iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ monitoring
جزئیات خدمات ترجمه در ترجمه تخصصی
computing
radiation
radiation
data
sensor
data
data
www.ietdl.org
www.ietdl.org
www.ietdl.org
www.ietdl.org
Page 1 of 9
Page 1 of 9
Using numerical protection relays as asset management tools
Page 1 of 9
Using numerical protection relays as asset management tools
Advances in Engineering Software 71 (2014) 34–45
146 Condition monitoring of rotating electrical machines
Chapter 18
business and civil society players that seek to bring about
Sensing and Sensor Fundamentals Sensors utilize a wide spectrum of
Ad Hoc Networks 11 (2013) 1237–1253
Ad Hoc Networks 11 (2013) 1237–1253
business and civil society players that seek to bring about
Lares: An Architecture for Secure Active Monitoring Using Virtualization
Payne Martim Carbone Monirul Sharif Wenke Lee School of Computer
Lares: An Architecture for Secure Active Monitoring Using Virtualization
Part 4: Understanding Basic Concepts | 1 Architecture and User Interfaces
Part 4: Understanding Basic Concepts | 1 Architecture and User Interfaces
Available online at www.sciencedirect.com
FutureGenerationComputerSystems29(2013)1645–1660
2011 Third International Conference on Computational Intelligence, Modelling & Simulation
State of Vermont Agency of Human Services
International Journal of Engineering and Advanced Technology (IJEAT)
زرواشک یاقآ همجرت
Rural Development 2007-2013
Constructing a Remote Monitoring and Control
Monitoring and
IET POWER AND ENERGY SERIES 56
High-PerformanceHardwareMonitorstoProtectNetwork
Some Preliminary ResultsIntroduction The need for simple and reliable
information sets and decisions for a large sample of private
and helps avoid firing a CEO for bad luck or
Monitoring Managers
؟Monitoring Managers: Does It Matter
information sets and decisions for a large sample of private
TECHNOLOGY AND APPLICATION OF STRUCTURAL
TECHNOLOGY AND APPLICATION OF STRUCTURAL
IN SEARCH OF A DEFINITION 79 Knowledge Versus Control Distinction
Ground Penetrating Radar Ground penetrating radar has seen a significant
A2B08: Committee on Highway Traffic Monitoring
International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Volume XXXIX-B5, 2012
GUIDELINES ON SAMPLING
GUIDELINES ON SAMPLING STRATEGY AND SUBMISSION OF TOXIC SUBSTANCES MONITORING
14 G. Aceto et al./Computer Networks xxx (2013) xxx–xxx
Part 5 Examples of Instrumentation Applications The goal of Part
health and nutrition monitoring will achieve previously unthinkable breadth and
13. HEALTH AND NUTRITION MONITORING WILL
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Grid: An Architectural Pattern
Analyses ZDM 2006 Vol. 38 (2)
Analyses ZDM 2006 Vol. 38 (2)
Analyses ZDM 2006 Vol. 38 (2)
*Manuscript
3. WSA - greement and WSAG4J
3. WSA - greement and WSAG4J
3. WSA - greement and WSAG4J
Solarwinds 3
13
The intelligent home appliance monitoring is the mainstream development of
Stellenbosch University http://scholar.sun.ac.za
IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 21, NO. 3, JULY 2006 1641
PHARMACEUTICAL INSPECTION CONVENTION
PHARMACEUTICAL INSPECTION CONVENTION
J. Funct. Biomater. 2015, 6, 204-221; doi:10.3390/jfb6020204
JournalofCorporateFinance30(2015)1–10
JournalofCorporateFinance30(2015)1–10
2. Wireless sensor network applications in smart grid
Retaining structures
2.1.2.مدیریت
Retaining structures
Pipeline Intrusion & Leak Detection Monitoring System
They have given rise to a number of more or
The Journal of Systemsand Software110 (2015) 101–121
Intelligent Traffic Information System Based on Integration of Internet of
based traffic monitoring and summarises the possible benefits in Intelligent
Journal of Process Control 37 (2016) 34–45
Intelligent Traffic Information System Based on Integration of Internet of
based traffic monitoring and summarises the possible benefits in Intelligent
Preventing Faults: Fault Monitoringand Proactive Fault Tolerance in Cloud
Preventing Faults: Fault Monitoringand Proactive Fault Tolerance in Cloud
Preventing Faults: Fault Monitoringand Proactive Fault Tolerance in Cloud
Preventing Faults: Fault Monitoringand Proactive Fault Tolerance in Cloud
Preventing Faults: Fault Monitoringand Proactive Fault Tolerance in Cloud
Preventing Faults: Fault Monitoringand Proactive Fault Tolerance in Cloud
Preventing Faults: Fault Monitoringand Proactive Fault Tolerance in Cloud
Database
based traffic monitoring and summarises the possible benefits in Intelligent
based traffic monitoring and summarises the possible benefits in Intelligent
Big Data Research 3 (2016) 10–23
New methodologies to support structural monitoring of a
policies and plansplanning details of production activities in terms of
New methodologies to support structural monitoring of a
a conscious attempt to reconcile conflicting values highlights a key
JID:BDR AID:32 /FLA [m5G; v1.168; Prn:26/11/2015; 15:54] P.1 (1-14)
+Model
Available online at www.sciencedirect.com
2.1 Sensor Technologies for Water Quality Monitoring
policies and plans Planning details of production activities in terms
Sensor Placement in Municipal Water Networkswith Temporal Integer Programming Models
انواع سنسورهای حرارتی کابلی و اساس عملکرد آنها
On the Modelling and Monitoring of General Inflated Poisson Processes
*** IN SUBMISSION ***
Psychological Review
Psychological Review
Psychological Review
Psychological Review
83. The research community has an important contribution to make in education development in
c o m p u t e r m e t h o d s a n d p r o g r a m s i n b i o m e d i c i n e 1 3 0 ( 2 0 1 6 ) 154–161
2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN)
de Castro e Lima Baesse et al. BMC Medical Education (2016) 16:213
ISSN 2409-26 65
Majority Support of Shareholders, Monitoring Incentive,
Critical Perspectives on Accounting 38 (2016) 34–53
Critical Perspectives on Accounting 38 (2016) 34–53
2016 IEEE World Congress on Services Computing
this usage draws a useful distinction between intended and unintended
12
634 BOTVINICK, BRAVER, BARCH, CARTER, AND COHEN
Abstrack Network traffic monitoring and analysis is of theoretical and practical significance for optimizing network resource and improving user experience.
The consequent compaction of sedimentary layers at these locations is
c o m p u t e r m e t h o d s a n d p r o g r a m s i n b i o m e d i c i n e 1 3 0 ( 2 0 1 6 ) 154–161
tCloud computing and the Internet of Things are the two
Monitoring the QoS of Web Services using SLAs
26
12
12
Case Study
Cloud Monitoring
Configuration
Configuration
An Oracle White Paper
Effects on Jealousy and Relationship Happiness Abstract On social network
Sensors 2015, 15 11313
AcceptedManuscript
Paper—Design and Realization of Greenhouse Sensor Intelligent Management System Based on Internet…
Paper—Design and Realization of Greenhouse Sensor Intelligent Management System Based on Internet…
Pharmacists can help identify patients with diabetes through screening and
2011 Workshops of International Conference on Advanced Information Networking and Applications
Testo helps you to fulfil your HACCP requirements and hygiene
Testo HACCP
Testo helps you to fulfill your HACCP requirements and hygiene
Testo helps you to fulfill your HACCP requirements and hygiene
The monitoring system testo 160 supports you in protecting works
OpenNetMon: Network Monitoring in OpenFlow
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/314133324
China Journal of Accounting Research xxx (2018) xxx–xxx
China Journal of Accounting Research xxx (2018) xxx–xxx
China Journal of Accounting Research xxx (2018) xxx–xxx
China Journal of Accounting Research xxx (2018) xxx–xxx
China Journal of Accounting Research xxx (2018) xxx–xxx
5 Reasons to Consider a Power Monitoring System A power
Statistical Control Charts Based on the model proposed in this
108 Lexical and Phonological Tasks
Lexical and Phonological Tasks 111
112 Lexical and Phonological Tasks
Sentence-Based Tasks 195
Sentence-Based Tasks 197
Sentence-Based Tasks 201
SERIOUS REASONS NOT TO TRUST HYIP MONITOR On the basis
HYIP MONITOR REFBACK HOW TO NOT FALL FOR TRICKS You
DHS Science and Technology Directorate
BATTLE-TESTED INDUSTRIAL CYBERSECURITY
BATTLE-TESTED INDUSTRIAL CYBERSECURITY
پایش امنیت سیستم های کنترل صنعتی
Journal of Cellular & Molecular Anesthesia (JCMA)
Journal of Cellular & Molecular Anesthesia (JCMA)
Journal of trends in Computer Science and Smart technology (TCSST) (2020)
Building the Foundation 17
Building the Foundation 17
Bioengineered