the Users’ Perspective 41
3268 G.A. Akyuz and M. Rehan
International Journal of Production Research 3269
big data
Downloaded form http://iranpaper.ir
How financial services can make IoT technology pay off
5G Massive MIMO Testbed: From Theory to Reality
5G Massive MIMO Testbed: From Theory to Reality
Mythili S et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.1, January- 2014, pg. 334-340
COMPUSOFT, An international journal of advanced computer technology, 2 (12), December-2013 (Volume-II, Issue-XII)
but there is no clear agreement about what thematic analysis
Interpreting the map: methods of
today are the predominant technology for storingstructured data in web
today are the predominant technology for storingstructured data in web
today are the predominant technology for storingstructured data in web
today are the predominant technology for storingstructured data in web
Organizations like NASA regularly receive terabytes of incoming data from
1
ptg999 A Professional’s Guide
the result of the analyses suggest that the model which
is a wireless communications services provider that does not own
What is an MVNO and How Does it Save Money
INVESTIGATION OF CRYSTAL IDENTIFICATION METHODS
TEAL: Transparent Encryption
Graph Pattern Matching Revised for Social Network Analysis
Matching Structure and Semantics:
FutureGenerationComputerSystems29(2013)84–106
Chapter 1
2 Association Rules and Sequential Patterns
2 Association Rules and Sequential Patterns
11 Opinion Mining and Sentiment Analysis
It's your choice!
It's your choice!
Modern electronic health records are designed to capture
Rainfall-Runoff Modelling Rainfall-Runoff Modelling
Mining
Academic Press is an imprint of Elsevier
PUBLISHED BY
HPE 3PAR StoreServ Architecture
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
Cloud Database Management System is a new emerging concept recently
Collaborative Multi-View Clustering
JOURNAL OF COMPUTATIONAL BIOLOGY
WebSemantics:Science,ServicesandAgentsontheWorldWideWeb36(2016)1–22
Testing of Hypotheses-II 2 8 3
serving as a point of differentiation for many digital marketing
IEEE ICC 2015 - Workshop on Smart Communication Protocols and Algorithms (SCPA 2015)
2. Related work and original contributions
2. Related work and original contributions
Data Min Knowl Disc (2014) 28:265–303
Mach Learn (2015) 100:509–531
Subsampling for Efficient and Effective
a + b
5520 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 64, NO. 12, DECEMBER 2015
HASHEM EIZAetal.: SITUATION-AWARE QoS ROUTING ALGORITHM FOR VANETs 5523
Procedia Computer Science
HASHEM EIZAetal.: SITUATION-AWARE QoS ROUTING ALGORITHM FOR VANETs 5523
Gone are the days when accountants only analyzed historical information. Today’s CPAs and accounting students need to tackle something much larger: Big Data.
12 predictions of the profession
Compliance will be completely commoditized
SCHILLER
SCHILLER
SCHILLER
serving as a point of differentiation for many digital marketing
SCHILLER
serving as a point of differentiation for many digital marketing
world object or environment to collect data on its shape
world object or environment to collect data on its shape
AN INTRODUCTION
Bass.book Page 327 Thursday, March 20, 2003 7:21 PM
12 prediction
STRUCTURAL CONTROL AND HEALTH MONITORING
Compliance will be completely commoditized
Reviewed Paper ISSN (Online): 2348-8557
Abstract Background We present a potentially useful alternative approach based
explained the research background to the values used in earlier
explained the research background to the values used in earlier
The magnifying glass is something that we now add to
J. Vis. Commun. Image R. 22 (2011) 1–8
تجهیزات ذخیره سازی شرکت کوانتوم
نرم افزار های ذخیره سازی شرکت کوانتوم
RESEARCH REPORT
www.ijecs.in
SA20_GanMaWu fm 1.qxp 4/9/2007 9:57 AM Page i
•
2-Filename :MRLD_4529_JEIM-02-2014-0017-saas-ranking the determinants Title :The adoption of software-as-a-service (SaaS):ranking the determinants Desc :Journal of Enterprise Information Management
340 PHYLOGENETIC ANALYSIS
340 PHYLOGENETIC ANALYSIS
Enabling You! Powerful Organizations
Journal of Cleaner Production 84 (2014) 233e255
340 PHYLOGENETIC ANALYSIS
340 PHYLOGENETIC ANALYSIS
340 PHYLOGENETIC ANALYSIS
Yugoslav Journal of Operations Research
ABSTRACT
ABSTRACT
Available online at www.sciencedirect.com
NFC and Its Application to Mobile Payment:
ffirs.indd ffirs.indd ii ii 4/19/2012 4/19/2012 12:13:26 PM 12:13:26 PM Information Storage and
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
Distributed Fusion Architectures and
IEEETRANSACTIONSONKNOWLEDGEANDDATAENGINEERING, VOL.28, NO.1, JANUARY 2016 17
JOURNALOFCOMMUNICATIONSANDNETWORKS,VOL.17,NO.6,DECEMBER2015 549
IEEETRANSACTIONSONKNOWLEDGEANDDATAENGINEERING, VOL.28, NO.1, JANUARY 2016 17
IEEETRANSACTIONSONKNOWLEDGEANDDATAENGINEERING, VOL.28, NO.1, JANUARY 2016 17
JOURNALOFCOMMUNICATIONSANDNETWORKS,VOL.17,NO.6,DECEMBER2015 549
when the device senses a loss of power from the
10 things you should know about deploying a UPS Uninterruptible
Data show that very few data centers put it to
International Journal of Advanced Research in
The mathematical theory of communication MTC has its origin in
The mathematical theory of communication MTC has its origin in
On the Modelling and Monitoring of General Inflated Poisson Processes
Proceedings of the 11th International IEEE
Computers and Electrical Engineering xxx (2012) xxx–xxx
Accepted Manuscript
Thermochimica Acta 561 (2013) 77– 90
A Thermodynamic Evaluation
Au-Cu
4
Acoustic Analysis Techniques
Journal of Software
Machine Learning manuscript No.
4 Phases of Market Research to Ensure Success Failure is
شبکه های هوشمند برق
(ILS)Standards Requirement for Integrated Library System
Standards Requirement for Integrated Library System
شبکه های هوشمند
Standards Requirement for Integrated Library System
the data, have a long history. These procedures include the classical maximum likelihood
Chapter 2
What Makes a
What Makes a
THEOREM 2 ·1. The quantity da (g, f) is a divergence in that it is nonnegative for all
9
546 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
546 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
546 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
Role of MIS in the management of agricultural extension programmes
Journal of Business Research 57 (2004) 291–296
Introduction
Rainfall-Runoff Modelling Rainfall-Runoff Modelling
Software Defect Prediction Using Regression via Classification
SCADA SYSTEMS AND SMARTGRID VISION INTRODUCTION As discussed in Chapter
Khan et al. Journal of Cloud Computing: Advances, Systems and Applications 2012, 1:1
Journal of Hydrology 374 (2009) 92–105
Accepted Manuscript
1. Introduction
pretestand posttest design served as the quantitative arm of the
ARTICLE IN PRESS
شبکه های هوشمند برق
A Thermodynamic Evaluation
IEEE SENSORS JOURNAL, VOL. 13, NO. 10, OCTOBER 2013 3645
Resource-aware clustering based routing protocol in
(IJACSA) International Journal of Advanced Computer Science and Applications,
Statistical distances have two very important uses in statistical analysis.
Statistical distances have two very important uses in statistical analysis.
Wireless Netw
ARTICLE IN PRESS
Field Crops Research 143 (2013) 4–17
Transportation Research Part C xxx (2014) xxx–xxx
Transportation Research Part C xxx (2014) xxx–xxx
The Politics of Information and the Fate of the Earth [Progressive Librarian] Page 1 of 7
Field Crops Research 143 (2013) 4–17
Mobile Netw Appl
1
INTERMOLECULAR FORCES IN WATER VAPOR
This page intentionally left blank DISTRIBUTED SYSTEMS
Chapter 2
High-Density Distributed
Distributed Database Management Techniques
Distributed Database Management Techniques
Distributed Database Management Techniques
Distributed Database Management Techniques
1
Abstract
Available online at www.sciencedirect.com
Leica Rod Eye Detectors Leica Rod Eye Basic Detector The
A Dynamic Multithreading Processor
COMPNW 5391 No. of Pages 18, Model 3G
COMPNW 5391 No. of Pages 18, Model 3G
New directions for pervasive computing in logistics This paper investigates
The bearing capacity behavior of strip footing located above a
2 Supplier Staff It is suggested that this specification is
Downloaded from http://iranpaper.ir
big data refers todata sets that are too large for
Abstract
Abstract
Abstract
Abstract
International Journal of Control and Automation
Distributed Fusion Architectures and
Distributed Fusion Architectures and
1 A Calculation Method for Bus Running Index
1 A Calculation Method for Bus Running Index
Ansari Lari and Golroo 1
Ansari Lari and Golroo 1
International Journal for Traffic and Transport Engineering, 2015, 5(4): 410 - 424
Artificial Neural Network Travel Time Prediction Model for Buses Using Only GPS Data
Urban Traffic Monitoring with the Help of Bus Riders
Page 1 of 8
J Supercomput (2014) 67:438–468
Geographic Load Balancing Routing in Hybrid
1
International Journal of Control and Automation
An attempt to model the relationship between MMI attenuation and
EyeTrackingforEveryone
Available online at www.sciencedirect.com
Pupil: AnOpenSourcePlatformforPervasiveEyeTracking
Shuhong Zhu School of Computer Science and Engineering Nanjing University
10
CORE CONCEPTS OF
Chapter 32
RFID SYSTEMS
Strategic capability through business intelligence applications
FutureGenerationComputerSystems ( ) –
International Journal of Information Management 36 (2016) 748–758
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
International Journal of Information Management 34 (2014) 20– 27
Available online at www.sciencedirect.com
de Castro e Lima Baesse et al. BMC Medical Education (2016) 16:213
Decision Support Systems 50 (2011) 491–500
Intergeo 2016 provided a forum for 531 exhibitors to present
10-Ramasubramanian 11/16/04 12:11 PM Page 165
Larger-than-MemoryDataManagementon
Big Data Research 3 (2016) 29–40
re trying to understand the benefits and advantages and also
re trying to understand the benefits and advantages and also
INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 2, ISSUE 7 152
Recitation: Rehearsing Wireless Packet
Recitation: Rehearsing Wireless Packet
Load balancing and deadline management of queues in an OpenFlow
Exploring the dimensions and components of Islamic values influencing the
Computer Networks 54 (2010) 2787–2805
JPMA-01787; No of Pages 13
Artificial Neural Networks for Misuse Detection
Signals and Communication Technology
J. of Supercritical Fluids 69 (2012) 91– 96
Exploring Traffic Safety and Urban Form
Ansari Lari and Golroo 1
1
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Application of artificial neural network in predicting the extraction yield
HowInformationTechnologySupportsCommunicationandCollaboration 105
Computers in Human Behavior xxx (2015) xxx–xxx
Computers in Human Behavior xxx (2015) xxx–xxx
Accepted Manuscript
Accepted Manuscript
2016 IEEE/ACM 13th Working Conference on Mining Software Repositories 2016 IEEE/ACM 13th Working Conference on Mining Software Repositories
a standing committee of the British Association for Parenteral and
Neural Comput & Applic
› Fact Sheet
2015 29th International Conference on Advanced Information Networking and Applications Workshops
Knowledge Modeling in the Health Care Domain to Support Software
Web-based Motion Detection System for Health Care
Deciding on a New Social Network
IT service providers are confronted with challenges of growing the
Keyword Research
Computers in Human Behavior xxx (2015) xxx–xxx
Accepted Manuscript
Chapter 5
5.3 Power System Observation and Intelligent Congestion Management 211
2015 IEEE 29th International Parallel and Distributed Processing Symposium
JPMA-01776; No of Pages 25
DecisionSupportSystems69(2015)82–91
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
Journal of Advanced Management Science Vol. 1, No. 3, September 2013
CORE CONCEPTS OF
ThesmartpowergridisanativeapplicationofIoTand Cloud technologiesastheintelligentmeters arehighly distributed andthey generate huge amount of
Energy Policy 56 (2013) 175–185
Energy Policy 56 (2013) 175–185
Energy Policy 56 (2013) 175–185
Although specialty palliative care in hospital and outpatient settings is
Expert Systems with Applications 37 (2010) 4892–4901
Available online at www.sciencedirect.com
Abstract Wireless Networks are becoming popular due to the concept
Available online at www.sciencedirect.com
CHAPTER 24
Journal of Network and Computer Applications 58 (2015) 208–216
Journal of Network and Computer Applications 58 (2015) 208–216
AN INTRODUCTION TO ACCOUNTING INFORMATION SYSTEMS CHAPTER 1 Accounting Information
AN INTRODUCTION TO ACCOUNTING INFORMATION SYSTEMS CHAPTER 1 Accounting Information
AN INTRODUCTION TO ACCOUNTING INFORMATION SYSTEMS CHAPTER 1 Accounting Information
AN INTRODUCTION TO ACCOUNTING INFORMATION SYSTEMS CHAPTER 1 Accounting Information
AN INTRODUCTION TO ACCOUNTING INFORMATION SYSTEMS CHAPTER 1 Accounting Information
International Journal of Computer Applications (0975 – 8887)
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
Chapter 5
Chapte
Chapter 5
Chapte
Computers in Human Behavior xxx (2015) xxx–xxx
Computers in Human Behavior xxx (2015) xxx–xxx
Accepted Manuscript
ISSN(Online) : 2319-8753
Social Research Methods
Available online at www.sciencedirect.com
Data Interchange plc
Fault Tolerant SDN Controller: A Survey
Fault Tolerant SDN Controller: A Survey
IoT Era Theme The enormous popularity of smart phones and
IoT Era Theme The enormous popularity of smart phones and
2015 Seventh International Conference on Measuring Technology and Mechatronics Automation
Measuring social dynamics in a massive multiplayer online game abstract
Measuring social dynamics in a massive multiplayer online game abstract
Understanding the 3PAR difference in array architecture I have been
4G LTE/LTE-Advanced
Neural Comput & Applic
It defines security constructs and operating procedures that must be
It defines security constructs and operating procedures that must be
Neural Comput & Applic
Data&KnowledgeEngineering92(2014)1–19
IEEE TRANSACTIONS ON
Downloaded from http://iranpaper.ir
97 1997) 245-271
Wireless Netw
The Impact of Special Days in Call Arrivals Forecasting:
Neural Comput & Applic
Journal of Process Control 20 (2010) 1252–1260
Digital Signal Processing 17 (2007) 702–710
Downloaded from http://iranpaper.ir
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
Downloaded from http://iranpaper.ir
Stepwise approach and totality of evidence to demonstrate and assess
9 Knowledge Discovery Systems:
2
3
Application of artificial neural network in predicting the extraction yield
PERSPECTIVEOFHEALTHDATAINTEROPERABILITYONCLOUD-BASEDMEDICAL
Neural Comput & Applic
4.4.2 Reordering
Journal of Process Control 20 (2010) 1252–1260
Journal of Process Control 20 (2010) 1252–1260
Journal of Process Control 20 (2010) 1252–1260
Width andheight of the image represent the spatial distribution of
Width andheight of the image represent the spatial distribution of
M06_SAUN6860_05_SE_C06.QXD 12/2/09 12:52 pm Page 173
Do I Need a Server?
VOLUME 89, NUMBER 5 PHYSICAL REVIEW LETTERS 29 JULY 2002
ANT-COLONY OPTIMIZATION BASED IN-NETWORK DATA AGGREGATION IN
Artificial
International Review of Social History 43 (1998), Supplement, pp. 81-104
Neural Comput & Applic
2016 IEEE/ACM 38th IEEE International Conference on Software Engineering
Minireview
Minireview
HOW TO WRITE A WORLD CLASS
Downloaded from http://nar.oxfordjournals.org/ at Amirkabir University of Technology on December 11, 2016
Tourism Management 60 (2017) 47e55
Facebook Distributed System Case Study For Distributed System Inside Facebook
O L G A G U I U S E R M A N U A L Page 71
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING
Going, going, gone? The demise of the accruals anomaly
MSD builds on a tradition of providing the most trusted
MSD builds on a tradition of providing the most trusted
Global Journal of Computer Science and Technology
Chapter 2
watermarking
CHAPTER 19
Downloaded from http://iranpaper.ir
Journal of King Saud University – Computer and Information Sciences (2016) 28, 345–361
EuropeanJournal ofOperational Research250 (2016)239–250
Climate Change Impacts
Expert Systems With Applications 57 (2016) 1–11
Knowledge-Based Systems xxx (2014) xxx–xxx
V. Kumar, Kevin Lane Keller, & Katherine N. Lemon
Optimization of Collective Communication Operations in MPICH
Data Set Information: This database contains 34 attributes, 33 of which are linear valued and one of them is nominal.
FutureGenerationComputerSystems37(2014)127–140
FutureGenerationComputerSystems37(2014)127–140
33 of which are linear valued and one of them
33 of which are linear valued and one of them
Advanced Database System
PART IV: Attained Curriculum
and a label that tells whether this string represents a
VERSION 2.01 1
IEEECOMMUNICATION SURVEYS &TUTORIALS,VOL.17,NO.1,FIRSTQUARTER2015 27
8.1.4 Analytical Qualifications, Expertise andResponsibilities
Taming Big Data We all see how the Internet has
3.6 Quality Rating of Test Data
QUALIT Hsieh, Shannon / PROBLEMS WITH INTER ATIVE HEALTH RESEARCH / November 2005 VIEWS 10.1177/1049732305276687
·
IT Auditing, Second Edition Reviews
Downloaded from http://iranpaper.ir
Quantitative,
Research Questions
3
PART I
Advanced Database System
PART III: Implemented Curriculum
1 Introduction Censorship of information on the Internet has been
شور اه یگژیو تبثم تاکن
شور اه یگژیو تبثم تاکن
Data Storage Networking
Representing data by sparse combination of
Representing data by sparse combination of
564 The Platform
2016 IEEE International Conference on Smart Grid Communications (SmartGridComm): Data Management and Grid Analytics
Predicting credit card customer churn in banks using data mining
Predicting credit card customer churn in banks using data mining
Predicting credit card customer churn in banks using data mining
Available online at www.sciencedirect.com
ISSN (Print) : 0974-6846
Postfracture Evaluation
Shale Gas Revolution
Postfracture Evaluation
Shale Gas Revolution
Postfracture Evaluation
Postfracture Evaluation
collaborative Protection Profile for Network Devices
Figure 1: VoIP Communications
FutureGenerationComputerSystems56(2016)684–700
PAPADIMITRATOS LAYOUT 10/19/09 12:36 PM Page 84
The development of microbially mediated technologies for subsurface remediation and
Chapter 12
Internet Marketing
a device that opened up the Internet and all its
J Netw Syst Manage (2015) 23:163–182
Hindawi Publishing Corporation
ICST Transactions Preprint
J Netw Syst Manage (2015) 23:163–182
Hindawi Publishing Corporation
J Netw Syst Manage (2015) 23:163–182
Hindawi Publishing Corporation
ICST Transactions Preprint
A file management system for a large corporate
COMMUNICATIONS NEEDS OF THE USER FOR
Measurement and Verification
messages. Detach Transmit, Activation Transmit, and
Internet of things A network of objects containing embedded technologies
Available online at www.sciencedirect.com
Security, Privacy and Trust in Cloud Computing:
Threats Analysis, Requirements and Considerations for Secure Internet of Things
Chapter 11
The Return of Artificial Intelligence It is becoming acceptable again
Pattern Recognition 48 (2015) 50–59
C Most researchers agree that AI peaked around 1985. A public reared on sciencefiction
Revista de Contabilidad – Spanish Accounting Review 19 (1) (2016) 77–88
Revista de Contabilidad – Spanish Accounting Review 19 (1) (2016) 77–88
Deep learning
Computer-AidedDesign43(2011)479–501
Chapter 5
Available online at www.sciencedirect.com
EnvironmentalTechnology&Innovation5(2016)106–116
Information request: customer information requests about the destination (e.g. products, prices,
J. Vis. Commun. Image R. 22 (2011) 1–8
J. Vis. Commun. Image R. 22 (2011) 1–8
2013 5th International Conference on Computer Science and Information Technology (CSIT) ISBN: 978-1-4673-5825-5
2013 5th International Conference on Computer Science and Information Technology (CSIT) ISBN: 978-1-4673-5825-5
Databases are the repositories of the most important and expensive
6 Measurement and Verification Operational Guide
Atmosphere 2014, 5, 870-888; doi:10.3390/atmos5040870
344 R.E.Bucklin
Downloaded form http://iranpaper.ir
Downloaded form http://iranpaper.ir
Renewable and Sustainable Energy Reviews 66 (2016) 499–516
Asynchronous 8-Bit Processor Mapped into an FPGA
BIM-based parametric modeling of roads and infrastructure
3949
6 Rough Sets
Varying Graph Data Abstract This work presents a novel modeling
Customer Knowledge
Customer Knowledge
The current study followed an experimental research strategy to find
The current study followed an experimental research
Chapter ۶
General Description
Jurgen A. Doornik
with a central mainframe supporting a number of directly connected
Behavioral Dimension This distinction can be summed up by contrasting
This article was downloaded by: [Washington State University Libraries ]
The analyses presented in Chapter 21 provide broad coverage of
The analyses presented in Chapter 21 provide broad coverage of
The analyses presented in Chapter 21 provide broad coverage of
Databases are the repositories of the most important and expensive
is normally regarded as an important solution for detecting various
International Journal of Engineering Research & Technology (IJERT)
International Journal of Engineering Research & Technology (IJERT)
Izadi
Information Processing Letters 116 (2016) 1–14
Digital marketing Digital marketing is the promotion of products or
ANSI/TIA-942-2005
Expert Systems with Applications 38 (2011) 12565–12568
300 hours of new video content uploaded every minute on
RADAR CROSS
PerformanceEvaluation102(2016)21–33
Journal of Computer-Mediated Communication
Journal of Computer-Mediated Communication
We will begin to see computers learning from the experiences
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 3 0 1 8 0 3 0 0 5
Academic Press is an imprint of Elsevier
118 CHAPTER 4 Feature Selection
118 CHAPTER 4 Feature Selection
Remote reads are read directly from memory into the network
Storage planning today means investing in an ecosystem that supports
CHAPTER
1
UNIVERSITY OF CALIFORNIA,
Chapter 16
Chapter 16
HUMAN FACTORS METHODS This page intentionally left blank Human Factors Methods
HUMAN FACTORS METHODS This page intentionally left blank Human Factors Methods
Handling and maintenance of numbering machines Numbering machines are precision
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
20 Percent of User Interactions With Smartphones Will Take Place
criteria based dynamic model selection and combination Abstract In spite
هواشناسی
Abstrack Network traffic monitoring and analysis is of theoretical and practical significance for optimizing network resource and improving user experience.
1. what is the main research question 1. a short description of the methodology in this 1. any new algorithm is
Data Management and ImplementationPing LiuComputer and Information Engineering
Computers and Electrical Engineering xxx (2015) xxx–xxx
Historical Trends in
Current design techniques
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
Computers and Electrical Engineering xxx (2015) xxx–xxx
Computers and Electrical Engineering xxx (2015) xxx–xxx
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Accepted Manuscript
Accepted Manuscript
Accepted Manuscript
Ain Shams Engineering Journal (2015) xxx, xxx–xxx
I used to gaze at the traffic out the car
The “NVCA Tool for Managing New Urban Development in Phosphorus-Sensitive
Current design techniques
Historical Trends in
International Journal of Advance Research In Science And Engineering http://www.ijarse.com
International Journal of Advance Research In Science And Engineering http://www.ijarse.com
NCVA
A 920-Kilometer Optical Fiber Link for Frequency Metrology at the
Neurocomputing 125 (2014) 119–124
GLOBAL ENTERPRISE VSAT MARKET -IT
Market overview This report covers the present scenario and growth
Cache-aware Named-data Forwarding in Internet of
Named Data Networking for IoT:
Cache-aware Named-data Forwarding in Internet of
International Journal of Advance Research In Science And Engineering http://www.ijarse.com
CHAPTER
Available online at www.sciencedirect.com
Computers and Electrical Engineering 41 (2015) 357–367
Expert Systems With Applications 56 (2016) 9–27
Expert Systems With Applications 56 (2016) 9–27
A Survey of Provably Secure Searchable Encryption
Naresh K. Malhotra
MARE_CH17.QXD 7/11/06 13:41 Page 474
MARE_CH17.QXD 7/11/06 13:41 Page 474
ergonomy
We propose to monitor malicious activity on OSNs through the
ONLINE PRIVACY ISSUES The online privacy issue encompasses topics such
نمایشی از یک doubly LinkedListاز کتابخانه LinkedList زبان Java در
A Short Survey on Data Clustering Algorithms
A Short Survey on Data Clustering Algorithms
Recent Advances in Clustering: A Brief Survey
Scalar Intelligent
The proposed model in the previous part determines location and
The proposed model in the previous part determines location and
The proposed model in the previous part determines location and
The proposed model in the previous part determines location and
The proposed model in the previous part determines location and
Fuzzy Sets and Systems 141 (2004) 301–317
Named Data Networking for IoT:
tCloud computing and the Internet of Things are the two
2016 IEEE First International Conference on Internet-of-Things Design and Implementation
by Elisa Bellott How do we interact with people in
Ad Hoc Networks 56 (2017) 122–140
Journal of King Saud University – Computer and Information Sciences (2016) xxx, xxx–xxx
Expert Systems With Applications 57 (2016) 1–11
Knowledge-Based Systems xxx (2014) xxx–xxx
Discovery of Meaningful Rules in Time Series
1
Understanding the Internet of Things: definition, potentials, and
KEYWORDS
Ad Hoc Networks 56 (2017) 122–140
Journal of King Saud University – Computer and Information Sciences (2016) xxx, xxx–xxx
ARTICLE IN PRESS
Available online at www.sciencedirect.com
More about the HP ProLiant DL360:
Journal of Network and Computer Applications xx (xxxx) xxxx–xxxx
ISSN:2229-6093
International Journal of Engineering Science Invention
nd
NeuroImage114(2015)438–447
SPM-fNIRS toolbox
NIRS-SPM : Statistical Parametric Mapping
International Journal of Fuzzy Logic Systems (IJFLS) Vol.4, No.3, July 2014
NIRS-SPM: Statistical Parametric Mapping
API Manual of Petroleum
2016 IEEE International Congress on Big Data
2016 IEEE International Congress on Big Data
Full-Circle Learning
most business executives have in some form thought or talked
1594 IEEETRANSACTIONSONCOMPUTERS, VOL.64, NO.6, JUNE 2015
s your first trip abroad or you travel several times
journal of information security and applications 24-25 (2015) 25–40
TECHNICAL GUIDANCE ON WATER-RELATED DISEASE SURVEILLANCE
> SO_SWSI-2015-06-0088 - ACCEPTED TO IEEE SOFTWARE SI - FUTURE OF SOFTWARE ENGINEERING, 2015 < 1
NIRS-SPM: Statistical Parametric Mapping
By using this website, you consent to the use of cookies as described in our Privacy x
Wireless Netw
Wireless Netw
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Available online at www.sciencedirect.com
Applied Soft Computing 48 (2016) 193–206
Phenomenology flourished in the first decade of the twentieth century
Tell them what to do and they will surprise you
A Survey of State Management in Big Data Processing Systems
Applied Soft Computing 48 (2016) 193–206
Applied Soft Computing 48 (2016) 193–206
26
FUZZY LOGIC WITH
Available online at www.sciencedirect.com
IEEETRANSACTIONSONCLOUDCOMPUTING, VOL.4, NO.X, XXXXX 2016 1
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Downloaded from tech.snmjournals.org by on March 3, 2017. For personal use only.
Industry specific financial distress modeling
Bankruptcy prediction using Partial Least Squares Logistic Regression
A B S T R A C T
Available online at www.sciencedirect.com
Clouds, big data, and
pDURATION Function
RRI Function
Smart Robot-based Inspection, Maintenance
REE165322 DOI: 10.2118/165322-PA Date: 27-January-16 Stage: Page: 5 Total Pages: 13
REE165322 DOI: 10.2118/165322-PA Date: 27-January-16 Stage: Page: 5 Total Pages: 13
REE165322 DOI: 10.2118/165322-PA Date: 27-January-16 Stage: Page: 5 Total Pages: 13
The current issue and full text archive of this journal is available at
How to Innovate for the Next 100 Years Entrepreneurs doing
Telecommun Syst (2013) 52:2163–2176
Chapter 16 Alarm
16-1 Alarm Setup
Applied Computing and Informatics (2016) xxx, xxx–xxx
Applied Computing and Informatics (2016) xxx, xxx–xxx
Journal of Network and Computer Applications 79 (2017) 88–115
you might be one of the many people eagerly awaiting
BUSHOR-1363; No. of Pages 11
Social Science Research 59 (2016) 1e12
1
Computers in Human Behavior 47 (2015) 90–97
12
12
AIP Method
The data consists of 1901 women who were inseminated by sperm donations from 279 donors. Each donor made multiple donations; there were
Improving Utilities Performance with Big Data
it is important to align the data processing problem with
These threats to valid inference are easily handled if the data are balanced.
H
ComputerStandards&Interfaces36(2014)723–733
DE GRUYTER OLDENBOURG at–Automatisierungstechnik2016;64(9):699–706
Available online at www.sciencedirect.com
Journal of Service Science and Management, 2016, 9, 189-194
Strengths and Weaknesses
Accounting Information Systems: evolving towards a business process oriented accounting
YNIMG-10582; No. of pages: 20; 4C: 5, 8, 12, 16
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
1 2.1 Introduction
M. Kapsali / Technovation 31 (2011) 615–626 619
Digital Investigation 20 (2017) S56eS65
Digital Investigation 20 (2017) S56eS65
Strengths and Weaknesses
Foreword Over the past 20 years enormous progress has been
SyncroTESS Loading Point Optimization
Epidemiology of Cholera in the Philippines
Advanced Information and Knowledge Processing
IEEE INTERNET OF THINGS JOURNAL, VOL. 4, NO. 1, FEBRUARY 2017 75
What is the difference between CMMI, CMMI-DEV, CMMI-SVC, CMMI-ACQ, People
ARTICLE IN PRESS
Working Report 2008-58
MD-15-SHA-UM-3-11
ARTICLE IN PRESS
A New Dynamic Data Replication Algorithm to
Journal of Network and Computer Applications 35 (2012) 1013–1021
wine quality has been associated with freshly fermented grape juices
the free encyclopedia Thematic analysis is one of the most
Environmental Modelling & Software xxx (2014) 1e11
Wall and Interfacial Shear Stress in Stratified
Executing dynamic data-graph computations
Active Learning Literature Survey
Introduction This report provides a general review of the literature
SDN and Fog Computing Rapid increase in number and diversity
Electric Power Systems Research 143 (2017) 643–656
Hindawi
Electric Power Systems Research 143 (2017) 643–656
ﻮﯾﺮﯾ ﺪـﻣ
204 CHEMOMETRICS
106 G. Carofiglio et al. / Computer Networks 110 (2016) 104–117
Created in Master PDF Editor - Demo Version
AutomationinConstruction45(2014)96–106
CHAPTER
Marketing research is the systematic and objective search for and
This Article aims to briefly describe and analyze the constitutional
Marketing research is the systematic and objective search for and
Evolving Toward the Perfect Schedule:
Eur.Phys.J.SpecialTopics214,153–181(2012)
Revista de Contabilidad – Spanish Accounting Review 19 (1) (2016) 77–88
SAP continues to extend the capabilities of SAP ERP with
SAP continues to extend the capabilities of SAP ERP with
3.3.1 Smart objects/Smart devices
3.3.1 Smart objects/Smart devices
Active Learning Literature Survey
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
1032B
3.3.3 Cloud
Distributed Systems
Current and Emerging Solutionsfor Sensed Data Collection and Actuation in
1150 M.A. Khan / Renewable and Sustainable Energy Reviews 49 (2015) 1145–1159
The application of median indicator kriging and neural network in modeling
GLIOMAS are the brain tumors with the highest mortality rate
Human Resource Management Review 23 (2013) 50–70
Renewable and Sustainable Energy Reviews 66 (2016) 499–516
s behalf even when the user is disconnected from the
s behalf even when the user is disconnected from the
TH[ INOUSTRl[S Of
s behalf even when the user is disconnected from the
International Journal of Information Management 34 (2014) 20– 27
s behalf even when the user is disconnected from the
Online Social Networks and Media 1 (2017) 33–43
CHAPTER
Innov High Educ (2009) 33:271–280
STRUCTURAL DAMAGE DETECTION USING ARTIFICIAL
http://tarjomebazar.com
Revised Draft, August 7, 2016
Revised Draft, August 7, 2016
Revised Draft, August 7, 2016
1. Introduction: Video in research and theory, and then in practice
1. Introduction: Video in research and theory, and then in practice
These capabilities are to be used within the scope of
HowtoGetThemaDreamJob?
terms in the query are then mapped to nodes in the Seman- plicitly select some of the preden � ed topics to specify their
social business intelligence
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Smart System: loT for University
CHAPTER
CHAPTER
Journal of Knowledge Management
Journal of Knowledge Management
ARTICLE IN PRESS
1 Server configuration files 48 ǃClient configuration file 49 Default
J. OF PUBLIC BUDGETING, ACCOUNTING & FINANCIAL MANAGEMENT, 19 (1), 56-92 SPRING 2007
Journal of Manufacturing Systems 43 (2017) 15–24
DATA ANALVTICS LIFECVCLE
The application of GIS technology in the petroleum exploration
The application of GIS technology in the petroleum exploration
The application of GIS technology in the petroleum exploration
Reliability analysis of structural stainless steel design provisions Since the establishment of the Eurocode design provisions for structural stainless steel, a considerable amount of
3.2. Measuring points and data organisation
In order to determine the goodness of the fits of log-normal and
Online Web-Video Topic Detection and Tracking
Tutorial Justimind Prototyper – Tutorial
Tutorial Justimind Prototyper – Tutorial
WHITE PAPER
2015 IEEE/ACM 1st International Workshop on Big Data Software Engineering
1-1
The function f is now a smoothing function over time and is typically modelled
A System Dynamics Approach to Quantitatively Analyze the Effects of Mobile
Expert Systems With Applications 73 (2017) 145–160
Expert Systems With Applications 73 (2017) 145–160
relevant applications have grown more and more popular in recent
Personal body physiological signals sensing frequency In order to attain
relevant applications have grown more and more popular in recent
relevant applications have grown more and more popular in recent
relevant applications have grown more and more popular in recent
Background and related work This research focuses on the cloud
FMTOC.qxd 11/26/12 5:09 PM Page i
494320 EJT19310.1177/1354066113494320European Journal of International
4
2016 8th International Conference on Communication Systems and Networks (COMSNETS)
2016 8th International Conference on Communication Systems and Networks (COMSNETS)
4
Avail Availabl able on e onlin line at e at www www.sciencedirect.com .sciencedirect.com
Title
Barrell, K. A., 2000, GIS: The exploration and exploita-
BUSINESS DRIVERS While many organizations are still struggling to understand
Among respondents who report Big Data projects originating within their
Among respondents who report Big Data projects originating within their
BUSINESS DRIVERS While many organizations are still struggling to understand
I J C T A, 10(8), 2017, pp. 249-255 ISSN: 0974-5572
The focus of the approach is to reduce costs and
Personality and Individual Differences 43 (2007) 1321–1332
Personality and Individual Differences 43 (2007) 1321–1332
Personality and Individual Differences 43 (2007) 1321–1332
Chapter 15
Resources, Conservation and Recycling 116 (2017) 107–115
Controlling sand production in the petroleum industry has been a
International Journal of Disaster Resilience in the Built
Chapter 9
The Basics of
The Basics of
2017 the 6th International Conference on Industrial Technology and Management
Introducing the Product and
Text Mining: Tools,
Today we will touch the introductory part of it where
Available online at www.sciencedirect.com
Neurocomputing 181 (2016) 147–152
Available online at www.sciencedirect.com
http://tarjomebazar.com
Created in Master PDF Editor - Demo Version
5/24/2017 Big data Wikipedia
Chapter
فیبر نوری
CHAPTER 3
Chapter 11 | Big Data Opportunities in Education Big Data Bootcamp
Chapter 11 | Big Data Opportunities in Education Big Data Bootcamp
Downloaded from tech.snmjournals.org by on May 26, 2017. For personal use only.
annihilation coincidence detection is used in lieu of absorptive collimation
annihilation coincidence detection is used in lieu of absorptive collimation
The focus of the approach is to reduce costs and
Review
Journal of King Saud University – Computer and Information Sciences (2016) xxx, xxx–xxx
I dedicate this book to Karen Drumm Creswell. She is the inspiration for my writing and my life. Because of her—as wife,
In Hadoop data is distributed across the nodes there by
MEDICAL PHYSICS/BME 573: IMAGE SCIENCE
http://tarjomebazar.com
Appendices 151
Infor mation Systems
Vol. 16, No. 1, 2014
ARTICLE IN PRESS
ARTICLE IN PRESS
ARTICLE IN PRESS
J Pediatr (Rio J). 2016;92(6):631---637
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2016.2619369, IEEE Internet of
4 Understanding Information Retrieval Systems
8 Understanding Information Retrieval Systems
8 Understanding Information Retrieval Systems
COMPUTER SCIENCE REVIEW ( ) –
Context Reasoning Decision Models Context reasoning can be defined as
forward neural networkwith a single layer of neurons arranged into
The data collected by each of these IoT solutions is
Chandak J Big D ata (2016) 3:5
1 Introduction Data communication systems are essential in any modern
Design of Parallel Algorithms for Super Long Integer Operation Based on Multi-core CPUs
2015 11th International Conference on Computational Intelligence and Security 2015
Information Fusion 35 (2017) 68–80
a r t i c l e i n f
a r t i c l e i n f
New Model for IT:
2 Challenges Many of the challenges related to the Internet
Wireless Pers Commun
An Open, Secure and Flexible Platform Based on Internet of Things and Cloud
Johnson/Hansen: The Visualization Handbook Page Proof 11.6.2004 9:04am page 813
Procedia
Some existing scenarios may only show up in the NDS
Abstract of the Dissertation
CHAPTER 1
JID:BDR AID:21 /REV [m5G; v1.149; Prn:23/02/2015; 12:31] P.1 (1-5)
a b s t r a c t Big data
Interested in learning
The Roles of Big Data in the Decision-Support Process:
PUBLISHED BY
·
Expert Systems With Applications 64 (2016) 36–55
108 ❚ The practice of HCM
CHAPTER 1
Wirele SS
Reliability Engineering and System Safety 88 (2005) 207–214
TIME SERIE S DATA MININ G ◂ 151
Business Process Management Journal
Transportation Research Part F 25 (2014) 98–107
Sensors 2015, 15, 28603-28626; doi:10.3390/s151128603
1
Chapter 2
FEAMSTER LAYOUT_Layout 1 1/28/13 3:36 PM Page 114
57
http://tarjomebazar.com
http://tarjomebazar.com
CHEN2_LAYOUT.qxp_Layout 1 3/13/15 2:07 PM Page 32
Conclusions Recent advances in the field of data mining have
Mach Learn
ARTICLE IN PRESS
ARTICLE IN PRESS
YNEDT-03347;NoofPages3
FutureGenerationComputerSystems ( ) –
An Oracle White Paper
Conclusions Recent advances in the field of data mining have
AN1200.22
Vidya Sagar Ponnam Int. Journal of Engineering Research and Applications www.ijera.com
system and basic network configuration. It provides the ability to install extra software on the
CYBERSECURITY
Export Classification Model to Predict New
Export Classification Model to Predict New
Journal of Scientific & Industrial Research
Smart Cities How rapid advances in technology are reshaping our
A number of benefits from adopting big data analytics into
A number of benefits from adopting big data analytics into
A number of benefits from adopting big data analytics into
COMPUTER SCIENCE REVIEW 7 (2013) 1–34
FutureGenerationComputerSystems75(2017)14–29
InformedConsent Form We areasking you to participate in a research
InformedConsent Form We areasking you to participate in a research
It takes an input of the same form as this
57
57
http://tarjomebazar.com
Received March 5, 2017, accepted March 30, 2017, date of publication April 6, 2017, date of current version May 17, 2017.
Web Mining Research: A Survey
Chapter 1
Chapter 1
Sensors 2015, 15, 28603-28626; doi:10.3390/s151128603
Activity and Anomaly Detection in Smart
3System breakdown and analysis We split the proposed architecture for
57
5 Ripple Effects of Cyber Crime
ComputerNetworks38(2002)393–422
Available online at www.sciencedirect.com
Information & Management 51 (2014) 27–42
Natural Language Basics
Chapter 2
Chapter 2
The Emerald Research Register for this journal is available at The current issue and full text archive of this journal is available at
Abstract Network lifetime improvement and uncertainty inmultiple systems are the
Chapter 2
Chapter 2
ComputerStandards&Interfaces36(2014)759–775
ComputerStandards&Interfaces36(2014)759–775
Chapter 2
Chapter 3
Chapter 2
Chapter 4
Chapter 6
Chapter 7
Chapter 6
Chapter 6
Chapter 2
Chapter 3
Chapter 4
Chapter 7
Chapter 3
Chapter 4
Chapter 7
IPS-ENERGY™ ISMS
chapter8Process and ProcedureGETTING STARTED AND MOVING FORWARDAll
Security Challenges of the Internet
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Journal of Machine Learning Research 18 (2017) 1-35 Submitted 3/15; Revised 8/16; Published 1/17
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎-∎∎∎ 1 2 3 4 5 6 7 8 9 10 11 12
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66
B.A. Milani, N.J. Navimipour / Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎-∎∎∎ 3 1 67 2 68 3 69 4
1 high query efficiency while maintaining high availability and 2
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎-∎∎∎ 1 2 3 4 5 6 7 8 9 10 11 12
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66
B.A. Milani, N.J. Navimipour / Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎-∎∎∎ 3 1 67 2 68 3 69 4
1 high query efficiency while maintaining high availability and 2
1 2 3 4
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎-∎∎∎ 1 2 3 4 5 6 7 8 9 10 11 12
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66
B.A. Milani, N.J. Navimipour / Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎-∎∎∎ 3 1 67 2 68 3 69 4
1 high query efficiency while maintaining high availability and 2
1 2 3 4
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎-∎∎∎ 1 2 3 4 5 6 7 8 9 10 11 12
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66
B.A. Milani, N.J. Navimipour / Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎-∎∎∎ 3 1 67 2 68 3 69 4
1 high query efficiency while maintaining high availability and 2
1 2 3 4
1 cost by dynamically maintaining minimum replicas among the 2
1 2 3 4
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54
Journal of Machine Learning Research 18 (2017) 1-35 Submitted 3/15; Revised 8/16; Published 1/17
Natural Language Basics
which is a survey of multiobjective evolutionary algorithms for data
RESEARCH ARTICLE
Preliminary Draft
Sensors 2015, 15, 28603-28626; doi:10.3390/s151128603
Ecological Indicators 80 (2017) 327–336
we are at a stage of development that is analogous
obr76817_ch07_270-306.indd Page 272 13/08/10 7:37 PM user-f501 /Users/user-f501/Desktop
FutureGenerationComputerSystems70(2017)17–25
FutureGenerationComputerSystems70(2017)17–25
FutureGenerationComputerSystems70(2017)17–25
UNIVERSIDADE FEDERAL DO RIO GRANDE DO SUL
Clustering in Wireless Sensor Networks: Performance Comparison of
Downloaded from http://iranpaper.ir
provides an inside look into the trials facing companies in
Sixth Edition
The coming war on data The data landscape is a
6.7
T echnical P aper
Preprint: http://arxiv.org/abs/1307.2661
SDN-based Game-Aware Network Management
An SDN Controller for Delay and Jitter Reduction in Cloud
a new approach for autonomous anomaly detection is introduced within
fuzzy system and its online learning procedure are considered in
Classification is an important data mining technique to classify various
LSSVR with Sammon mapping adopts particle swarm optimization to obtain
a new approach for autonomous anomaly detection is introduced within
fuzzy system and its online learning procedure are considered in
Classification is an important data mining technique to classify various
LSSVR with Sammon mapping adopts particle swarm optimization to obtain
a new approach for autonomous anomaly detection is introduced within
fuzzy system and its online learning procedure are considered in
Classification is an important data mining technique to classify various
LSSVR with Sammon mapping adopts particle swarm optimization to obtain
An SDN Controller for Delay and Jitter Reduction in Cloud
69
2014 IEEE International Congress on Big Data 2014 IEEE International Congress on Big Data 2014 IEEE International Congress on Big Data 2014 IEEE International Congress on Big Data
406 IEEE SENSORS JOURNAL, VOL. 14, NO. 2, FEBRUARY 2014
A Survey of Clustering Data Mining
Performance Analysis between Probabilistic and
406 IEEE SENSORS JOURNAL, VOL. 14, NO. 2, FEBRUARY 2014
The Coefficient of Variation
The Coefficient of Variation
The Coefficient of Variation
The Coefficient of Variation
Chapter 2
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 6 5 9 7 7 9 3 1
It employs the nonparametric EDA estimators to disclose the underlying
Chapter 1
اینترنت اشیاء
The main goal of this research is to investigate the
Synology combines the features of public and private clouds to
1 2 3 4
Omega 54 (2015) 72–83
Abstract Diabetes is one of the most common metabolic disorders
Abstract Diabetes is one of the most common metabolic disorders
Rainfall-Runoff Modelling Rainfall-Runoff Modelling
Training Feed-Forward Neural Networks
Available online at www.sciencedirect.com
CHAPTER 4
Computer Networks 54 (2010) 2787–2805
International Journal of Computer Science and Information Security (IJCSIS),
IPS-SmartGridDI™ Enterprise
An energy efficient approach for data collection in wireless sensornetworks
An energy efficient approach for data collection in wireless sensornetworks
Parallels RAS v16 Virtual application and desktop delivery can be
The leading multi-layered endpointprotection platform, based on truecybersecurity technologies
Chapter 1
Chapter 1 Internet of Things with Arduino In this first
University College of Southeast Norway
Twitter opinion mining framework using hybrid classification scheme Abstract Twitter
The TOM framework applies a variant of techniques for Twitter
The TOM framework applies a variant of techniques for Twitter
proposed an unsupervised approach for sentiment polarity detection from twitter
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
FOREWORD
The common steps of fMRI processing are illustrated in figure
Ind. Eng. Chem. Res. 2006, 45, 3693-3696 3693
LITERATURE CITED (8) McCormick, R.H., Barton, Paul, Fenske, M.R., A.I.Ch.E.
J. Chem. Eng. Data 1981, 26, 53-55
2001
we also characterize how much time isconsumed in the OS
Chapter 5
Management Information Systems 13e
SCALABLE IMAGE RETRIEVAL FROM DISTRIBUTED IMAGES DATABASE
Privacy-PreservingDataPublishing:ASurveyof
Shancang Li is a Senior Lecturer in Department of Computer
Computer Security
The digital representation provides both the elements and the dynamics
Crystal: Software-Defined Storage for
Fog Computing, Fault Tolerance in Cloud Computing, Control Flow Checking Mechanisms, Snort, Open VSwitch,
Chapter 4
Chapter 11
World Economic Forum, Davos
World Economic Forum, Davos
World Economic Forum, Davos
World Economic Forum, Davos
Oct OBeR 2012
Crystal: Software-Defined Storage for
Renewable and Sustainable Energy Reviews 41 (2015) 128–133
The purpose of this review is to offer a summary
Economic Growth and the Environment
4 Banking Business Models For The Digital Age
}
Preface
and Storage Technologies The right peripherals can make all the
PRECISION AGRICULTURE FOR GRAIN PRODUCTION SYSTEMS
Storage Area
PervasiveandMobileComputing4(2008)658–680
Telecommun Syst
Information Sciences xxx (2013) xxx–xxx
along with Cornell University and the World Intellectual Property Organisation
along with Cornell University and the World Intellectual Property Organisation
UseR!
CHAPTER 2
نحوه ی web mining در فیسبوک
COST ESTIMATOR'S
CH A P TE R 5
398 IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, VOL. 45, NO. 2, FEBRUARY 2007
In Proc. of the IEEE International Symposium on Multimedia (ISM2015),
FaceRecognitionUsingDeepMulti-PoseRepresentations
Church et al. Journal of Cloud Computing: Advances, Systems and Applications
Hindawi Publishing Corporation
Expert Systems with Applications 40 (2013) 96–104
PRECISION AGRICULTURE FOR GRAIN PRODUCTION SYSTEMS
...
computers & security 57 (2016) 47–66
74 PART I Overview of Accounting Information Systems
Copyright © 2004, 1990, 1985, New Age International (P) Ltd., Publishers
2002
The FSPEEG was proposed in the early 2000s as an
Time domain features measure entities of the EEG signal that
The FSPEEG was proposed in the early 2000s as an
Time domain features measure entities of the EEG signal that
The authors introduced the ratio between normalized spectral powers to
the patients entered a data collection phase in which a
be made available to the seizure prediction research community at
Background The approach taken was influenced by the work of
Information Sciences 258 (2014) 371–386
Received June 5, 2016, accepted June 21, 2016, date of publication June 27, 2016, date of current version July 22, 2016.
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 8 2 2 9 3 4 8 7
International Journal of Nursing Studies 69 (2017) 78–90
2016 International Conference on Networking and Network Applications 2016 International Conference on Networking and Network Applications
2016 International Conference on Networking and Network Applications 2016 International Conference on Networking and Network Applications
American Journal of Botany 87(1): 96–107. 2000.
Security and privacy for storage and computation in cloud
22 IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 1, FEBRUARY 2014
Optical Switching and Networking 14 (2014) 179–193
Optical Switching and Networking 14 (2014) 179–193
Some Methodological Issues in Finance Emiliano Ippoliti Abstract The nature
(services) identification number, date of birth, civil status, legal Article 10. Personal data
(services) identification number, date of birth, civil status, legal Article 10. Personal data
(services) identification number, date of birth, civil status, legal Article 10. Personal data
FutureGenerationComputerSystems56(2016)684–700
The content validity of the discussion topics of the interview
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TBDATA.2016.2597149, IEEE
Cloud computing with unlimited resources seems to be the way
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TBDATA.2016.2597149, IEEE
ARTICLE IN PRESS
ARTICLE IN PRESS
Type 2 Diabetes Mellitus Screening and Risk Factors Using Decision
and thus a coherent approach is required to fully exploit
SIoT: Securing the Internet of Things through Distributed
Downloaded from http://iranpaper.ir
A Survey Recent technological advances in the area of wireless
2016 IEEE 16th International Conference on Data Mining
PervasiveandMobileComputing4(2008)658–680
Telecommun Syst
Information Sciences xxx (2013) xxx–xxx
566 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 64, NO. 4, NOVEMBER 2017
566
Journal of Systems Architecture 76 (2017) 117–132
Cloud collaboration to establish a secure connection for lightweight devices
Available online at www.sciencedirect.com
and thus a coherent approach is required to fully exploit
The Journal of Systems and Software 90 (2014) 104–113
Electric load forecasting by using dynamic neural
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
An Oracle server includes an Oracle Instance and an Oracle
Bangladesh Abstract Shale volume and porosity are the most important
Bangladesh Abstract Shale volume and porosity are the most important
EPGs are to be seen as a major improvement of
Bangladesh Abstract Shale volume and porosity are the most important
and thus a coherent approach is required to fully exploit
Bangladesh Abstract Shale volume and porosity are the most important
and thus a coherent approach is required to fully exploit
Available online at www.sciencedirect.com
JOURNAL OF EMERGING TECHNOLOGIES IN ACCOUNTING American Accounting Association
© 2017 IJSRST | Volume 3 | Issue 1 | Print ISSN: 2395-6011 | Online ISSN: 2395-602X
Downloaded from http://jb.asm.org/ on September 29, 2016 by CORNELL UNIVERSITY
Downloaded from http://jb.asm.org/ on September 29, 2016 by CORNELL UNIVERSITY
Vol. 4, No. pp. 1593-1606, 1996
SIoT: Securing the Internet of Things through Distributed
6
the applications reviewed and some model improvements and sensitivity tests
SIoT: Securing the Internet of Things through Distributed
Multi-ContextTLS(mcTLS):
Journal of Systems Architecture 75 (2017) 107–119
Chapter 3
Networking Fundamentals
We estimate the dynamic daily dependence between assets by applying
Introduction This paper harnesses the rich information set in intraday
We estimate the dynamic daily dependence between assets by applying
We estimate the dynamic daily dependence between assets by applying
ptg SERVICE-ORIENTED DESIGN
1238 IEEE TRANSACTIONS ON NUCLEAR SCIENCE, VOL. 64, NO. 6, JUNE 2017
Journal of Systems Architecture 75 (2017) 107–119
J Supercomput
The Impact of Artificial Intelligence on Medical Innovation in the
Applied Thermal Engineering 110 (2017) 457–468
Information Technology in Hospitality, Vol. 5 pp. 000–000 1545-9535/08 $60.00 + .00
Journal of Hydrology 540 (2016) 232–239
PervasiveandMobileComputing4(2008)658–680
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2757844, IEEE Access
and How to Fix It Technologies such as VoLTE and
11th IFAC Workshop on Intelligent Manufacturing Systems
DecisionSupportSystems62(2014)22–31
Farid Vosoughi
0
A predictive model for ing-step in near-fault ground
JVM only
Forecasting Completed Cost of Highway Construction
In the perspective of the customer, technology can help companies directly match
DISTRIBUTED SYSTEMS
3.2 Branching and Merging 71
1 Overview Operating a mature Architecture Capability within a large
by Cynthia Solomon Culture defines acceptable and appropriate behaviors in
Spectophotometry
For example, let's assume a sample size of 300 observations (i.e.,
For example, let's assume a sample size of 300 observations (i.e.,
For example, let's assume a sample size of 300 observations (i.e.,
For example, let's assume a sample size of 300 observations (i.e.,
For example, let's assume a sample size of 300 observations (i.e.,
International Journal of Computer Engineering & Technology (IJCET)
International Journal of Computer Engineering & Technology (IJCET)
IOStack: Software-Defined
Digital System Test and Testable Design wwwwwwwwwwww Zainalabedin Navabi
Chapter 2 Upon completion of this chapter, you will be
ISSN: 0976-5697
EUROPEAN COMMISSION
IUI 2017 • Interactive Machine Learning and Explanation March 13–16, 2017, Limassol, Cyprus
ENEECO-02645;NoofPages17
MVNO Agreement
Executive summary
2008 Abstract We explore the relative weekly stock market volatility
DesTech Conference Proceedings
Paper—Design and Realization of Greenhouse Sensor Intelligent Management System Based on Internet…
International Conference on Computer Science and Electronic Technology (CSET 2016)
An Advanced Diffie-Hellman Approach to Image
Nowcastingdailyminimumairandgrasstemperature
MVNO Agreement
Soil Dynamics and Earthquake Engineering 72 (2015) 129–137
Business Horizons (2017) 60, 667—676
JOURNAL OF INFORMATION SYSTEMS American Accounting Association
JOURNAL OF INFORMATION SYSTEMS American Accounting Association
Paper—Design and Realization of Greenhouse Sensor Intelligent Management System Based on Internet…
PHOTOVOLTAICS REPORT
Digital System Test and Testable Design wwwwwwwwwwww Zainalabedin Navabi
Processor Architecture Springer-Verlag Berlin Heidelberg GmbH v
A PLATFORM APPROACH FOR UNLOCKING
a i e
a i e
TSINGHUA SCIENCE AND TECHNOLOGY
TSINGHUA SCIENCE AND TECHNOLOGY
TSINGHUA SCIENCE AND TECHNOLOGY
3.2 Branching and Merging 69
Public buildings consume a considerably high percentage of energy produced
Omega 41 (2013) 3–15
Omega 41 (2013) 3–15
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Omega 41 (2013) 3–15
5520 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 64, NO. 12, DECEMBER 2015
E is associated with m weights corresponding to QoS constraints
5520 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 64, NO. 12, DECEMBER 2015
Omega 41 (2013) 3–15
Peer-to-Peer Netw. Appl.
Key Drivers Global megatrends such as population growth, urbanization, climate change, and resource limitations are placing considerable pressure on cities around the world.
with all friends whose names start with A being grouped
with all friends whose names start with A being grouped
with all friends whose names start with A being grouped
Cluster Comput
Downloaded from http://iranpaper.ir
chapter8 Process and Procedure GETTING STARTED AND MOVING FORWARD All
Smith et al. Malar J (2017) 16:472
A Programmable Storage System Abstract Storage systems need to support
J. R. Soc. Interface (2012) 9, 790–800
Predictive Applications Perhaps the most exciting use for Smart Services
Predictive Applications Perhaps the most exciting use for Smart Services
Building Information Modeling (BIM) for existing buildings – literature review
ICSEA 2016 : The Eleventh International Conference on Software Engineering Advances
Softw Syst Model
World Academy of Science, Engineering and Technology
2017 IEEE 19th Conference on Business Informatics
World Academy of Science, Engineering and Technology
474 CHAPTER 16 EXPERIMENTAL AND PANEL DATA
QBlade Guidelines
Information Fusion 42 (2018) 146–157
Management and Analysis of Big Graph Data:
Management and Analysis of Big Graph Data:
Brazilian Journal
The present systematic review is the first to study the
(IJACSA) International Journal of Advanced Computer Science and Applications,
2014 IEEE International Conference on Cloud Computing
Chapter 7. Vulnerability Management
Information Fusion 42 (2018) 146–157
IOT SECURITY 1
Towards the Implementation of IoT for Environmental Condition Monitoring in
formerly known as the National Coordinating Agency for Surveys and
Schemas Every object in a database is explicitly owned by
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
The two stages of database design are logical and physical
DRIVEN ABC MODELS Launching a Project NOW THAT WE HAVE
AUCTION SHILL DETECTION FRAMEWORK BASED ON SVM
AUCTION SHILL DETECTION FRAMEWORK BASED ON SVM
Classification for Fraud Detection with Social
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 7 8 3 3 2 3 6 3
GRUNDFOS DATA BOOKLET
WISER User's Guide
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TPWRS.2016.2604389, IEEE
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TPWRS.2016.2604389, IEEE
1542 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 10, NO. 2, MAY 2014
Renewable and Sustainable Energy Reviews 82 (2018) 4326–4336
Kleinstreuer and Feng Nanoscale Research Letters 2011, 6:229
Prepare your old phone for a new owner in 4
هکبش لرتنك یاه هناماس :یشهوژپ هورگ ود :شیاریو CTMS08/02 :شرازگ دك
هکبش لرتنك یاه هناماس :یشهوژپ هورگ ود :شیاریو CTMS08/02 :شرازگ دك
Public Administration and Information Technology 16
IOT SECURITY 1
Engineering Applications of Artificial Intelligence 14 (2001) 15–21
Engineering Applications of Artificial Intelligence 14 (2001) 15–21
An Object-Oriented Knowledge Representation
Decision Support Systems 42 (2006) 1503–1520
Decision Support Systems 42 (2006) 1503–1520
Sexual transmission of HIV according to viral load and
Information Systems 64 (2017) 132–150
NIH-PA Author Manuscript NIH-PA Author Manuscript NIH-PA Author Manuscript
Available online at www.sciencedirect.com
Journal of Electromyography and Kinesiology 37 (2017) 41–51
An Object-Oriented Knowledge Representation
Oriented Knowledge Representation Structure for Exploration Data Integration Knowledge representation
Oriented Knowledge Representation Structure for Exploration Data Integration Knowledge representation
surface membership functions to predict permeability in petroleum reservoirs This
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 3 4 0 2 3 4 5 4
Downloaded from http://paperhub.ir
Suman Deb Roy · Wenjun Zeng
Oriented Knowledge Representation Structure for Exploration Data Integration Knowledge representation
Oriented Knowledge Representation Structure for Exploration Data Integration Knowledge representation
by using geophysical data Tuzgolu Basin is the largest interior
by using geophysical data Tuzgolu Basin is the largest interior
logic analysis for petroleum exploration with a case study of
logic analysis for petroleum exploration with a case study of
the significant increase in performance and decrease of prices of
logic analysis for petroleum exploration with a case study of
Introduction In order to first set the scene this paper
Introduction In order to first set the scene this paper
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence (AAAI-16)
Map Asia 2008 Kuala Lumpur, Malaysia
Payment Card Industry (PCI)
Payment Card Industry (PCI)
Payment Card Industry (PCI)
Downloaded from http://iranpaper.ir
2017 9th IEEE International Conference on Communication Software and Networks
ارائه ی مسیریابی و کیفیت سرویس در شبکه نرم افزار محور
A REVIEW OF DATAMINING APPLICATIONS IN BANKING
International Journal of Forecasting 22 (2006) 679–688
International Journal of Forecasting 22 (2006) 679–688
34 F. Hussain and A. Al-Karkhi
34 F. Hussain and A. Al-Karkhi
~Security ®
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2742020, IEEE Access
NeuroImage: Clinical 17 (2018) 16–23
How will the digital economy change the environment for social
Original Research Paper Application of remote sensing techniques for forest
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
Comparison of Methods for Drainage Relative Permeability Estimation
ادخ مان هب
MicroSCADA Pro
The tectonic stress field
The tectonic stress field My goals in writing this book
stress measurements have been made in many areas around the
Indicators of contemporary stress orientation and relative magnitude Zoback and
stress measurements have been made in many areas around the
stress measurements have been made in many areas around the
The tectonic stress field My goals in writing this book
stress measurements have been made in many areas around the
Modeling slump of ready mix concrete using genetic algorithms assisted
کامپیوتر
Graphic sequences, distances and k-degree anonymity
Information Processing Letters 115 (2015) 368–370
Information Systems 38 (2013) 491–494
Accounting, Auditing & Accountability Journal
Accounting, Auditing & Accountability Journal
DecisionSupportSystems97(2017)58–68
CHAPTER
Network Anomaly Detection
Network Anomaly Detection
Methods/Design
Design Primary objective The general objective of this study is
Shirazi and Iqbal Journal of Cloud Computing: Advances, Systems and Applications
Proceedings of the IEEE 2017 International Conference on Computing Methodologies and Communication
Proceedings of the IEEE 2017 International Conference on Computing Methodologies and Communication
Applied Soft Computing 58 (2017) 1–10
Applied Soft Computing 58 (2017) 1–10
Applied Soft Computing 58 (2017) 1–10
Expert Systems With Applications 67 (2017) 12–18
StatisticsandProbabilityLetters ( ) –
StatisticsandProbabilityLetters ( ) –
StatisticsandProbabilityLetters ( ) –
StatisticsandProbabilityLetters ( ) –
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
spectivity modeling can be performed to estimate likelihood for mineral
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TII.2016.2627479, IEEE
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2018.2791522, IEEE Internet of
Eur J Epidemiol (2016) 31:337–350
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TII.2016.2627479, IEEE
Journal of Network and Computer Applications 88 (2017) 10–28
1
American Journal of Scientific Research
The Competitive Effects of the Sharing Economy:
Business intelligence & analytics in management accounting research: Status and future focus
If you are looking for rich features with absolute simplicity
EMC Unity and Data Domain Storage
The monitoring system testo 160 supports you in protecting works
UNSW-NB15: A Comprehensive Data set for Network
ARTICLE IN PRESS
ARTICLE IN PRESS
3
4
3
4
Jill Slay School of Engineering and Information Technology University of
Australia A R T I C L E I N
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 3 0 4 8 4 7 8 5 9
Deep Convolutional Neural Networks
Deep Convolutional Neural Networks
Deep Convolutional Neural Networks
Deep Convolutional Neural Networks
A Convolutional Neural Network Approach
Hydrocarbon exploration is a systematic analytical procedure of various scientific
Role of Remote Sensing and GIS to Provide Geological Input
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 11, Number 4 (2016) pp 2411-2416
SDN Enabled Content Distribution in Vehicular
اینترنت اشیا و شهر هوشمند
Technological Forecasting & Social Change 130 (2018) 99–113
Insurance the way we see it
Al Nuaimi et al. Journal of Internet Services and Applications (2015) 6:25
based reasoning is a methodology with a long tradition in
North American SynchroPhasor Initiative (NASPI)
Environmental Modelling & Software 25 (2010) 891e909
The heart of every research project-the axis around which the entire research endeavor
Brain Tumor Segmentation Using Deep Fully
Kaspersky Enterprise Cybersecurity
Kaspersky for Business
• To identify which features may be relevant to a
In pattern recognition, dimensionality reduction is an effective technique to solve the “curse of
Comp. by: BVijayalakshmiGalleys0000875816 Date:6/11/08 Time:19:52:53 Stage:First Proof
14-th IFAC Symposium on Control in Transportation Systems
all kinds of ways are used synthetically in the petroleum
all kinds of ways are used synthetically in the petroleum
MANAGEMENT INFORMATION SYSTEMS
IoTSecurity: Review,BlockchainSolutions,andOpenChallenges
DELL EMC RECOVERPOINT Continuous Data Protection for Any Point in
05-057
Cluster Comput
Chapter 6
The DAMA Guide to
Self-learning system for personalized e-learning
05-057
A New Model for Delivering Cash Relief
A New Model for Delivering Cash Relief
IOT
Appl. Math. Inf. Sci. 11, No. 4, 1081-1089 (2017) 1081
314 Int'l Conf. Par. and Dist. Proc. Tech. and Appl. | PDPTA'17 |
Multi-Key Homomorphic Signatures
Technological Forecasting & Social Change xxx (xxxx) xxx–xxx
314 Int'l Conf. Par. and Dist. Proc. Tech. and Appl. | PDPTA'17 |
Multi-Key Homomorphic Signatures
Multi-Key Homomorphic Signatures
Cluster Comput
s driving innovation in the rail industry By Keith Nation
time source of labeled URLs from a large Web mail
time source of labeled URLs from a large Web mail
time source of labeled URLs from a large Web mail
time source of labeled URLs from a large Web mail
MANAGEMENT INFORMATION SYSTEMS
Table 3. Performance Indicators analyzed.
Downloaded from http://iranpaper.ir
Milk distribution and safety is of high concern as it
Appendix A: Logging in—A Brief Note
Appendix A: Logging in—A Brief Note
Chapter 6
2016 IEEE 8th International Conference on Cloud Computing Technology and Science
This article has been accepted for publication in IEEE Computer magazine.
This article has been accepted for publication in IEEE Computer magazine.
CUBESAT DESIGN: AN OVERVIEW GOALS
Contents
US 9,438,440 B2
ve stumbled into a conversation where everyone already knows what
Meat Science 92 (2012) 506–510
Hindawi
Statistical Analysis of Aircraft–Bird
Michalis Polychronakis
ve stumbled into a conversation where everyone already knows what
a different set of experiences, knowledge and skills to school
e n a B l I n g W I r e l e s s c o m m u n I c a t I o n s a n d
Computing
Received June 5, 2016, accepted June 21, 2016, date of publication June 27, 2016, date of current version July 22, 2016.
Hitachi Vantara Announces New AI Operations Software and Flash Storage
Extreme Learning Machine for Clustering
Extracting roads from dense point clouds in large scale urban
Conducting Health Research toward Preventing War and Promoting Peace Health
Conducting Health Research toward Preventing War and Promoting Peace Health
1
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JLT.2015.2510021, Journal of
is the statisticalmethod of partitioning data set into subsets such
A more expansive view was adopted by the Supreme Court
2018 IEEE Conference on Multimedia Information Processing and Retrieval
7
Materials and methods Eligibility criteria The methods adopted for this
5G Mobile and Wireless Communications Technology
JOURNAL OF
Stacking the training data for all classes into a n
Stacking the training data for all classes into a n
The SVM tries to construct the optimal hyperplane yielding themaximum
The SVM tries to construct the optimal hyperplane yielding themaximum
The KNN is one of prospective statistical classification algorithms used
1
Edited at https://subtitletools.com
هولن
هولن۲
strategical directions derived from the current status analysis will be
strategical directions derived from the current status analysis will be
هولن۳
هولن۴
41
41
41
41
41
41
Applied Computer Science, vol. 12, no. 3, pp. 37 –46 Submitted: 2016-09-12
Review
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/314133324
Information-Centric Networking for the
Available online at www.sciencedirect.com
Information Sciences 468 (2018) 47–62
Jud et al. Child Adolesc Psychiatry Ment Health (2016) 10:17
Early adopters are assessing the value Elevator OEM and maintenance
SPECIAL REPORT
Grey Systems: Theory and Application
Transportation Research Part E xxx (2015) xxx–xxx
4.10 U–Th–Pb Geochronology
including upgrade options so that the products can be used
including upgrade options so that the products can be used
IEEE ELECTRON DEVICE LETTERS, VOL. 35, NO. 7, JULY 2014 711
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2767291, IEEE Internet of
Freshwater Biology (2014) 59, 2268–2277 doi:10.1111/fwb.12429
Orange Visual Programming
Orange Visual Programming Documentation, Release 3
Big Data and Strategic Intelligence
Accepted Manuscript
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
preserve most of the important statistics of the original data
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
A Clustering Routing Protocol for Energy Balance of Wireless
FX Standard Overview Background Organizations have long had to find
A Clustering Routing Protocol for Energy Balance of Wireless
Cloud-FogInteroperabilityinIoT-enabledHealthcareSolutions
Transport and Telecommunication Vol. 18, no. 3, 2017
RESEARCH ESSAY
SPECIAL ISSUE: BUSINESS INTELLIGENCE RESEARCH
Cloud-FogInteroperabilityinIoT-enabledHealthcareSolutions
Expert Systems with Applications 39 (2012) 11303–11311
State of Requirements Engineering Research 315
State of Requirements Engineering Research 315
Spark: ClusterComputingwithWorkingSets
About The Index
AA-Sort: A New Parallel Sorting Algorithm for Multi-Core SIMD Processors
AA-Sort: A New Parallel Sorting Algorithm for Multi-Core SIMD Processors
J Supercomput
Available online at www.sciencedirect.com
Accepted Manuscript
IOSR Journal of Applied Geology and Geophysics (IOSR-JAGG)
FOOD CHEMISTRY
it is very important to start by providing an overview
Chapter 7
Chapter 7
7.1 Detecting Phase Separation 309
IOSR Journal of Applied Geology and Geophysics (IOSR-JAGG)
The ultimate guide to becoming a database administratorWhat is
in addition to being responsible for turning the raw data
Typical DBA projectsSo what does a database administrator do
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2767291, IEEE Internet of
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2767291, IEEE Internet of
CHAPTER NINE
Expert Systems with Applications 39 (2012) 11303–11311
Advances in Information Security 70
Local Parallelization of Pleasingly Parallel Stream
FutureGenerationComputerSystems88(2018)173–190
Journal of Retailing and Consumer Services 40 (2018) 8–18
International Conference on Electronics, Communication and Aerospace Technology
tarjome maghale
tarjome maghale 2
DIGITALIZATION OF THE ENERGY
Available online at www.sciencedirect.com
Class FDP: User data protection
Class FDP: User data protection
Class FDP: User data protection
Class FDP: User data protection
Class FDP: User data protection
ISA TRANSACTIONS®
ISA TRANSACTIONS®
2008 by The American Society of Tropical Medicine and Hygiene
Mapping of mosquito breeding sites in malaria endemic areas in
Undefined 0 (0) 1 1
IEEE TRANSACTIONS ON COMPUTERS, VOL. c-21, NO. 4, APRIL 1972 353
Case Study
infrastructures, ranging from the distribution and
Lizarondo et al. BMC Health Services Research 2014, 14:572
Early Childhood Research Quarterly 35 (2016) 1–5
Pyro: A Spatial-Temporal Big-Data Storage System
CHAPTER THREE
WirelessBodyAreaNetwork(WBAN):ASurveyonReliability,
MANUSCRIPT
Received September 1, 2017, accepted October 8, 2017, date of publication October 11, 2017, date of current version February 1, 2018.
navidi8
in Figure 3-4. If 10 people share the original graphic, and each of those shares is shared again by
Building Management System architecture
Building Management System architecture
Building Management System architecture
GabrielOlivierBenjaminJaccard
Chapter 12: Overview of Medication Therapy Management Data Sets
table1
Fog Deployment Types How fog software and fog systems are
A COMPARISON OF FOG COMPUTING ANDRELATED COMPUTING PARADIGMS This section
Mobile Computing The advancement in fog and cloud computing is
Journal of Medical Systems (2018) 42:186
s data and always keep an integrated backup battery fully
Bulletin of Earth Sciences of Thailand
sensors
Wireless Pers Commun (2016) 89:93–118
Journal of Medical Systems (2018) 42:206
Global Food Security Index 2018
1
Journal of Biomedical Informatics 46 (2013) 541–562
1
ISSN 2464-4617(print) Computer Science Research Notes Poster's Proceedings
Cloud Computing and Grid Computing 360-Degree Compared
International Journal of Economics and Finance; Vol. 10, No. 2; 2018
546 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
546 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
Camera di Commercio di MILANO MONZA
Edge Detection Methods
1. Introduction
coMPleTe The AssessMenT survey
coMPleTe The AssessMenT survey
coMPleTe The AssessMenT survey
JKnowlEcon
The Complete Guide on Enterprise Data Analytics The business gets
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI-16)
Accepted Manuscript
AcceptedManuscript
17 1
8
Data Management in Fog Computing
Accepted Manuscript
Fog Data Analytics: A Taxonomy and Process Model Abstract
ترجمه
Accepted Manuscript
Accepted Manuscript
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
(IJACSA) International Journal of Advanced Computer Science and Applications,
1
Technology Is a Game Changer for the NBA As a
CLINICAL TRIALS WILEY SERIES IN PROBABILITY AND STATISTICS
CLINICAL TRIALS WILEY SERIES IN PROBABILITY AND STATISTICS
1
Soil Dynamics and Earthquake Engineering 122 (2019) 67–78
570 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
Available online at www.sciencedirect.com
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2683200, IEEE Internet of
J. Pers. Med. 2012, 2, 93-118; doi:10.3390/jpm2030093
The concepts of health and health care are moving towards
Methodology of the
and the social sciences have contributed to a dramatic expansion
and the social sciences have contributed to a dramatic expansion
and the social sciences have contributed to a dramatic expansion
Networked Organization Structure Feel flat and hierarchical at the same
01_BIM_Project_Execution_Planning_Guide_V2.1_(one-sided) A Building Information Model (BIM) is “a digital representation of physical and functional characteristics
Downloaded from http://phe.oxfordjournals.org/ at University of Tasmania Library on January 9, 2015
while ambient air pollution has been identified among different risk
Downloaded from http://iranpaper.ir
یواک هداد یاهدربراک و اه کینکت یسررب
Computer Methods and Programs in Biomedicine 175 (2019) 151–161
Contract on Data Processing as Joint Controllers in Accordance with Article 26 of the General Data Protection Regulation (GDPR) between Deutsche Forschungsgemeinschaft e. V. (DFG)
Contract on Data Processing as Joint Controllers in Accordance with Article 26 of the General Data Protection Regulation (GDPR) between Deutsche Forschungsgemeinschaft e. V. (DFG)
EMD decomposes a signal in time domain into separate IntrinsicMode
YOUR NAS DESERVES A PACK LEADER IronWolf is Way Ahead
n
GUIDE FOR AUTHORS
. 2017, Culicinae, Bashagard.doc
GEO-MODSIM: SPATIAL DECISION SUPPORT SYSTEM FOR
1. Socio - economic drivers of Energy at the horizon 2020
J Supercomput
Data Leakage Prevention
International Journal of Computer Sciences and Engineering Open Access
AVTM82318
Empirical results indicate that SVM modelprovides more accurate results than
Using Blockchains to Strengthen the
Verification line
8 channel thermocouple data logger 8 channel thermocouple data logger
Product data sheet 21.610
24.Cosmologicalparameters 1
Page not found ERROR Suggestions Verify that the link is
1. Introduction
5004
5004-1
6.3 Benchmarking – Helping Utilities to will probably be used by a utility using the benchmarking
AcceptedManuscript
Design of Personnel Big Data Management System Based on
Design of Personnel Big Data Management System Based on
Using blockchains to enable Big Data analysis of
not only the digital world but alsoour everyday lives and
not only the digital world but alsoour everyday lives and
Blockchain Solutions for Big Data Challenges
The popularity of Blockchain technology and thehuge extent of its
Big Graph Analytics: The State of the Art
CHAPTER10
Big Graph Analytics: The State of the Art
CHAPTER10
JournalofNetworkandComputerApplications128(2019)90–104
JournalofNetworkandComputerApplications128(2019)90–104
FUSE: Fusing STT-MRAM into GPUs to Alleviate Off-Chip Memory Access
s Latitude Longitude Approval Status Entry Notes Import Entries Export
How Wonderbly uses data and personalisation to create a magical
Standard contractual clauses for the transfer of personal data from the Community to third countries (controller to controller transfers) Data transfer agreement between Deutsche Forschungsgemeinschaft e.V. (DFG)
Introduction to Qualitative Research Methods Arthur Cropley University of Hamburg
Web-Scale Workflow
Building Information Exchange
Schembri, Adam, Trevor Johnston, Jordan Fenlon & Kearsy Cormier. under review. Documentary and
2015 27th International Symposium on Computer Architecture and High Performance Computing
B IM Implementation
ASSESSING TEAM CAPABILITIES
11
31
BIM-Based Enterprise Workfl ow
62
61
41
December 1, 2019 Distributed Systems
November 29, 2019 Distributed Systems
December 1, 2019 Distributed Systems
November 29, 2019 Distributed Systems
December 1, 2019 Distributed Systems
10 The Language of
DESIGN CONSIDERATIONS FOR ORTHOPAEDIC IMPLANTS USING ADDITIVE
DESIGN CONSIDERATIONS FOR ORTHOPAEDIC IMPLANTS USING ADDITIVE
DESIGN CONSIDERATIONS FOR ORTHOPAEDIC IMPLANTS USING ADDITIVE
Lexical and Phonological Tasks 95
176 Sentence-Based Tasks
QlikView: Advanced Data
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/330875530
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/330875530
healthcare
healthcare
Research on Office Chair Based on Modern
Internet of Things 1–2 (2018) 1–13
EMC WHITE PAPER
Contents listsavailableatScienceDirect
sustainability
Contents listsavailableatScienceDirect
Bayesian Face Revisited: A Joint Formulation
Probabilistic Linear Discriminant Analysis
Bayesian Face Revisited: A Joint Formulation
Probabilistic Linear Discriminant Analysis
Improving SIEM for Critical SCADA Water
Probabilistic Linear Discriminant Analysis
International Journal of Recent Technology and Engineering (IJRTE)
International Journal of Recent Technology and Engineering (IJRTE)
International Journal of Recent Technology and Engineering (IJRTE)
International Journal of Recent Technology and Engineering (IJRTE)
International Journal of Recent Technology and Engineering (IJRTE)
EMC WHITE PAPER
Global surveillance for COVID-19 disease
Advances in Science, Technology & Innovation
DHS Science and Technology Directorate
DHS Science and Technology Directorate
DHS Science and Technology Directorate
DHS Science and Technology Directorate
DHS Science and Technology Directorate
DHS Science and Technology Directorate
DHS Science and Technology Directorate
DHS Science and Technology Directorate
DHS Science and Technology Directorate
DHS Science and Technology Directorate
Transitioned
insident management
MAINEFFECTSAND INTERACTION EFFECTS Researchers havefocused more on testing main effectsthan
MAINEFFECTSAND INTERACTIONEFFECTS Researchers havefocusedmore on testing main effectsthan interactioneffects inregressionandpath
MAINEFFECTSAND INTERACTIONEFFECTS Researchers havefocusedmore on testing main effectsthan interactioneffects inregressionandpath
Probabilistic Linear Discriminant Analysis
A Survey of Security Tools for the Industrial Control System Environment
1
Appl. Sci. 2017, 7, 1069 5of22
Appl. Sci. 2017, 7, 1069 5of22
KNOWLEDGE SHARING SYSTEMS: SYSTEMS THAT ORGANIZE AND DISTRIBUTE KNOWLEDGE 1
tracking technology enables cognitive researchers to capture vast amounts of
Software Architecture for Automating Cognitive
Software Architecture for Automating Cognitive
SimonKlau,FelixSchönbrodt,ChiragPatel,JohnIoannidis,
Abstract Researchers have great flexibility in the analysis of observational
Software Architecture for Automating Cognitive
Software Architecture for Automating Cognitive
Statement of Purpose
Section II
پایش امنیت سیستم های کنترل صنعتی
Kim Falk
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/316958416
Suicide in Iran: The Facts and the Figures from Nationwide
Iran J Psychiatry 2017; 12:1: 73-77
ETHERNET SWITCH VULNERABILITY MAC flooding is an attack that manipulates
The ability to access the raw packets on a network
NTT DATA welcomed Dell Services
c h a p t e r 13
U n i t � 2 � � � � � � � � � � � � � � � � C o m p u t e r � A r c h i t e c t u r e s �
U n i t � 3 � � � � � � � � C o m p u t e r � A p p l i c a t i o n s �
Automation in Construction 110 (2020) 103041
Chapter 3
Chapter 3
Chapter 9
Journal of Advertising
Islamic Republic of Iran
Islamic Republic of Iran
InternetofThings InternetofThings
The Big Bang is the moment that space and time
Project based learning is the methodology in which projects drive
st
st
Project based learning is the methodology in which projects drive
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSG.2018.2817515, IEEE
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSG.2018.2817515, IEEE
SPECIALSECTIONONHUMAN-CENTEREDSMARTSYSTEMSANDTECHNOLOGIES
many organizations are beginning to build their own storage system
7
5 Reasons Why IT Professionals Choose Fiber Optic Cables Instead
User Centered Design Methods
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/304188469
Information Processing Letters 116 (2016) 1–14
what they mean and how they are relevant to network
Types of Network Topology Network Topology is the schematic description
INTERNATIONAL JOURNAL OF INDUSTRIAL
center
Data centers undergo a wide variety of audits in any
Web-based supplementary material forAnadaptivespatio-
is a simulated cyber attack against your computer system to
is a common attack vector that uses malicious SQL code
175
attack What is MITM attack A man in the middle
The present invention is generally directed to method and systems
The present invention is generally directed to method and systems
شبکه
to increase the throughput of data and the number of
attack that could take down your data center Scour the
Japan Wants to Take the Heat Off Data Centers With
5 steps to making IoT networks more secure Internet of
Sci Eng Ethics (2018) 24:905–925
Sci Eng Ethics (2018) 24:905–925
شبکه های مبتنی به سیسکو و بحث لینوکس
Data Leakage Defined Data leakage is the unauthorized transmission of
1_Code : 20020156920
1 Introduction
A Deep Learning Pipeline for Classifying
International Journal of Production Economics xxx (xxxx) xxx–xxx
2019 IEEE 5th World Forum on Internet of Things (WF-IoT)
What is data storage going to do to improve your
What is data storage going to do to improve your
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2749401, IEEE Internet of
International Journal of Industrial Ergonomics 68 (2018) 149–164
How to Benefit from a Layered Security Approach with Fortinet
“Tony is not only a renowned expert of the financial industry of his home ecosystem but he
Shojaei and Flood Visualization in Engineering (2017) 5:11
This page intentionally left blank f ffirs.indd i firs.indd i 0 01/02/11 8:56 PM 1/02/11 8:56 PM f ffirs.indd ii firs.indd ii 0 01/02/11 8:56 PM 1/02/11 8:56 PM SIMHA R. MAGAL JEFFREY WORD
72 IEEE REVIEWS IN BIOMEDICAL ENGINEERING, VOL. 12, 2019
Computer Network Architecture Computer Network Architecture is defined as the
Unit 7
Knowl Inf Syst (2017) 51:339–367
Downloaded from https://iranpaper.ir
Downloaded from https://iranpaper.ir
GBE
Low-PowerWirelessBus
2019 IEEE International Conference on Artificial Intelligence Testing (AITest)
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Apache CouchDB is an Open Source database management software published
Apache CouchDB is an Open Source database management software published
Apache CouchDB is an Open Source database management software published
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/339240839
Introduction Covid-19 is having important and profound effects in several spheres of our society. It has
A.TheEmployee’sRighttoPrivacy
A.TheEmployee
5.8 LIST OF 5G AND GENERIC THREATS
Unauthorised activities/network intrusions
- Legal - Business applications
This threat arises when an attacker scans the physical memory
This threat relatesto the exploitation of specific vulnerabilities of Data
DoS is a threat categorised under Nefarious Activity and Abuse
38 SECTION 1: INTRODUCTION TO MARKETING RESEARCH
D i g it al B u i ld in g B loc k s
Growth and Characterization of BPO Single Crystals
انتقال داده Software Architecture Solution Based on SDN for an
Annexes
The first line tells you that the source code is
integrates various backup applications to safeguardyour important data on any
DiskStation DS220+
DiskStation DS220+
DiskStation DS220+
DiskStation DS220+
Lebanon Financial Overview The prudential regulation in Lebanon seems still
Lebanon Financial Overview The prudential regulation in Lebanon seems still
Lebanon Financial Overview The prudential regulation in Lebanon seems still
Lebanon Financial Overview The prudential regulation in Lebanon seems still
Advances in Intelligent Systems and Computing 1042
Abstract This paper presents a new intelligent monitoring and event
chapter
Copyright © 2018 SHRM. All rights reserved.
Growth and Characterization of BPO Single Crystals
Downloaded from https://iranpaper.ir
www.nature.com/scientificreports
www.nature.com/scientificreports
CHAPTER
consists ofgradual process of decreasing volume and quality of neuron
Collecting Data
21
Materials Today: Proceedings xxx (xxxx) xxx
© The British Computer Society 2018. All rights reserved.
IMPORTANCE Migraineisthesecondleadingcauseofdisabilityworldwide.Mostpatientswith
IMPORTANCE Migraineisthesecondleadingcauseofdisabilityworldwide.Mostpatientswith
IMPORTANCE Migraineisthesecondleadingcauseofdisabilityworldwide.Mostpatientswith
Health System Based on CloudComputing to Monitor the Vital Signs
Expert Systems With Applications 171 (2021) 114637
Advances in Science, Technology & Innovation
Praise for Quantum Marketing
Praise for Quantum Marketing
Raja offers extraordinary insights and perspectives and pragmatic pathways to
Hindawi Publishing Corporation
A Av vai aillabl able onl e onliine a ne att www www..s sc cie ien nc ce ed dir ire ec ctt..c co om m
Downloaded from https://iranpaper.ir
Downloaded from https://iranpaper.ir
The current issue and full text archive of this journal is available on Emerald Insight at:
0 and its main enabling information and communication technologies are
Machine Learning Techniques and A Case Study for Intelligent Wireless
Review on OwnCloud Features for Private Cloud Data Center abstract
wireless sensor networks are developing rapidly with the support of
SecureDataAggregationinWirelessSensorNetworks: ASurvey
SecureDataAggregationinWirelessSensorNetworks: ASurvey
SecureDataAggregationinWirelessSensorNetworks: ASurvey
SecureDataAggregationinWirelessSensorNetworks: ASurvey
1
2
s work on bacterial infectious diseases via integration of vital
2. COURSE DESCRIPTION
EN
من در سال شهریور 1387 در رشته مهندسی سخت افزار
من در سال شهریور 1387 در رشته مهندسی سخت افزار
A Principled Technologies report: Hands-on testing. Real-world results.
Privacy Policy for Aghaye Melk This Privacy Policy describes Our
FACULDADE DE ENGENHARIA DA UNIVERSIDADE DO PORTO
FACULDADE DE ENGENHARIA DA UNIVERSIDADE DO PORTO
� Spoofing/Relay Attack Spoofing/Relay attacks occur
The gradual increase in electricity demand causes a heavy burden
Smart Cities and Inclusive Growth
A true NGFW needs to provide the security tools required
Cloud and OT Environments Fortinet took the virtual stage as
A true NGFW needs to provide the security tools required
www.nature.com/scientificreports
is intrusive software that is designed to cause damage to
the attacker sends a decryption key to restore access to
Journal Pre-proof
Journal Pre-proof
Downloaded from https://iranpaper.ir
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2021.3092185, IEEE Internet of
Downloaded from https://iranpaper.ir
Received: 30 June 2020 Revised: 6 August 2020 Accepted: 31 August 2020
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2021.3097379, IEEE Internet of
Downloaded from https://iranpaper.ir
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JSEN.2021.3060953, IEEE Sensors
Available online at www.sciencedirect.com
Downloaded from https://iranpaper.ir
Downloaded from https://iranpaper.ir
Downloaded from https://iranpaper.ir
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JSAC.2019.2904348, IEEE Journal
Downloaded from https://iranpaper.ir
Downloaded from https://iranpaper.ir
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2020.3037194, IEEE Internet of
Downloaded from https://iranpaper.ir
Downloaded from https://iranpaper.ir
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMC.2020.2994639, IEEE
Computer Networks 197 (2021) 108327
explain how to find and exploit various kinds of SQL
2010 IEEE International Conference on Granular Computing
growth has proved elusive in recent years with many losing
Parametric Insurance Use Growing with Weather Data APIs s volatile
is data forwarding technology that increases the speed and controls
Computers and Electrical Engineering 81 (2020) 106522
International Journal of Greenhouse Gas Control 98 (2020) 103042
As one of the unfortunate benefactors from the changing business
Ad Hoc Networks 124 (2022) 102721
Computer Communications 170 (2021) 200–208
XY XY
International Journal of
Big Data
Electrical Power and Energy S ystems 125 (2021) 106515
Downloaded from https://academic.oup.com/ijnp/article/23/4/230/5658435 by guest on 15 November 2021
Downloaded from https://academic.oup.com/ijnp/article/23/4/230/5658435 by guest on 15 November 2021
Introduction
Ad Hoc Networks 124 (2022) 102721
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/295906974
11 A B S T R A C T In
11 A B S T R A C T In
A server works through a simple way of request and
Eight Ways to Save on Data Center Costs Whether you
IP models are the standard references for the communication that
TheeXpressDataPath:FastProgrammablePacketProcessingin
IEEEENGINEERINGINMEDICINEANDBIOLOGYSOCIETYSECTION
IEEEENGINEERINGINMEDICINEANDBIOLOGYSOCIETYSECTION
Computers & Industrial Engineering 158 (2021) 107452
A network switch is an invaluable tool in many businesses
Computers and Electrical Engineering 71 (2018) 28–42
Computers and Electrical Engineering 71 (2018) 28–42
Proceedings of the 2020 Winter Simulation Conference
st
A First-Order Superscalar Processor Model
Journal of trends in Computer Science and Smart technology (TCSST) (2020)
computers
This data could include anything from email addresses to financial
and insider threat management are both top priorities for security
This data could include anything from email addresses to financial
and insider threat management are both top priorities for security
dozens of stakeholders will send thousands of emails containing personnel
Chapter 802.11ax: High
Chapter 802.11ax: High
Thad Wasklewicz is an Associate Professor in the Department of
Thad Wasklewicz is an Associate Professor in the Department of
Alexandria Engineering Journal (2022) 61, 147–158
Statement of Purpose – Siminsadat Mirian
ABSTRACT:
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/3044068
Functional Implementation Techniques for CPU Cache Memories
ABSTRACT:
Materials Today: Proceedings xxx (xxxx) xxx
Journal of Information Security and Applications 48 (2019) 102369
Journal of Information Security and Applications 48 (2019) 102369
IET COMPUTING SERIES 40
Chapter 1
Chapter 1
IET COMPUTING SERIES 40
IET COMPUTING SERIES 40
IET COMPUTING SERIES 40
Chapter 1
IET COMPUTING SERIES 40
Side Channel Security of Smart Meter Data
CHAPTER 5
CHAPTER 5
CHAPTER 5
10.5 Human Variability 195
Heliyon7(2021)e08448
16 Lesion Studies
PLOS ONE
PLOS ONE
PLOS ONE
PLOS ONE
PLOS ONE
PLOS ONE
PLOS ONE
PLOS ONE
PLOS ONE
PLOS ONE
Sustainable Production and Consumption 25 (2021) 217–233
Sustainable Production and Consumption 25 (2021) 217–233
88 PART 1 • SYSTEMS ANALYSIS FUNDAMENTALS
International Journal of
International Journal of
Chapter 13
Mining
88 PART 1 • SYSTEMS ANALYSIS FUNDAMENTALS
88 PART 1 • SYSTEMS ANALYSIS FUNDAMENTALS
FPGA Simulation of AD Converter by using Giga Hertz
FPGA Implementation of Peak Detector, 64 Bit BCD Counter
FPGA Implementation of Peak Detector, 64 Bit BCD Counter
Chapter 13
Hindawi
Computer Communications 187 (2022) 164–171
A Novel Stock Trading Model based on Reinforcement Learning and
A Novel Stock Trading Model based on Reinforcement Learning and
TURKISHPHARMACEUTICALSTRACK&TRACESYSTEM
Chapter 6 Foundations of Business Intelligence: Databases and Information Management 257
Chapter 6 Foundations of Business Intelligence: Databases and Information Management 257
BAE SYSTEMS
Expert Systems with Applications 38 (2011) 10875–10881
Expert Systems with Applications 38 (2011) 10875–10881
What is the potential role of the computer in data
What is the potential role of the computer in data
CH APTER
CH APTER
CH APTER
Computers in Human Behavior 121 (2021) 106777
Computers in Human Behavior 121 (2021) 106777
Computers in Human Behavior 121 (2021) 106777
CH APTER
CH APTER
CH APTER
CH APTER
CH APTER
CH APTER
CH APTER
CH APTER
CH APTER
CH APTER
H6746-Ch11.qxd 8/3/05 9:35 AM Page 235
صنعت 4.0 ( هوش مصنوعی) و مدیریت دانش
EnergyNet
Temperature
The current issue and full text archive of this journal is available on Emerald Insight at:
White Paper v1.04.01
Introduction to Modeling Cognitive Processes
I must first thank Almighty God for bringing me to
Part I: General Network Design
potential for higher rates Stocks rose Wednesday as investors weighed
Part I: General Network Design
INTERNATIONAL ISO
Contents
Contents
Practical Implications and the Impact on Society Abstract The term
Vol. 02, No. 01, pp. 10 – 19 (2021)
Crystal: Software-Defined Storage for
Operations Management Research
FutureGenerationComputerSystems136(2022)67–83
This is an extended chapter based on qualitative methods for
Received September 23, 2020, accepted October 4, 2020, date of publication October 8, 2020, date of current version October 21, 2020.
Received September 23, 2020, accepted October 4, 2020, date of publication October 8, 2020, date of current version October 21, 2020.
Received September 23, 2020, accepted October 4, 2020, date of publication October 8, 2020, date of current version October 21, 2020.
Received September 23, 2020, accepted October 4, 2020, date of publication October 8, 2020, date of current version October 21, 2020.
Received September 23, 2020, accepted October 4, 2020, date of publication October 8, 2020, date of current version October 21, 2020.
International Journal of River Basin Management
436 CHAPTER 18 eSCIENCE AND BIG DATA WORKFLOWS IN CLOUDS
W Western Michigan estern Michigan Univ University ersity
Research Title Designing a Model to Increase the Quality of
nutrients
W Western Michigan estern Michigan Univ University ersity
A Survey on Vehicular Fog Computing:
Advanced Materials Research Vols. 328-330 (2011) pp 2181-2184
AIOps: A Multivocal Literature Review
Methodology This research is based on a quantitative study among
Methodology This research is based on a quantitative study among
AIOps: A Multivocal Literature Review
W Western Michigan estern Michigan Univ University ersity
Table 4 Related works overview
Journal of Financial Economics 145 (2022) 527–552
Journal of Financial Economics 145 (2022) 527–552
Decolonizing Autoethnography 20
Advanced Engineering Informatics 47 (2021) 101226
BIRMINGHAM—MUMBAI
Received 11 June 2022, accepted 6 August 2022, date of publication 16 August 2022, date of current version 22 August 2022.
Expert Systems With Applications 210 (2022) 118477
Doc 9859
ReceivedSeptember11,2021,acceptedSeptember28,2021,dateofpublicationOctober4,2021,dateofcurrentversionOctober13,2021.
SLAC-PUB-5724
1 Potential effects of conflict of interest on research and
Potential effects of conflict of interest on research and public
Potential effects of conflict of interest on research and public
Decision Analytics Journal 7 (2023) 100233
VII New Sources for Qualitative Data This chapter points out
He generated as muchgrounded theory as he could within the
the general approaches to the analysis of qualitative data are
the general approaches to the analysis of qualitative data are
Direct Formulation of Formal Theory Formal theory formulated directly from
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/359255698
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/359255698
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/359255698
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/369375165
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/359255698
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/369375165
THE IMPACT OF ELECTRONIC DATA INTERCHANGE ON ACCOUNTING SYSTEMS
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/359255698
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/359255698
THE IMPACT OF ELECTRONIC DATA INTERCHANGE ON ACCOUNTING SYSTEMS
IBM Security
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/369375165
Paper—Intelligent Digital Banking Technology and Architecture: A Systematic Literature Review
Framing a winning
Hindawi
Kohli et al. Brain Informatics (2022) 9:16
Journal of Ambient Intelligence and Humanized Computing
Big Data Research 27 (2022) 100304
Chapter 7
Chapter 7
Chapter 7
Chapter 7
Chapter 5
Chapter 5
Chapter 5
Chapter 7
Chapter 5
International Journal of Information Management Data Insights 3 (2023) 100203
International Journal of Global
fractal and fractional
fractal and fractional
fractal and fractional
fractal and fractional
SUSTAINABLE AND RESILIENT FINANCE OECD Business and Finance Outlook 2020
African Journal of Business Management Vol. 4(7), pp. 1372-1380, 4 July, 2010
African Journal of Business Management Vol. 4(7), pp. 1372-1380, 4 July, 2010
chapter 9
Hindawi
Kohli et al. Brain Informatics (2022) 9:16
Journal of Ambient Intelligence and Humanized Computing
Downloaded from https://iranpaper.ir
Downloaded from https://iranpaper.ir
Downloaded from https://iranpaper.ir
AI & SOCIETY (2023) 38:1627–1638
OW ASP Mobile Application Security T esting Guide v1.6.0
CAF has the characteristics of a wicked problem that will
Operations primacy as a basic assumption is understandable within the CAF’s
Executive summary
please install and activate wpDataTables to be able to generate
Compendium on Enterprise Resource Planning :باتک مان
L a r g e - Sc a l e G r a p h P r o c e s s i n g S y s t e m s
ﯽھ وژﭘ م اد ﻗا
CHAPTER 18
392 PART FIVE RESEARCH METHODS
392 PART FIVE RESEARCH METHODS
392 PART FIVE RESEARCH METHODS
SPA
SPA
Downloaded from http://direct.mit.edu/tacl/article-pdf/doi/10.1162/tacl_a_00618/2200655/tacl_a_00618.pdf by guest on 29 September 2024
International Journal of Management & Entrepreneurship Research, Volume 6, Issue 3, March 2024
English for Students of Statistics
International Journal of Information Management 57 (2021) 102304
Downloaded from https://iranpaper.ir
9 The economics and politics of data and its legal
AnnualReviewofFinancialEconomics