iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ networks
جزئیات خدمات ترجمه در ترجمه تخصصی
network
تخصصی
node
energy
networks
network
network
network
ability
ability
caching
routing
[]
systems
communication
social
abstract
1372 IEEETRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL.61,NO.3,MARCH 2012
Available online at www.sciencedirect.com
INVITED
Ad Hoc Networks xxx (2012) xxx–xxx
Ad Hoc Networks xxx (2012) xxx–xxx
AKYILDIZ LAYOUT_Layout 1 10/11/12 3:17 PM Page 12
AKYILDIZ LAYOUT_Layout 1 10/11/12 3:17 PM Page 12
WIRELESS SENSOR
ABSTRACT Wireless networks have displaced the well established and widely
ABSTRACT Wireless networks have displaced the well established and widely
Mobile users can roam freelyacross a campus without changing IP
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Suvarna Patil et al Int. Journal of Engineering Research and Applications www.ijera.com
Network Working Group Barry M. Leiner
1017 RIACS August 1987 Network Requirements for Scientific Research Internet
TowardsaGameTheoreticFormulationofClustering
The Journal of China
The Journal of China
FEDERAL RESERVE BANK OF NEW YORK
A Survey of Middleware for Sensor Network and Challenges
The introduction of open and more flexible business models in
718 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 2, SECOND QUARTER 2013
The Second International Conference on Emerging Security Information, Systems and Technologies The Second International Conference on Emerging Security Information, Systems and Technologies
To appear in Smart Environments: Technologies, Protocols, and Applications
2.3.4. Commercially Available Wireless Sensor Systems Many commercially available wireless communications nodes are available including Lynx Technologies, and various Bluetooth kits, including the Casira devices from Cambridge Silicon Radio, CSR.
Many commercially available wireless communications nodes are available including Lynx Technologies, and various Bluetooth kits, including the Casira devices from Cambridge Silicon Radio, CSR.
A wide range of applications has been proposed for sensor
Ad Hoc Networks 11 (2013) 846–860
Ad Hoc Networks 11 (2013) 1237–1253
Ad Hoc Networks 11 (2013) 1237–1253
Ad Hoc Networks 11 (2013) 846–860
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING
22 CHAPTER 1 / INTRODUCTION
22 CHAPTER 1 / INTRODUCTION
Abstract Wireline telecommunications infrastructure in the customer access network or
ISSN 2090-4304
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
Open access in next generation access (NGA) networks
Danish municipalities are not permitted to provide broadband services directly. However, privately-
IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.5, May 2012 21
IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 19, NO. 8, AUGUST 2008 1329
IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 19, NO. 8, AUGUST 2008 1329
Sensors 2012, 12, 12606-12633; doi:10.3390/s120912606
International Journal of Accounting Information Systems 14 (2013) 127–137
An emerging way to sell and buy display ads on
Computer Networks 58 (2014) 254–283
IEEE 802 Standardization on Heterogeneous
IEEE 802 Standardization on Heterogeneous
Wireless Pers Commun (2014) 78:1683-1697
Social Science & Medicine 123 (2014) 90e95
Distributed Data Mining in Peer-to-Peer Networks
CONNECTIONS 25(1): 49-61
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
the order throughput capacity of wireless communication networks has been
518 IEEE SYSTEMS JOURNAL, VOL. 5, NO. 4, DECEMBER 2011
2014 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP)
2014 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP)
2014 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP)
Challenges and open research problems of the WSN solutions for
Technological Forecasting & Social Change 79 (2012) 419–428
2010 Second WRI Global Congress on Intelligent Systems 2010 Second
ARTICLE IN PRESS
To appear in Smart Environments: Technologies, Protocols, and Applications
COMCOM 5017 No. of Pages 13, Model 5G
Berntenis and Ebeling BMC Bioinformatics 2013, 14:361
110 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 16, NO. 1, FIRST QUARTER 2014
Available online at www.sciencedirect.com
FRAUD DETECTION IN COMMUNICATIONS NETWORKS USING NEURAL AND
Data Mining in Financial Application Dongsong Zhang and Lina Zhou
Constructing a Remote Monitoring and Control
182 IEEETRANSACTIONSONINDUSTRIALINFORMATICS,VOL.9,NO.1,FEBRUARY2013
182 IEEETRANSACTIONSONINDUSTRIALINFORMATICS,VOL.9,NO.1,FEBRUARY2013
182
182
1960 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 4, FOURTH QUARTER 2013
SPECTRUM OCCUPATION AND PERSPECTIVES MILLIMETER BAND UTILIZATION
Information Sciences 265 (2014) 23–35
The Design Philosophy of the DARPA Internet Protocols
OpenFlow: EnablingInnovationinCampusNetworks
Computer Communications 42 (2014) 1–23
Journal of Network and Computer Applications 35 (2012) 619–632
LASSOUS LAYOUT 6/20/05 10:14 AM Page 110
Extreme learning machine: Theory and applications
The impact of social networking on business and business Ethics
The impact of social networking on business and business
The impact of social networking on business and business
WANG LAYOUT 8/22/05 11:16 AM Page 57
Journal of Network and Computer Applications 36 (2013) 409–419
Companies around the globe have discovered the benefits of these
Companies around the globe have discovered the benefits of these
Companies around the globe have discovered the benefits of these
Companies around the globe have discovered the benefits of these
41
13 Viral Marketing on Facebook for a New Open Innovation Platform
International Journal of Engineering Research and General Science Volume 2, Issue 6, October-November, 2014
International Journal of Engineering Research and General Science Volume 2, Issue 6, October-November, 2014
International Journal of Engineering Research and General Science Volume 2, Issue 6, October-November, 2014
I2
I2
I2
A Delay-Tolerant Network Architecture for Challenged
Mobile Phone
Mobile Phone
Optimal placement of different type of DG sources in distribution Networks
Optimal placement of different type of DG sources in distribution Networks
TheE15Initiative
TheE15Initiative
Received August 1, 2010 / Accepted September 19, 2010 J. Technol. Manag. Innov. 2010, Volume 5, Issue 3
CSA is diffi cult due to the dynamic nature of
CSA is diffi cult due to the dynamic nature of
7 Towards Achieving Effective Cyber Situational Awareness CSA can be
an operational use case will be outlined using the previously
an operational use case will be outlined using the previously
an operational use case will be outlined using the previously
Data Communication Networks
Clinical Neurophysiology xxx (2012) xxx–xxx
European Neuropsychopharmacology (2010) 20, 519–534
European Neuropsychopharmacology (2010) 20, 519–534
Rev. Confirming Pages
Ad Hoc Networks 10 (2012) 1497–1516
Gowri.K et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (6) , 2014, 7122-7125
a Virtual Communities and Social Capital 9 Considering these types
Computer Networks 54 (2010) 2787–2805
اینترنت اشیا - قسمت اول
Chapter
International Journal of Hospitality Management 45 (2015) 44–58
International Journal of Hospitality Management 45 (2015) 44–58
48 M. Sigala, K. Chalkiti / International Journal of Hospitality Management 45 (2015) 44–58
52 M. Sigala, K. Chalkiti / International Journal of Hospitality Management 45 (2015) 44–58
ASAR: An ant-based service-aware routing algorithm for
Delay-Constrained High Throughput Protocol for Multi-Path Transmission
Oriental Journal of Computer Science & Technology Vol. 4(1), 209-212 (2011)
Clinical Neurophysiology xxx (2012) xxx–xxx
Chapter 16
Ecotoxicology and Environmental Safety 77 (2012) 28–34
COMPNW 5477 No. of Pages 22, Model 3G
Journal of Network and Computer Applications 35 (2012) 619–632
A surveyoncoverageandconnectivityissuesinwirelesssensornetworks
2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control
2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control
2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control
contends that the relationship between internal and external knowledge environments
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Hindawi Publishing Corporation
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
contends that the relationship between internal and external knowledge environments
PervasiveandMobileComputing9(2013)18–34
Software defined networking for security enhancement in wireless mobile networks
2010 International Conference on Power System Technology
with the advent of smart dust the security for wireless
Social Networksand Social Networking Social networking is built on the
Business overview
Expert Systems with Applications 38 (2011) 1039–1052
Business overview
International Journal of Humanities and Social Science Vol. 1 No. 12; September 2011
NeuroImage 52 (2010) 1059–1069
Automatic Detection ofPremature Ventricular Contraction Using Quantum
NeuroImage 52 (2010) 1059–1069
Vehicular delay- toler ant
Vehicular delay- toler ant
Vehicular delay- toler ant
Automatic Detection ofPremature Ventricular Contraction Using Quantum
WINTERS LAYOUT 8/3/06 1:29 PM Page 77
Master’s Thesis
2012 International Conference on Radar, Communication and Computing (ICRCC),
European Journal of Operational Research 196 (2009) 996–1007
1. Introduction
1. Introduction
The attackers exactly use the radio jamming and battery exhaustion methods to
Least Squares Support Vector Machines for Clustering
Journal of American Science 2013;9(7) http://www.jofamericanscience.org
Computers and Electrical Engineering xxx (2014) xxx–xxx
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
Computer Networks 54 (2010) 2787–2805
Computer Networks 54 (2010) 2787–2805
Computer Networks 54 (2010) 2787–2805
Computer Networks 54 (2010) 2787–2805
Computer Networks 54 (2010) 2787–2805
Communications and Network, 2010, 2, 104-112
Communications and Network, 2010, 2, 104-112
5G Mobile Phone Concept
A Survey on Green 5G Cellular Networks
2013 International Conference on Intelligent Systems and Signal Processing (ISSP)
5G Mobile Phone Concept
A Survey on Green 5G Cellular Networks
2013 International Conference on Intelligent Systems and Signal Processing (ISSP)
PREFACE
PREFACE
IJIRST –International Journal for Innovative Research in Science & Technology| Volume 1 | Issue 7 | December 2014
TFS-18147;NoofPages10
IJIRST –International Journal for Innovative Research in Science & Technology| Volume 1 | Issue 7 | December 2014
Int. J. Ad Hoc and Ubiquitous Computing, Vol. x, No. x, xxxx 1
Advanced Review
Qualitative and Quantitative Methods in Libraries (QQML) 3:627 –636, 2014
wireless convergence has become of particular interest recently because a
2 Gathering network information The first step in developing cyber
2 Gathering network information The first step in developing cyber
2 Gathering network information The first step in developing cyber
Optimization of Energy Efficiency for OFDMA Femtocell Networks Based on
Journal of Business Research 66 (2013) 216–223
Risk Engineering
Expert Systems with Applications 41 (2014) 4309–4321
Engineering Applications of Artificial Intelligence 41 (2015) 195–206
increasing the capacity and speed using a different radio interface
Security in computer networks is one of the most interesting
ComputerCommunications67(2015) 1–10
25
computers & security 53 (2015) 79e108
Towards a Cognitive TCP/IP Network Architecture
Journal of Business Research 67 (2014) 190–199
IEEECOMMUNICATION SURVEYS &TUTORIALS,VOL.16,NO.4,FOURTH QUARTER 2014 1801
Available online at www.sciencedirect.com
Decision Support Systems 47 (2009) 105–114
Reliability Engineering and System Safety 132 (2014) 97–106
Reliability Engineering and System Safety 132 (2014) 97–106
Reliability Engineering and System Safety 132 (2014) 97–106
Reliability Engineering and System Safety 132 (2014) 97–106
IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 16, NO. 1, FIRST QUARTER 2014 61
WANG_LAYOUT.qxp_Layout 1/30/14 1:29 PM Page 122
Reliability Engineering and System Safety 132 (2014) 97–106
Reliability Engineering and System Safety 132 (2014) 97–106
Industrial Marketing Management 42 (2013) 394–404
processor systems are comprised of thousands of processors that need
processor systems are comprised of thousands of processors that need
Preface
Preface
The horizons of optical networks are much more than high speed physical layer transport. An intelligent optical network design
The horizons of optical networks are much more than high speed physical layer transport. An intelligent optical network design
Journal of Network and Computer Applications 39 (2014) 93–103
Hoseini-Hesam-Network2
Hoseini-Hesam-Network3
examining ways ofPreserving privacy in social networks SECURITY AND PRIVACY
Industrial Marketing Management 42 (2013) 394–404
CHAPTER
and recover from the security attacks and also provides apseudo
and recover from the security attacks and also provides a
and recover from the security attacks and also provides a
Low Level Security Mechanisms
is proposed for assigning light trail in a WDM ring
Information Fusion xxx (2013) xxx–xxx
CHAPTER
Optical Fiber Technology 26 (2015) 12–20
1
1
1
Ad Hoc Networks xxx (2015) xxx–xxx
A Comparative Analysis
Journal of Network and Computer Applications 39 (2014) 93–103
based social networks are a special form of social networks
IEEECOMMUNICATION SURVEYS &TUTORIALS,VOL.16,NO.4,FOURTH QUARTER 2014 1801
based social networks are a special form of social networks
Transportation systems and
Wireless Pers Commun (2015) 84:2035–2053
The Journal ofSystemsand Software 110 (2015) 122–135
Applied Energy 157 (2015) 688–698
2012 Second International Conference on Advanced Computing & Communication Technologies 2012 Second International Conference on Advanced Computing & Communication Technologies
ICAST 2008
WIRELESS SENSOR NETWORK SECURITY THREATS
2013 International Conference on Advanced Electronic Systems (ICAES)
Proceeding of the 2013 IEEE International Conference on Space Science and Communication (IconSpace), 1-3 July 2013, Melaka, Malaysia
2012 Second International Conference on Advanced Computing & Communication Technologies 2012 Second International Conference on Advanced Computing & Communication Technologies
ICAST 2008
WIRELESS SENSOR NETWORK SECURITY THREATS
2013 International Conference on Advanced Electronic Systems (ICAES)
Proceeding of the 2013 IEEE International Conference on Space Science and Communication (IconSpace), 1-3 July 2013, Melaka, Malaysia
Moodi
International Journal of Advances in Engineering & Technology, Sept. 2013.
Transport Policy ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Transport Policy ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Journal of Biomedical Informatics 58 (2015) 226–234
Journal of Biomedical Informatics 58 (2015) 226–234
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 406 #14
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 406 #14
JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 32, NO. 20, OCTOBER 15, 2014 3373
JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 32, NO. 20, OCTOBER 15, 2014 3373
Mobile Netw Appl (2015) 20:4–18
G Model
G Model
Swarm and Evolutionary Computation ∎ (∎∎∎∎) ∎∎∎–∎∎∎
WANG_LAYOUT.qxp_Layout 1/30/14 1:29 PM Page 122
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, VOL. 1, NO. 2, JUNE 2014 177
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
Nooroozi2
822 Chapter 18. Structure Learning in Bayesian Networks
94
2011 Eighth International Conference on Information Technology: New Generations
2011 Eighth International Conference on Information Technology: New Generations
Wireless Sensor Network Protocols
Wireless Sensor Network Protocols
ComputerNetworks38(2002)393–422
Wireless Sensor Networks
pictures and videos thereby providing a deep insight into a
NeuroImage 52 (2010) 1059–1069
پروتکل مسیریابی در شبکه مش
Computers and Electrical Engineering xxx (2015) xxx–xxx
Safety Science xxx (2016) xxx–xxx
Wireless Pers Commun (2012) 63:871–894
Computer Communications 42 (2014) 1–23
REVIEW
3.2.4 The Growth of the Hacker Community
data can be directly exchanged between the mobile devices people
Available online at www.sciencedirect.com
Telecommun Syst
Telecommun Syst
Shamsuzzoha and Helo
Shamsuzzoha and Helo
Survey on Context-Aware Publish/Subscribe systems for VANET
Improving connectivity and power efficiency in wireless ad hocnetworks through
In order to solve the contradiction between the connectivity of
In order to solve the contradiction between the connectivity of
Available online at www.sciencedirect.com
PROCEEDINGS OF THE IEEE 1
network technologies and architectures are introduced and discussed along with
MorrisCh3.fm Page 77 Thursday, May 15, 2003 3:42 PM
ARTICLE IN PRESS
and applications have much more in common than what separates
Clinical Neurophysiology xxx (2014) xxx–xxx
Clinical Neurophysiology xxx (2014) xxx–xxx
Clinical Neurophysiology xxx (2014) xxx–xxx
Horizon 2020 and Bey
Gholami
MCDRR Packet Scheduling Algorithm
Baghban
Int. J. Production Economics 137 (2012) 165–175
584 Vedran Podobnik and Ignac Lovrek / Procedia Computer Science 60 ( 2015 ) 583 – 592
SCIENCE CHINA
REVIEW
networks Determining a complete mixing network requires knowledge of every
Processors The presence of unwanted sounds in the background of
Processors The presence of unwanted sounds in the background of
New heuristic search approach to enhance the distribution system load
Computer Networks 53 (2009) 1354–1376
A survey of Attacks on VoIP networks and Countermeasures
MiningHeterogeneousInformationNetworks: AStructural
شبکه های هوشمند
شبکه های هوشمند
1
PHYSICAL REVIEW X 3, 041022 (2013)
2.2. Innovation, Knowledge and Collective Learning
LLATSER LAYOUT_Layout 1 10/11/12 3:31 PM Page 36
LLATSER LAYOUT_Layout 1 10/11/12 3:31 PM Page 36
2
Extracting Social Networks Among Various Entities
our contribution is to determine whether EON network is cost
Wireless Netw
High-Density Distributed
Wireless Netw (2016) 22:2189–2201
COMPNW 5391 No. of Pages 18, Model 3G
COMPNW 5391 No. of Pages 18, Model 3G
Downloaded from http://iranpaper.ir
Background of the Study The Internet revolution changed the information
Available online at www.sciencedirect.com
HOSTED BY
HOSTED BY
HOSTED BY
HOSTED BY
HOSTED BY
HOSTED BY
HOSTED BY
Available online at www.sciencedirect.com
Load balancing and deadline management of queues in an OpenFlow
Computer Networks 54 (2010) 2787–2805
Artificial Neural Networks for Misuse Detection
China Journal of Accounting Research 9 (2016) 59–81
Link Prediction in Multi-modal Social Networks
Encyclopedia of Social Network Analysis and Mining, Springer 2013
Brain connectivity can be investigated by looking at similarity of
Brain connectivity can be investigated by looking at similarity of
CORONET: Fault Tolerance for Software Defined
CORONET: Fault Tolerance for Software Defined
Measuring social dynamics in a massive multiplayer online game abstract
Measuring social dynamics in a massive multiplayer online game abstract
Wireless Netw
ARTICLE 385
ARTICLE 385
2
Available online at www.sciencedirect.com
Experiments and resultsIn order to analyze and understand the
ADDITIONAL CASE STUDY
14th Intl Conf on Pervasive Intelligence 2016 IEEE 14th Intl
1 The Internet technology has certainly revolutionized the world of
1 The Internet technology has certainly revolutionized the world of
Management interfaces reside at various levels in the software stack
Chapter 5 Communicating Between and Among Internal Stakeholders
Our study started with the observation that metropolitan areas are
Chapter 5 Communicating Between and Among Internal Stakeholders
Business Plan
VERSION 2.01 1
IEEECOMMUNICATION SURVEYS &TUTORIALS,VOL.17,NO.1,FIRSTQUARTER2015 27
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
at’s studies, the authors reconfigure the place of public libraries, scriptions to journals and the use of Internet-delivered ab-
14th Intl Conf on Pervasive Intelligence 2016 IEEE 14th Intl
14th Intl Conf on Pervasive Intelligence 2016 IEEE 14th Intl
14th Intl Conf on Pervasive Intelligence 2016 IEEE 14th Intl
Conformity-aware influence maximization in online social
Conformity-aware influence maximization in online social
SECURITY
International Journal on AdHoc Networking Systems (IJANS) Vol. 4, No. 3, July 2014
A Survey of Trust in Social Networks
Journal of Network and Computer Applications 66 (2016) 198–213
Detecting Anomalies in Online Social Networks using Graph Metrics Abstract
1
International Journal on AdHoc Networking Systems (IJANS) Vol. 4, No. 3, July 2014
it is desired to have a single mobile terminal for
Computer Networks 55 (2011) 386–398
and Strategic Networks Learning Objectives See networks as something you
accept that networking is one of the most important requirements
a strategic network necessarily involves lateral and vertical ties to
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
All managers need to build good working relationships with the
are also individuals who are likely to be outside of
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
Computers and Electrical Engineering 41 (2015) 357–367
Community structure in social and
Network Reliability: Theory, Estimation, and Applications
Network Reliability: Theory, Estimation, and Applications
20 Social Networking Sites for Business Professionals By Amber Leigh
20 Social Networking Sites for Business Professionals By Amber Leigh
20 Social Networking Sites for Business Professionals By Amber Leigh
20 Social Networking Sites for Business Professionals By Amber Leigh
Wireless Netw
Wireless Netw
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
Most traffic in sensor networks canbe classified into one of
I
˛»“•»' �fi‹•‰·»
Senior Social Network for improving quality of lifeThe world
A social network is a social structure made up of a set of social actors (such as
A new genetic algorithm for community detection in complex networks
encouragedseveral countries to establish or to update their national AR
IBIMA Publishing
Efficient Distributed Detection of Node Replication Attacks in Sensor Networks
ARTICLE 385
A new measure of heterogeneity for complex networks
The dynamics of such spatial evolutionary PDG becomes increasingly complex
To demonstrate the advance of local interactions in the spatial
International Journal of Security and Networks 2016 Vol. 11 No. 4 1 Title: Secure mobile agent-based English auction protocol using identity-based signature scheme Author: AbubakerWahaballa; HuXiong; Fagen Li; Zhen Qin; Zhiguang Qin Addresses:
s behalf even when the user is disconnected from the
computers & security 37 (2013) 1e14
1032A
Computer Networks 57 (2013) 1344–1371
www.masdoc.ir
s behalf even when the user is disconnected from the
s behalf even when the user is disconnected from the
s behalf even when the user is disconnected from the
MobileNetwAppl
MobileNetwAppl
ASurveyonSecurityinD2DCommunications
Brands are getting better and better at reaching their customers
Brands are getting better and better at reaching their customers
NORMALISE SOCIAL COMMERCE BY CREATING TRUST Scientific research suggests that
computers & security 37 (2013) 1e14
ADHOC 851 No. of Pages 17, Model 3G
Deep Residual Learning for Image Recognition
computers & security 37 (2013) 1e14
computers & security 37 (2013) 1e14
Wirele SS
The Future of the Internet
COMPUTER SCIENCE REVIEW 7 (2013) 1–34
Human Resource Management
PhysicaD323–324(2016)73–79
ComputerNetworks38(2002)393–422
4th IFAC Symposium on Telematics Applications
Computer Networks 54 (2010) 2787–2805
A number of functions is required to support the services
Algorithms and Applications for Community
Algorithms and Applications for Community
notification and recording procedures for frequency assignments pertaining to satellite
notification and recording procedures for frequency assignments pertaining to satellite
Engineering Applications of Artificial Intelligence 52 (2016) 203–212
Engineering Applications of Artificial Intelligence 52 (2016) 203–212
Engineering Applications of Artificial Intelligence 52 (2016) 203–212
Engineering Applications of Artificial Intelligence 52 (2016) 203–212
Engineering Applications of Artificial Intelligence 52 (2016) 203–212
Engineering Applications of Artificial Intelligence 52 (2016) 203–212
Engineering Applications of Artificial Intelligence 52 (2016) 203–212
SO42-FrontMatter ARI 8 July 2016 13:43
An Optimization Tool for Water Network Expansion Planning A water
A Survey of Trust in Social Networks
Network Structures The network structures used in this study were
Communicated by Hongli Dong
J Digit Imaging(2017) 30:400–405
Optical Switching and Networking 14 (2014) 179–193
Optical Switching and Networking 14 (2014) 179–193
Knowledge-Based Systems 46 (2013) 1–11
Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence
C o m m u n i t y D e t e c t i o n i n C o m p l e x N e t w o r k s U s i n g
Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence
Community Detection in Complex Networks using Genetic Algorithm
An Efficient Algorithm for Community Detection
Related content
K. Deng, J.-P. Zhang, J. Yang U činkoviti višekriterijski algoritam za detekciju zajednice u složenim mrežama
Community detection in complex networks
Community detection in complex networks
Community detection in complex networks
Communicated by Hongli Dong
OverlappingCommunityDetectionatScale:
3. EMPIRICAL OBSERVATION
519807 ISB0010.1177/0266242613519807International Small Business JournalZahra et al.
Computers in Human Behavior 56 (2016) 295e305
Computers in Human Behavior 56 (2016) 295e305
Ad Hoc Networks 9 (2011) 1238–1255
1
A number of functions is required to support the services
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
vxlan
Wireless Netw
Applied Soft Computing 63 (2018) 59–70
Applied Soft Computing 63 (2018) 59–70
OPEN Detecting Communities Based on
Accepted Manuscript
Downloaded from http://iranpaper.ir
Accepted Manuscript
Accepted Manuscript
Accepted Manuscript
MobileNets: Efficient Convolutional Neural Networks for Mobile Vision
MobileNets: Efficient Convolutional Neural Networks for Mobile Vision
MobileNets: Efficient Convolutional Neural Networks for Mobile Vision
Proceedings of the IEEE 2017 International Conference on Computing Methodologies and Communication
Proceedings of the IEEE 2017 International Conference on Computing Methodologies and Communication
معماری کامپیوتر
ARTICLE IN PRESS
ARTICLE IN PRESS
3
4
3
4
J Sign Process Syst
Environmental Modelling & Software 25 (2010) 891e909
National Research and Education Networ ks
National Research and Education Networks
Neurocomputing 275 (2018) 278–287
Multi-Net: ScalableMultilayerNetworkEmbeddings
Cross-Site Virtual
Int. J. Communications, Network and System Sciences, 2013, 6, 443-450
Int. J. Communications, Network and System Sciences, 2013, 6, 443-450
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/262305976
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/262305976
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/262305976
546 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
546 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
JKnowlEcon
570 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
Networks and Their Goals: Implications
Networks and Their Goals: Implications
com New study reveals why some people are more creative
Manage changes for software and applications The Host and Network
Journal of Network and Computer Applications 35 (2012) 619–632
Journal of Network and Computer Applications 35 (2012) 619–632
Journal of Network and Computer Applications 35 (2012) 619–632
5004
5004-1
5004-3
53-67
Research Issues and Challenges in Content Placementand Delivery Strategies Abstract
Web-Scale Workflow
This article was downloaded by: [University of Auckland Library]
This article was downloaded by: [University of Auckland Library]
BATTLE-TESTED INDUSTRIAL CYBERSECURITY
BATTLE-TESTED INDUSTRIAL CYBERSECURITY
profit United States computer networking consortium led by members from
profit United States computer networking consortium led by members from
SPECIALSECTIONONHUMAN-CENTEREDSMARTSYSTEMSANDTECHNOLOGIES
many organizations are beginning to build their own storage system
Journal Pre-proof
Journal Pre-proof
5GTHREATS 5G introduces significant innovation to mobile networks by integrating
Thisthreatrelatestocellularpagingprotocolsthatcanbeexploitedbya malicious actor in the vicinity of a victim to
Journal Pre-proof
Journal Pre-proof
Journal Pre-proof
Analysis of OnlineSocial Network Connections for
AcceptedManuscript
Accepted Manuscript
Journal Pre-proof
Journal Pre-proof
Downloaded from https://iranpaper.ir
the authors investigate the innovative concept of a dense wireless
Machine Learning Techniques and A Case Study for Intelligent Wireless
wireless sensor networks are developing rapidly with the support of
Downloaded from https://iranpaper.ir
Downloaded from https://iranpaper.ir
Received November 21, 2020, accepted December 7, 2020, date of publication December 29, 2020,
Materials Today: Proceedings xxx (xxxx) xxx
Study of security issues and solutions in Internet of Things
Electrochimica Acta 127 (2014) 252–258
Exchange: Social
Journal Pre-proof
Exchange: Social
Hindawi
Journal Pre-proofs
Expert Systems With Applications 177 (2021) 114973
Article
Hindawi
Journal Pre-proofs
Computer Networks 220 (2023) 109477
INTRODUCTION