iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ object
جزئیات خدمات ترجمه در ترجمه تخصصی
web os
security
security
security
security
security
security
object
development
method
applications
type
data
[]
[]
[]
data
recognition
Structural analysis and Failure analysis Structural analysis is the branch
Computers and Electrical Engineering 38 (2012) 746–755
Human Activity Recognition for the use in
Structural analysis and Failure analysis Structural analysis is the branch
The Journal of Systems and Software 84 (2011) 1480– 1506
Enterprise architecture patterns for business process support analysis
matches the color histogram of the target with every possible
Ground Penetrating Radar Fundamentals
CHA P TER 2
CHA P TER 2
1572 IEEE GEOSCIENCE AND REMOTE SENSING LETTERS,VOL.10,NO.6,NOVEMBER 2013
2009 Sixth International Conference on Information Technology: New Generations 2009 Sixth International Conference on Information Technology: New Generations
Microprocessors and Microsystems 30 (2006) 469–479
2009 Sixth International Conference on Information Technology: New Generations 2009 Sixth International Conference on Information Technology: New Generations
2009 Sixth International Conference on Information Technology: New Generations 2009 Sixth International Conference on Information Technology: New Generations
2009 Sixth International Conference on Information Technology: New Generations 2009 Sixth International Conference on Information Technology: New Generations
International Journal of Computer Networks and Communications Security
Issues in Mapping HRT-HOOD to UML
reduced to such an extent that they do not
IncrementalLearningforRobustVisualTracking
A General Framework for Recognizing Complex Events in Markov Logic
A General Framework for Recognizing Complex Events in Markov Logic
Thrift: Scalable Cross-Language Services Implementation
Aligns objects with other objects in 2D and 3D Modeling
cells
cells
Chapter 3
Adaptive Software Cache Management for
Research on the alternatives in a strategic environmental assessment based on the extension theory
the generalization of an object can be performed by referring
Computer Physics Communications 140 (2001) 45–55
A Survey on Object Detection
BufferedInputStream FileWriter PipedInputStream BufferedOutputStream FilterInputStream PipedOutputStream BufferedReader FilterOutputStream PipedReader BufferedWriter
™
Design Patterns
Review and Evaluation of Well-Known Methods for Moving Object Detection and Tracking in Videos
template view
ISSN:2229-6093
86 6. APPLICATIONS OF SPATIAL DATA MANAGEMENT TECHNOLOGY
86 6. APPLICATIONS OF SPATIAL DATA MANAGEMENT TECHNOLOGY
86 6. APPLICATIONS OF SPATIAL DATA MANAGEMENT TECHNOLOGY
86 6. APPLICATIONS OF SPATIAL DATA MANAGEMENT TECHNOLOGY
86 6. APPLICATIONS OF SPATIAL DATA MANAGEMENT TECHNOLOGY
4 simulated the reconstruction of a single light spot via
TM
49
دانشگاهی
J.ParallelDistrib.Comput.73(2013)570–579
Setting Meaning Values
Analysis of a Replication-Aware
5.8 Mapping
He was the son of Benjamin and Sarah Hunt Mills
1
Management Information
PATTERNS IN COLORED PETRI NETS
ARTICLE IN PRESS
Animation Support in a User Interface Toolkit:
Animation Support in a User Interface Toolkit:
Journal of Neuroscience Methods 181 (2009) 199–211
Animation Support in a User Interface Toolkit:
Animation Support in a User Interface Toolkit:
Animation Support in a User Interface Toolkit:
Animation Support in a User Interface Toolkit:
The IDEF3 Process Description Capture Method provides a mechanism for
DomainAdaptiveObjectDetection
Search and Replication in
I was able to set up a fortress that he
I was able to set up a fortress that he
APPLYINGIMAGEANALYSISTOAUTOINSURANCE TRIAGE: ANOVELAPPLICATION
800 JOURNAL OF NETWORKS, VOL. 5, NO. 7, JULY 2010
Ataxonomy for moving object queries in spatial databases a b
ahmadi
I
4454 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 21, NO. 10, OCTOBER 2012
4454 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 21, NO. 10, OCTOBER 2012
4454 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 21, NO. 10, OCTOBER 2012
Chapter 2
The Scene of Two – Alain Badiou
Actualism and possible worlds
How to work with services and notifications Some types of
How to work with services and notifications Some types of
physics
physics
نرم افزار
Dentomaxillofacial Radiology (2011) 40, 265–273
Dentomaxillofacial Radiology (2011) 40, 265–273
1
ARTICLE IN PRESS
4. Incorporation : The Handbook of Morphology : Blackwell Reference Online Sayfa 1 / 13
Send Orders for Reprints to reprints@benthamscience.ae
2 OpenDoc SOM was intended to be used universally from
Author's Accepted Manuscript
Dynamic Range The responsivity function also provides dynamic range and
Hoseini-Hesam10
Hoseini-Hesam-San10
2014 IEEE 22nd Signal Processing and Communications Applications Conference (SIU 2014)
یملع تلااقم و باتک دولناد و شرافس
TwoMultivariateGeneralizationsofPointwiseMutualInformation
TwoMultivariateGeneralizationsofPointwiseMutualInformation
IEEE TRANSACTIONS ON ULTRASONICS, FERROELECTRICS, AND FREQUENCY CONTROL, VOL. 43, NO. 5, SEPTEMBER 1996 791
Recent advances in anomaly detection address event representation and globally
C H A P T E R 7
MohammadZadeh
secured in several ways, and platforms with different
secured in several ways, and platforms with different
The Making of Cultural Heritage
ISSN:2229-6093
ISSN:2229-6093
Intent Define an object that encapsulates how a set of
Intent Define an object that encapsulates how a set of
Design Patterns
Sometimes an object pronoun is used as the object of
8.1 Introduction 387
388 Chapter 8 Nondestructive Testing in Concrete Engineering
{
2015 IEEE International Conference on Computer Vision
abstract Manufacturing strategy is a plan for moving a company
2/26/2016 Fashion Theory: a Conceptual Framework by George B. Sproles
Security Implications of the Choice of Distributed Database
Security Implications of the Choice of Distributed Database
the free encyclopedia low altitude aerial photograph for use in
and act on objects in the physical world can be
Identifying an Object
What makes the Tero Vido 3D System the best available metal de tector?
Canonical Correspondence Analysis
Identifying an Object
What makes the Tero Vido 3D System the best available metal de tector?
light
light
is an application layer protocol that facilitates the exchange of
Sometimes an object pronoun is used as the object of
HEIGHT ESTIMATION FROM A SINGLE CAMERA VIEW
Sometimes an object pronoun is used as the object of
Sometimes an object pronoun is used as the object of
world object or environment to collect data on its shape
world object or environment to collect data on its shape
Gennady Retseptor is the author of very popular articles on
___________________
Journal of Analytical Psychology, 2015, 60, 2, 198–219
Journal of Analytical Psychology, 2015, 60, 2, 198–219
CHAPTER TWO
ISSN 1068-7998, Russian Aeronautics (Iz.VUZ), 2014, Vol. 57, No. 3, pp. 303–306. © Allerton Press, Inc., 2014.
One of the most effective methodologies for getting good prints
Available online at www.sciencedirect.com
it is important for a computer system to maintain information
IEEETRANSACTIONSONPATTERNANALYSISANDMACHINEINTELLIGENCE, VOL.37, NO.3, MARCH 2015 569
IEEETRANSACTIONSONPATTERNANALYSISANDMACHINEINTELLIGENCE, VOL.37, NO.3, MARCH 2015 569
International Review of Social History 43 (1998), Supplement, pp. 81-104
Ultramicroscopy 136 (2014) 15–25
Ultramicroscopy 136 (2014) 15–25
The Humanistic Psychologist, 42: 233–248, 2014
The Humanistic Psychologist, 42: 233–248, 2014
EXAMENSARBETE INOM TEKNIK,
multiple human object tracking approach is used which based on
areas
2014 IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT)
FIONA MACDONALD 11 FEB 2017 Astronomers have observed something unexpectedly
Design Requirements for a
systems currently generate a major fraction of the total Internet
Neurocomputing∎ (∎∎∎∎)∎∎∎–∎∎∎
3D Printing
We can conclude with a very significant instance in which
1 A video or movie is a collection of static
1 A video or movie is a collection of static
1 A video or movie is a collection of static
International Journal of Computer Applications (0975 – 8887)
adapt to fluctuation of the object appearance, and incorpo- (tracking, learning, detection), which combined the random
SIViP
Objectdetectionviaamulti-region&semanticsegmentation-awareCNNmodel
2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT)
detection of abondend 2013
International Journal of Computer Applications (0975 – 8887)
But it is an analogy of which they cannot be
But it is an analogy of which they cannot be
4 4
4 4
MODELING AND CACHING OF PEER-TO-PEER
VideoGoogle:ATextRetrievalApproachtoObjectMatchinginVideos
Crystal: Software-Defined Storage for
Fog Computing, Fault Tolerance in Cloud Computing, Control Flow Checking Mechanisms, Snort, Open VSwitch,
Crystal: Software-Defined Storage for
Saussure Introduction In this chapter we first introduce some basic
IOStack: Software-Defined
Malacology: A Programmable Storage System
Malacology: A Programmable Storage System
This is Photo Blend 3D
8 Metals Recovery Metals are one of the more obvious
8 Metals Recovery Metals are one of the more obvious
Malacology: A Programmable Storage System
ISPRS Journal of Photogrammetry & Remote Sensing 59 (2005) 255–277
Mutual exclusion The simplest way that threads interact is through
Refactoring: Improving the Design of Existing Code
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
120/John Grier Hibben
Object space versus world space Every object in Maya has
Object space versus world space Every object in Maya has
262 International Journal of Fuzzy Systems, Vol. 14, No. 2, June 2012
A Taxonomy of Cognitive Artifacts 1
A Taxonomy of Cognitive Artifacts 1
3D scanning seeks to digitize the real world to allow
cation task where an object model is updated over time
Sometimes an object pronoun is used as the object of
2018 IEEE Third International Conference on Data Science in Cyberspace
2018 IEEE Third International Conference on Data Science in Cyberspace
2018 IEEE Third International Conference on Data Science in Cyberspace
Downloaded from http://iranpaper.ir
Chapter 10
both of the real world in which we live and
our development has been heavily based on a pipeline implementation
USOO9703554B2
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/325735814
144 Semantic Tasks
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/275407115
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/275407115
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/275407115
tracking technology enables cognitive researchers to capture vast amounts of
Software Architecture for Automating Cognitive
Software Architecture for Automating Cognitive
Software Architecture for Automating Cognitive
Software Architecture for Automating Cognitive
Unreal Engine 4
Spillner
2019 IEEE 5th World Forum on Internet of Things (WF-IoT)
Computer Communications 139 (2019) 32–57
Computer Communications 139 (2019) 32–57
ARTICLE IN PRESS
ARTICLE IN PRESS
Downloaded from https://iranpaper.ir
2/26/2016 Fashion Theory: a Conceptual Framework by George B. Sproles
Fashion Theory: a Conceptual Framework
2/26/2016 Fashion Theory: a Conceptual Framework by George B. Sproles
کامپیوتر
Crystal: Software-Defined Storage for
CAP 505