iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ number
جزئیات خدمات ترجمه در ترجمه تخصصی
security
security
security
security
Destination Iban Nu
checkpoint
D
BioSec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human
BioSec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human b - Parallel Processing Workshops, 2003. Proceedings. 2003 International Conference on
BioSec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human
Twitter
resistance
Twitter
resistance
marker
BioSec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human
cluster
cluster
number
[]
IMFs
memory
shall
message
ability
ability
Microsoft Word - Documento1
routing
routing
routing
routing
routing
cluster
mobility
cluster
mobility
cluster
mobility
cluster
signal
بخش 3
offences
Draw flowchart that
[]
network
management
Signal Processing 96 (2014) 274–283
Signal Processing 96 (2014) 274–283
There was no blazing heat from above and no waves
There was no blazing heat from above and no waves
18 M. Sevkli et al./Expert Systems with Applications 39 (2012) 14–24
ICSP2008 Proceedings
Signal Processing 96 (2014) 274–283
Signal Processing 96 (2014) 274–283
ARTICLE IN PRESS
Association Rule Hiding
Improving 3D-Floorplanning Using Smart Selection
Tips from the Experts Author Identification Systems A. Ben Wagner
Priorwork Prior workon CTPmostlyfocused onevaluatingthe performance of this protocolinstaticwireless sensor
www.ietdl.org
www.ietdl.org
درخور بودن From my experience working with clients across enterprises
Expert Systems with Applications 39 (2012) 9642–9650
Expert Systems with Applications 39 (2012) 9642–9650
www.ietdl.org
www.ietdl.org
Abuffer-sizingAlgorithmforNetworksonChipusing
You may use the drag and drop map below to
You may use the drag and drop map below to
NotJustHatsAnymore:BinomialInversion
NotJustHatsAnymore:BinomialInversion
Chapter3
Academic Press is an imprint of Elsevier
Renewable and Sustainable Energy Reviews 15 (2011) 3271– 3277
Applied Soft Computing 11 (2011) 652–657
AN IDEA BASED ON HONEY BEE SWARM FOR NUMERICAL OPTIMIZATION
Decision Support Systems 50 (2011) 511–521
Expert Systems with Applications 39 (2012) 2584–2589
Swarm and Evolutionary Computation 10 (2013) 25–30
RC-MAC: Reduced Collision MAC for Bandwidth Optimization in Wireless
RC-MAC: Reduced Collision MAC for Bandwidth Optimization in Wireless
RC-MAC: Reduced Collision MAC for Bandwidth Optimization in Wireless
RC-MAC: Reduced Collision MAC for Bandwidth Optimization in Wireless
RC-MAC: Reduced Collision MAC for Bandwidth Optimization in Wireless
232 TRANSPORTATION PLANNING
Longitudinal Analysis of Car Ownership in Different Countries 233
TowardsaGameTheoreticFormulationofClustering
European Journal of Operational Research xxx (2013) xxx–xxx
7.5. A critical analysis of the instance indicators
Communications and Network, 2012, 4, 129-138
Longitudinal Analysis of Car Ownership in Different Countries 233
Risk, Governance and Society
Fibonacci retracement
52 Resource-Constrained Project Scheduling
58 Resource-Constrained Project Scheduling
Longitudinal Analysis of Car Ownership in Different Countries 233
Shi et al. BMC Research Notes 2011, 4:189
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
124 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 1, JANUARY 2014
Descartes' rule of signs - Wikipedia, the free encyclopedia http://en.wikipedia.org/wiki/Descartes'_rule_of_signs
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 1, FEBRUARY 2003 17
Journal of Biomechanics 46 (2013) 19–25
0017-Y310/89$3.00+0.00
MIPS Extension for a TCAM Based Parallel
4 Group Level Phases of GSO Algorithm Implementation of GSO
32 IEEE TRANSACTIONS ON COMPUTERS, VOL. 58, NO. 1, JANUARY 2009
Scalable Packet Classification
Expert Systems with Applications 40 (2013) 621–633
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 17, NO. 9, SEPTEMBER 2005 1223
کامپايلر
کامپايلر
Defining your beachhead market and End User Profile provides you
∗
On Dominator Colorings in Graphs
2011 15th European Conference on Software Maintenance and Reengineering
Computers and Electrical Engineering 36 (2010) 491–502
Computers and Electrical Engineering 36 (2010) 491–502
Expert Systems with Applications 39 (2012) 9642–9650
Applied Mathematical Modelling xxx (2014) xxx–xxx
ARCS 2014 • February 25-28, 2014, Lübeck, Germany • Workshop Proceedings
CHAPTER 1
Expert Systems with Applications 38 (2011) 3407–3415
Pattern Recognition 46 (2013) 3030–3039
Pattern Recognition 46 (2013) 3030–3039
Scuba: DivingintoDataatFacebook
CHAPTER 2
Comparing the Performance of Web Server Architectures
Simulation Modelling Practice and Theory 21 (2012) 21–25
American-Eurasian Journal of Toxicological Sciences 2 (2): 62-71, 2010
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 30, NO. 6, JUNE 2004 1
Web Conference Module
Coding Techniques
Coding Techniques
Coding Techniques
Coding Techniques
Vegan: ecological diversity
11 Secrets to Choosing the Perfect Perfume Text and Images
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 30, NO. 6, JUNE 2004 1
CHAPTER 2
2011 15th European Conference on Software Maintenance and Reengineering
CHAPTER 2
CHAPTER 2
Fig
CONCLUSIONS Operating systems represent complex interactive softwaresystems that control access
CONCLUSIONS Operating systems represent complex interactive softwaresystems that control access
Comput Optim Appl
Multi-objective harmony search algorithm for optimal power flow problem
4. Elements of Procedure and Formats of Fields
Journal of Applied Fluid Mechanics, Vol. 6, No. 2, pp. 301-309, 2013.
THE 15-PUZZLE (AND RUBIK’S CUBE)
Available online at www.sciencedirect.com
DEEN: a Simple and Fast Algorithm for
CHAPTER 2
Controlling bots in a First Person Shooter Game
CHAPTER 3
Life Science Journal 2012;9(2) http://www.lifesciencesite.com .
s vision for dynamic content creation in the next generation
國 立 中 正 大 學
m keen to build on my psychological skills and experience
m keen to build on my psychological skills and experience
m keen to build on my psychological skills and experience
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 6, JUNE 2011 1945
search Clean Bandit is an English electronic group founded in
Scuba: DivingintoDataatFacebook
IEEETRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL.62,NO.5, JUNE 2013 1883
Proceedings of the Institution of Mechanical
35
MANAGEMENT ACCOUNTING SYSTEMS AND INSTITUTIONALIZATION IN MEDIUM-SIZED AND
COMPUTATIONAL METHODS IN SCIENCE AND TECHNOLOGY 16(1), 105-114 (2010)
COMPUTATIONAL METHODS IN SCIENCE AND TECHNOLOGY 16(1), 105-114 (2010)
Ú«²¼¿³ »²¬¿´ ¿²¼ ß°° ´·½¿¬·±²
/
Chord: A Scalable Peer-to-peer Lookup Protocol
3. SIMD PROGRAMMING: THE CONNECTION MACHINE 101
Available online at www.sciencedirect.com
meanwhile some people subscribe to the idea that urban life
Title: Display date: Display image border: Display image: Display number of user at the same time in scroll: Enter max number of user to display: Check official website for more information click here Vertical scroll recent registered user
M-data at l . We only need compute M-data and box types
Expert Systems with Applications 41 (2014) 5560–5572
WirelessPersCommun(2014)74:585–599
Case Studies in Thermal Engineering 1 (2013) 38–44
Optik 124 (2013) 4046– 4051
Optik 124 (2013) 4046– 4051
Congestion- and Energy-aware Run-time Task
IEEE INFOCOM 2014 - IEEE Conference on Computer Communications
2013 International Conference on Electrical Information and Communication Technology (EICT)
2013 International Conference on Electrical Information and Communication Technology (EICT)
2013 International Conference on Electrical Information and Communication Technology (EICT)
2013 International Conference on Computer Sciences and Applications
2013 International Conference on Computer Sciences and Applications
Case Studies in Thermal Engineering 1 (2013) 38–44
had polio when he was 7 and served as mayor
10th IEEE International Workshop on Wireless Local Networks WLN 2010, Denver, Colorado
10th IEEE International Workshop on Wireless Local Networks WLN 2010, Denver, Colorado
G Model
1
1
Case Studies in Thermal Engineering 1 (2013) 38–44
Expert Systems with Applications 40 (2013) 5439–5447
Self-Tuning Spectral Clustering
592 A. Biernacki, K. Tutschku
Author's Accepted Manuscript
1
the order throughput capacity of wireless communication networks has been
Journal of Applied Statistics
ComputersandMathematicswithApplications63(2012)458–468
Encoding The genetic information of each individual is encoded in
EUROPEAN
M is a data management and analysis systemfor microbial community
Ad Hoc Networks 24 (2015) 20–28
Ad Hoc Networks 24 (2015) 20–28
You calculate this number by adding together Current Assets and
You calculate this number by adding together Current Assets and
Notes on the History of the Factorial
مقاله
New Page 1 Page 1 of 12
Expert Systems with Applications 40 (2013) 7444–7456
4. Proposed approach for computing initial cluster centers
Expert Systems with Applications 42 (2015) 238–245
We own one call option with strike price 100 and
Optics for Digital Photography
3586 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL.60,NO.8,OCTOBER 2011
Ad Hoc Networks xxx (2014) xxx–xxx
Impact of Node Mobility on MANET Routing
Wireless Pers Commun (2013) 73:1289–1308
Berntenis and Ebeling BMC Bioinformatics 2013, 14:361
Allowing us out and is just a very basic concepts of what is more textbased mathematics. What is it
OTE/SPH OTE/SPH
v
NUMERICAL ANALYSIS ON THERMAL
38
44
53
55
60
65
68
Radioisotope scanning isotopes of an element are nuclides with the
Applied Mathematical Modelling 38 (2014) 1638–1646
fw the winding factor and a the number of parallel
COMPUTER
27.6 FAULT-TOLERANT RNS ARITHMETIC 459
OTE/SPH OTE/SPH
Interactive art Interactive art is a form of art that
grey set theory
MAIERetal.:ASSESSINGORGANIZATIONALCAPABILITIES:REVIEWINGANDGUIDINGTHEDEVELOPMENTOFMATURITYGRIDS 141
Information and Computation 216 (2012) 14–23
NumericalAnalysisofConvective
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Impact of Neighbor Awareness at the MAC Layer
Impact of Neighbor Awareness at the MAC Layer
IEEETRANSACTIONSONSMARTGRID,VOL.4,NO.3,SEPTEMBER2013 1567
The result is a sequence of digital values that have
Grey Systems: Theory and Application
2014 International Conference on Reliability, Optimization and Information Technology -
Journal of Applied Operational Research (2014) 6(3), 145 –157
Journal of Applied Operational Research (2014) 6(3), 145 –157
1
a
a
Safety Effects of Converting
Recent research shows that random linear network coding is adapted
Recent research shows that random linear network coding is adapted
v
devices. Section II highlights the characteristics of the main spectrum currently available to IMT systems through the
7.3. Ad-Hoc Extensions of Phenomenological Plasticity 275
DAG1000&2000 Series FXO Voice Gateway User Manual
Journal of Management and Marketing Research
ThisarticleappearedinajournalpublishedbyElsevier. Theattached
Journal of Network and Computer Applications 36 (2013) 409–419
Available online at www.sciencedirect.com
Modified Adhoc on Demand Routing
Author's Accepted Manuscript
Author's Accepted Manuscript
Author's Accepted Manuscript
Author's Accepted Manuscript
An Efficient Parallel Algorithm
been conducted using three-dimensional conjugate heat transfer
Available online at www.sciencedirect.com
Computers & Industrial Engineering 58 (2010) 529–534
An Efficient Parallel Algorithm for Solving the
2.4. Paper based electronic voting schemes
The greater part of mankind may be divided into two
University \Alexandru Ioan Cuza" of Iasi, Romania
Fuzzy grey relation method 3067
CHAPTER XVII
Within, you will be taken on a spiraling tour through the toroidal roller coaster of our deterministic universe. Dark Matter, the vibratory essence of all that exists, is no longer on its elusive hide and seek trip
2.2.1. Queuing theory and simulation As a simple M/M/N queuing system where N is the number of
The Journal of China
Fibonacci Numbers and Nature This page has been split into
Fibonacci Numbers in Nature
Evaluating Energy Consumption in CDN Servers
After that we performed the experiments with the traffic of
4 Sequential Consultation In this experiment we study the number
a new approach to SMD is outlined based on what
620 IEEEJOURNALOFOCEANICENGINEERING,VOL.39,NO.4,OCTOBER2014
The Tau Manifesto
The effects of agriculture and sedentary settlement The internal structure
The effects of agriculture and sedentary settlement The internal structure
The effects of agriculture and sedentary settlement The internal structure
The effects of agriculture and sedentary settlement The internal structure
The effects of agriculture and sedentary settlement The internal structure
The effects of agriculture and sedentary settlement The internal structure
BioMed Central
A Review of Operations Research Applications in
1 Introduction
Applied Thermal Engineering 31 (2011) 2348e2359
Applied Thermal Engineering 31 (2011) 2348e2359
Experimental Thermal and Fluid Science 42 (2012) 107–115
Experimental Thermal and Fluid Science 42 (2012) 107–115
492
ˇ
G Model
A.H. Gandomi et al. / Engineering Applications of Artificial Intelligence 24 (2011) 717–732 723
J Intell Manuf (2012) 23:651–659
Kasetsart J. (Nat. Sci.) 37 : 243 - 246 (2003)
Within, you will be taken on a spiraling tour through the toroidal roller coaster of our deterministic universe. Dark Matter, the vibratory essence of all that exists, is no longer on its elusive hide and seek trip
Within, you will be taken on a spiraling tour through the toroidal roller coaster of our deterministic universe. Dark Matter, the vibratory essence of all that exists, is no longer on its elusive hide and seek trip
WEN LAYOUT.qxp_Layout 1 1/16/15 2:50 PM Page 35
*
*
K22172
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 5, MAY 2013 951
Privacy-Preserving Datamining
I. Iancu, N. Constantinescu / Applied Soft Computing 13 (2013) 2136–2142 2137
a smaller memory capacity and without such a large array
SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013
Globecom 2014 - Wireless Networking Symposium
Journal of Machine Learning Research 3 (2003) 1265-1287 Submitted 5/02; Published 3/03
Metaheuristics for Hard Optimization J. Dreo ´ A. Pet ´ rowski
Metaheuristics for Hard Optimization J. Dreo ´ A. Pet ´ rowski
Wireless Netw
6.4 Simulated Annealing: General Presentation 131
1 To ensure that aeronautical information services units obtain information
2015 4th MEDIAN Workshop
OWNER’S MANUAL
418 IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 30, NO. 6, JUNE 2004
May 4, 2007 9:12 World Scientiflc Book - 9in x 6in book-main
Instructions to Clinicians
May 4, 2007 9:12 World Scientiflc Book - 9in x 6in book-main
Case Studies in Thermal Engineering 4 (2014) 32–41
Error Control and Flow Control TCP uses port numbers to
RNS Based Reconfigurable Processor for High Speed
Globecom 2014 - Wireless Networking Symposium
Honey bee behavior inspired load balancing of tasks in cloud
RNS Based Reconfigurable Processor for High Speed
Numeracy 145
Survey research 111
Wireless Netw
aware Switch using A Network Processor Abstract Cluster based server
aware Switch using A Network Processor Abstract Cluster based server
aware Switch using A Network Processor Abstract Cluster based server
Mizan:OptimizingGraphMininginLargeParallelSystems
Introduction Properties that determine the feasibility of a molecule reaching
214 Applications and Examples
November 11, 2010 12:21 ham_338065_ch03 Sheet number 1 Page number 95 cyan black
International Journal of Advanced Technology & Engineering Research (IJATER)
Chapter
Search and Replication in
Globecom 2014 - Wireless Networking Symposium
Globecom 2014 - Wireless Networking Symposium
A Substitution Permutation Network Design Using Cellular Automata For Cipher Systems
IEEE ICC 2013 - Next-Generation Networking Symposium
Residue Number Systems 1
The second of the two pedestrian methods was developed by
ترافیک و حمل ونقل شهری
carotene content in maize grain by breeding and minimize vitamin
indicating a wide genetic variability for the studied characters and
323
A Content-Centric Architecture
A Content-Centric Architecture
Accepted Manuscript
2011 International Conference on Risk and Engineering Management
Available online at www.sciencedirect.com
O on same link Data transferred at a fixed rate
O on same link Data transferred at a fixed rate
O on same link Data transferred at a fixed rate
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the ICC 2007 proceedings.
Quality Control Techniques for “Zero Defects”
ISSN: 2278 – 7798
click for fare Airline will also increase its 3 times
M. Zeng et al. / Optik 123 (2012) 511– 520 513
use the terminal no monitor command to stop the terminal
Table lookup approach Store a table of all index terms
5
Data Communications and Networking
13
It provides a large amount of storage and rapidretrieval of
It provides a large amount of storage and rapidretrieval of
Genetic Algorithm for the Determination of Linear
technologies
Genetic Algorithm for the Determination of Linear
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
are a recent phenomenon for sharing a presence at everyday
are a recent phenomenon for sharing a presence at everyday
Computers in Human Behavior 46 (2015) 45–56
13
Knowl Inf Syst (2014) 39:175–206
Application of Ant Colony Optimization Algorithm to
AWIDEBANDSPECTRUMSENSINGMETHODFORCOGNITIVERADIOUSING
AWIDEBANDSPEC
Multi-Join Query Optimization Using the Bees
Multi-Join Query Optimization Using the Bees
is of Reynolds Number and Soli
Yue, Gan, and Ubaka 2
Yue, Gan, and Ubaka 2
Yue, Gan, and Ubaka 2
INTRODUCTION
INTRODUCTION
Sampling Fundamentals 165
Automatic Detection ofPremature Ventricular Contraction Using Quantum
782 JOURNAL OF NETWORKS, VOL. 5, NO. 7, JULY 2010
Computer image processing
AWIDEBANDSPECTRUMSENSINGMETHODFORCOGNITIVERADIOUSING
AWIDEBANDSPECTRUMSENSINGMETHODFORCOGNITIVERADIOUSING
AWIDEBANDSPECTRUMSENSINGMETHODFORCOGNITIVERADIOUSING
control limit ipv6 49 Chapter 3 Commands for the Number
Parking problem becomes one of major issues in the city
Parking problem becomes one of major issues in the city
Automatic Detection ofPremature Ventricular Contraction Using Quantum
Genetic Algorithm for the Determination of Linear
4. Experimental results
4. Experimental results
Ann Oper Res (2010) 178: 23–43
Journal of Biomedical Informatics xxx (2014) xxx–xxx
Dimensioning hospital wards using the Erlang loss model 3 Dataanalysis
550 The International Arab Journal of Information Technology, Vol. 11, No. 6, November 2014
A hybrid artificial bee colony assisted differential evolution algorithm for
Economic Decision Making Using Fuzzy Numbers
Available online at www.sciencedirect.com
Fuzzy Logic Implementation to Calculate
Fuzzy Logic Implementation to Calculate
Fuzzy Logic Implementation to Calculate
Stochastic Dynamics of Structures Ch 7
Everyone agreesthat we are not born with the knowledge of
Everyone agreesthat we are not born with the knowledge of
Everyone agreesthat we are not born with the knowledge of
Everyone agreesthat we are not born with the knowledge of
Alexandria Engineering Journal (2012) 51, 193–203
Alexandria University Alexandria Engineering Journal ORIGINAL ARTICLE Reliability of using
CAMP: Fast and Efficient IP Lookup Architecture
CAMP: Fast and Efficient IP Lookup Architecture
pharmtech.com January 2010
*Manuscript
3. WSA - greement and WSAG4J
In Cloudcompaas, this issue has been addressed by using of a cooldown
اندازه گیری فرکانس برخورد
ELECTRON NUMBER DENSITY AND COLLISION FREQUENCY
with the first tests carried out in the state of
Quality of Service Analysis of Fuzzy
6 A Case Study The analysis of a warehouse of
6 A Case Study The analysis of a warehouse of
Efficientk-Means++Approximation
Performance Evaluation of Reliability Aware Photonic Network-on-Chip
ARTICLE FORMAT FOR CIBTech Journals
11802 Langmuir 2005, 21, 11802-11805
DIFC issues 140 new licences in first half of 2015
Entry into United Nations service might entail assignment and travel
Documentation
A set of seven common attacks were carefully selected for
sleep mode operation
sleep node
Dubai taxis to increase by 34 per cent by 2020
International Journal of Mining Science and Technology 25 (2015) 671–674
different fields of science [4, 5, 6, 7, 8]. DBSCAN clusters data ob-
An extrinsic semiconductor is one that has been doped with
An extrinsic semiconductor is one that has been doped with
35965
Food Control 36 (2014) 212e216
An Intrusive Analyzer for Hadoop Systems Based on Wireless Sensor Networks
Energy Conversion and Management 98 (2015) 484–499
COMMUNICATIONS SOFTWARE
An Intrusive Analyzer for Hadoop Systems Based on Wireless Sensor Networks
s Fastest Robotic Roach is Created Using 3D Printed Parts
ResearchArticle
ELSEVIER
Journal of Food Engineering 57 (2003) 179–187
The Journal of Systems and Software 85 (2012) 77–86
Part 2
Chapter 2
Part 2
just might have a history of writing bad checks--that would be about as welcome
Part 2
chapter seven
Globecom 2012 - Communication Theory Symposium
Computers & Operations Research 40 (2013) 273–281
Applied Soft Computing 24 (2014) 432–446
An Ontology-based P2P Network for
Poisson Model of Construction Incident Occurrence
80 4.2 Model for retained austenite fraction
5
PC-3000 EXPRESS / UDMA / PORTABLE
Applied Soft Computing 10 (2010) 703–710
Computers & Operations Research 65 (2016) 93–103
Computers & Operations Research 65 (2016) 93–103
Computers & Operations Research 65 (2016) 93–103
Computers & Operations Research 65 (2016) 93–103
Real-World Problems for Secondary
THE ART OF DECEPTION
what could I do to let him know what a
what could I do to let him know what a
what could I do to let him know what a
1
Hoseini-Hesam02
Int. J. Production Economics 150 (2014) 204–214
8
Network2
Information Processing and Management 48 (2012) 903–917
Mathematical Significance of Representations In the textbook series by Hironaka
Hoseini-Hesam-Network2
18.2 Big Bang–Big Crunch Algorithm 327
18.2 Big Bang–Big Crunch Algorithm 327
18.2 Big Bang–Big Crunch Algorithm 327
ADHOC 1216 No. of Pages 16, Model 3G
Machine Learning,
Machine Learning,
A Course in Multicultural Mathematics
Computers & Operations Research 65 (2016) 93–103
146 Thermochemistry and Fuels Chap.4
S. de Leeuw, J.P. van den Berg / Journal of Operations Management 29 (2011) 224–235 229
232 S. de Leeuw, J.P. van den Berg / Journal of Operations Management 29 (2011) 224–235
S. de Leeuw, J.P. van den Berg / Journal of Operations Management 29 (2011) 224–235 233
Unidirectional Link Counter - A Routing Protocol
Journal of Network and Computer Applications 39 (2014) 140–151
BULLETIN OF THE POLISH ACADEMY OF SCIENCES
and hexadecimal numbering systems and be able to convert from
and hexadecimal numbering systems and be able to convert from
while a method for small sample sizes is presented as
Part 2
Part 2
Part 2
Electric Power Systems Research 81 (2011) 699–706
2011The International Conference on Advanced Power System Automation and Protection
Fault Indicator Location in Distribution System Using
Electric Power Systems Research 81 (2011) 699–706
2011The International Conference on Advanced Power System Automation and Protection
Fault Indicator Location in Distribution System Using
Pattern Recognition 39 (2006) 180–188
7
User Manual
User Manual
CHAPTER
Chapter 2
7
7
Transportation Economics/Introduction
IJE TRANSACTIONS A: Basics Vol. 26, No. 7, (July 2013) 781-794
7
Available online at www.sciencedirect.com
AcceptedManuscript
Downloaded from Iran library: (www.libdl.ir) | Sponsored by Tehran Business School (www.tbs.ir)
1 LZW Encoding
Improving dynamic and distributed congestion control
7
7
The 23rd International Technical Conference on Circuits/Systems,
7
Real-World Problems for Secondary
Logistic Growth
Manufacturing System Planning and Scheduling
پدیدههای انتقال در سیستم های میکرو
QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, VOL. 9, 89-93 (1993)
7
Accepted Manuscript
LearningRandomKernelApproximationsforObjectRecognition
Journal of Air Transport Management 42 (2015) 10e14
Wide-Area Protection and Power System
International Journal of Information Management 35 (2015) 154–159
A Security Oriented Approach to PMU Positioning
566 IEEETRANSACTIONSONPOWERSYSTEMS,VOL.28,NO.1,FEBRUARY 2013
742 IEEETRANSACTIONSONPOWERSYSTEMS,VOL.29,NO.2,MARCH2014
Optimal Placement of Phasor Measurement Units in
A Security Oriented Approach to PMU Positioning
566 IEEETRANSACTIONSONPOWERSYSTEMS,VOL.28,NO.1,FEBRUARY 2013
742 IEEETRANSACTIONSONPOWERSYSTEMS,VOL.29,NO.2,MARCH2014
Optimal Placement of Phasor Measurement Units in
A Security Oriented Approach to PMU Positioning
566 IEEETRANSACTIONSONPOWERSYSTEMS,VOL.28,NO.1,FEBRUARY 2013
742 IEEETRANSACTIONSONPOWERSYSTEMS,VOL.29,NO.2,MARCH2014
Optimal Placement of Phasor Measurement Units in
Child Development, January/February 2006, Volume 77, Number 1, Pages 153–175
This article investigates the scheduling of a distribution system consisting
Applied Thermal Engineering 89 (2015) 727e737
This article investigates the scheduling of a distribution system consisting
FS I: Fuzzy Sets and Fuzzy Logic
miscellaNeoustheories
Extremely easyor very difficult items will result in a deflated
Extremely easyor very difficult items will result in a deflated
Extremely easyor very difficult items will result in a deflated
Extremely easyor very difficult items will result in a deflated
FS I: Fuzzy Sets and Fuzzy Logic
Parallel Artificial Bee Colony (PABC) Algorithm
Many researchers have found that the KNN algorithm accomplishes very
Many researchers have found that the KNN algorithm accomplishes very
An Improved k-Nearest Neighbor Classification Using Genetic Algorithm
An Improved k-Nearest Neighbor Classification Using Genetic Algorithm
Introduction Nearest neighbor search is one of the most popular
Vol.
Salem Alelyani, Jiliang Tang and Huan Liu
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 433 #41
Computational Optimization and Applications, 29, 263–287, 2004
Computational Optimization and Applications, 29, 263–287, 2004
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 404 #12
7
Real-World Problems for Secondary
2012 IEEE 12th International Conference on Data Mining Workshops 2012 IEEE 12th International Conference on Data Mining Workshops
2012 IEEE 12th International Conference on Data Mining Workshops 2012 IEEE 12th International Conference on Data Mining Workshops
Fourier Kernel Learning
Fourier Kernel Learning 3
8 Eduard Gabriel B az avan, Fuxin Li, and Cristian Sminchisescu
10 Eduard Gabriel B az avan, Fuxin Li, and Cristian Sminchisescu
Fourier Kernel Learning
Trend Analysis of Human Resources development
Procedia - Social and Behavioral Sciences 27 ( 2011 ) 150 – 159
Chemometrics: Data Analysis for the Laboratory and Chemical Plant.
AYTEKIN et al.:LOCAL PRIMITIVE PATTERN FOR THE CLASSIFICATION OF SARIMAGES 2435
AYTEKIN et al.:LOCAL PRIMITIVE PATTERN FOR THE CLASSIFICATION OF SARIMAGES 2435
AYTEKIN et al.:LOCAL PRIMITIVE PATTERN FOR THE CLASSIFICATION OF SARIMAGES 2435
AYTEKIN et al.:LOCAL PRIMITIVE PATTERN FOR THE CLASSIFICATION OF SARIMAGES 2435
Available online at www.sciencedirect.com
22 | Operator's manual
22 | Operator's manual
Data Compression Methodologies for Lossless Data and Comparison between Algorithms
568 JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 16, NO. 5, OCTOBER 2014
44 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 1, JANUARY 2010
Proceedings of ASME Turbo Expo 2013: Turbine Technical Conference and Exposition
6) Numerical analysis of the lethality and processing uniformity in a double-pipe
Improved Impossible Di�erential Attacks against
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 1, FEBRUARY 2003 17
Chord: A Scalable Peer-to-peer Lookup Protocol
Chord: A Scalable Peer-to-peer Lookup Service for Internet
Chord: A Scalable Peer-to-peer Lookup Protocol
2009 16th Asia-Pacific Software Engineering Conference
Risk Identification and Mitigation Processes for Using Scrum in Global Software
Chord: A Scalable Peer-to-peer Lookup Protocol
(4)
8
8
مدلسازی
The Selwood data set is dealing with antifilarialantimycin activities contained
Journal of Hazardous Materials A99 (2003) 1–30
To Whom We as BestomTarimUrunleri San ve Tic LdSticompany with
MULTICHANNEL FLUCTUATION DATA ANALYSIS BY
000m2 of desert ground with a new breed of photovoltaic
000m2 of desert ground with a new breed of photovoltaic
156 4 Catalyst Characterization
s as a radical movement to go beyond prevailing pessimism
2011 Eighth International Conference on Information Technology: New Generations
2011 Eighth International Conference on Information Technology: New Generations
Safety Science 73 (2015) 146–166
3 Thermochemistry output from Gaussian
شرح خرابی Raveling is the dislodging of coarse aggregate particles
An overview of the state of broadband (Internet) - 2015
DUNS Number
245
8.2 Steam ReformingProcess 307
An overview of the state of broadband (Internet) - 2015 - part 2
Season: Shelving Interference and Joint
9.3 Gasoline Production 361
324 8 HeterogeneousCatalysis in Practice: Hydrogen
1672 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 30, NO. 9, SEPTEMBER 2008
1672 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 30, NO. 9, SEPTEMBER 2008
Wireless Pers Commun (2012) 63:871–894
Applied Soft Computing 21 (2014) 309–319
Applied Soft Computing 21 (2014) 309–319
Applied Soft Computing 21 (2014) 309–319
C H A P T E R
Answering Questions about Unanswered Questions
Predictive partitioning for efficient BFS
Annals of Nuclear Energy 73 (2014) 432–440
FriendshipPredictionandHomophilyinSocialMedia
s rate decision and housing figures in the US stand
106
Psychological Review
7
Wireless Enhancements for Storage Area Networks
Chapter 4
The connection weight between a neuron in the pattern layer
Chapter 4
فناوری
Mining
2011 IEEE Symposium on Computers & Informatics
2011 IEEE Symposium on Computers & Informatics
Simulation Modelling Practice and Theory 38 (2013) 69–97
Simulation Modelling Practice and Theory 38 (2013) 69–97
Journal of Marine Science and Technology, Vol. 13, No. 1, pp. 35-45 (2005) 35
Journal of Marine Science and Technology, Vol. 13, No. 1, pp. 35-45 (2005) 35
Journal of Marine Science and Technology, Vol. 13, No. 1, pp. 35-45 (2005) 35
Journal of Marine Science and Technology, Vol. 13, No. 1, pp. 35-45 (2005) 35
Journal of Marine Science and Technology, Vol. 13, No. 1, pp. 35-45 (2005) 35
Journal of Marine Science and Technology, Vol. 13, No. 1, pp. 35-45 (2005) 35
SpringerUndergraduateTexts
SpringerUndergraduateTexts
Big Data Research 3 (2016) 24–28
Big Data Research 3 (2016) 24–28
Mining
ARTICLE IN PRESS
Downloaded form http://iranpaper.ir
The Mystery Of Your Camera’s IP Rating Solved!
Siavash Ebrahaimi Basabi
Siavash Ebrahaimi Basabi
Study of Modified Noise-Shaper Architectures
Downloaded form http://iranpaper.ir
1.3 Hydrodynamic Drag on a Nano-Sphere 29
Siavash Ebrahaimi Basabi
1 5
1.3 Hydrodynamic Drag on a Nano-Sphere 29
CERN{2005{010
Mining
Public Record Office Victoria
6 IEEETRANSACTIONSONCLOUDCOMPUTING, VOL.4, NO.1, JANUARY-MARCH2016
896 IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 32, NO. 11, NOVEMBER 2006
Expert Systems With Applications 51 (2016) 143–150
Mining
Chapter 3
European Journal of Operational Research 179 (2007) 692–708
European Journal of Operational Research 168 (2006) 798–810
Introduction to Queueing Theory and
Basic Queueing Theory
Chapter 3
Small Bus Econ (2016) 46:169–185
1430 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS,VOL.13,NO.3,SEPTEMBER 2012
1430 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS,VOL.13,NO.3,SEPTEMBER 2012
Cost Evaluation of Columns Arrangements in Special Steel Moment Resisting
Ullman ii This book evolved from material developed over several
PSEUDO-ELLIPTIC FILTERS 39
CanadianMathematicalBulletin
408 Hakan Hac~gumug, Bijit Hore, Bala Iyer, and Sharad Mehrotra
Search on Encrypted Data 409
410 Hakan Hac~gumii~, Bijit Hore, Bala Iyer, and Sharad Mehrotra
Search on Encrypted Data 417
408 Hakan Hac~gumug, Bijit Hore, Bala Iyer, and Sharad Mehrotra
Search on Encrypted Data 409
410 Hakan Hac~gumii~, Bijit Hore, Bala Iyer, and Sharad Mehrotra
Computational Statistics & Data Analysis 38 (2001) 191–201
Processor share received by dhrystones MPEG decoding with background compilations Interactive application with background simulations
Processor share received by dhrystones MPEG decoding with background compilations Interactive application with background simulations
Queueing Systems
Computers & Operations Research 33 (2006) 263–283
1826 Floradale Avenue
Ad Hoc Network and its Influence on Safe Driving
Analysing Morphological Patterns of Blood
Organized prenatal care in the United States was introduced in the early twentieth century, initially as home visits conducted by public health
Mining
“06-Ch04-SA272” 18/9/2008 page 259
Chapter 4
International Journal of Thermal Sciences 58 (2012) 61e69
IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 19, NO. 4, AUGUST 2011 717
Abstract—The emerging massive/large-scale multiple-input multiple-output (LS-MIMO)
CFR Working Paper No. 05-07
Chapter 1
http://www.bankinfosecurity.com/
the initial introduction found that 83% preferred voice verification over the 5 digit
Downloaded form http://iranpaper.ir
BetweennessCentralityonGPUsandHeterogeneous
Mining