iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ random
جزئیات خدمات ترجمه در ترجمه تخصصی
test
test
ریاضی math_Fourier_Transforms
function
International Journal of Computer Applications (0975 – 8887)
JournalofClassification30:453-473(2013)
ELEMENTS OF
Advances in Engineering Software xxx (2013) xxx–xxx
8
how to improve skill and technique Overloading on repetitious training
APP-PART1
20 CONTENTS
APP-PART1
APP-PART2
02-Viswanathan.qxd 1/10/2005 12:40 PM Page 97
31 Classical (Psychometric) Test Theory
Chapter 3
35th Annual IEEE Conference on Local Computer Networks LCN 2010, Denver, Colorado
Impact of Node Mobility on MANET Routing
Reliability optimization of an electric power system by biomass fuelled
Energy and Power Engineering, 2012, 4, 59-66
Energy and Power Engineering, 2012, 4, 59-66
ممنون Contents Preface xi Glossary xiii 1 Introductiontosimulation andMonteCarlo 1
Contents Preface xi Glossary xiii 1 Introductiontosimulation andMonteCarlo 1 2
Sign language recognition using depth camera and FMLRF Neda khanbani1
Neural Process Lett
Neural Process Lett
Learning to Rank with Extreme Learning Machine
Advanced
Advanced
The Statistical Interpretation of Degrees of Freedom
6
A Cognitive System for Adaptive Decision Making
K22172
60 2 Density Estimation
60 2 Density Estimation
OptiRisk Systems: White Paper Series
Search and Replication in
6
6
6
FUZZY FILTERS OF BE-ALGEBRAS BASED ON THE THEORY
Robust structural topology optimization under random field
Topology optimization of continuum structures under uncertainty – A Polynomial Chaos approach
USOO8972403B2
This article was downloaded by: [188.209.171.221]
Topology Optimization under Uncertainty
Finite Elements in Analysis and Design 63 (2013) 69–79
ComputerPhysicsCommunications196(2015)390–397
ComputerPhysicsCommunications196(2015)390–397
ComputerPhysicsCommunications196(2015)390–397
Abstract—This paper focuses on the energy optimal operation capabilities as well as system modeling and control methods
ComputerPhysicsCommunications196(2015)390–397
ComputerPhysicsCommunications196(2015)390–397
TwoMultivariateGeneralizationsofPointwiseMutualInformation
TwoMultivariateGeneralizationsofPointwiseMutualInformation
EngineeringGeology198(2015)30–39
Chapter 20
LearningRandomKernelApproximationsforObjectRecognition
CHAPTER 12
AcceptedManuscript
CHAPTER 4
Is targeted advertising always bene�cial ?
4 Eduard Gabriel B az avan, Fuxin Li, and Cristian Sminchisescu
8 Eduard Gabriel B az avan, Fuxin Li, and Cristian Sminchisescu
Journal of Hydrology, 82 (1985) 285--306 285
Journal of Hydrology, 82 (1985) 285--306 285
E1C04 09/14/2010 14:7:44 Page 150
E1C05 09/14/2010 14:36:25 Page 161
E1C05 09/14/2010 14:36:25 Page 161
Path-loss: two-ray model
Path-loss: two-ray model
STOCK PORTFOLIO OPTIMIZATION 83
New statistical analysis in marketing research with fuzzy data
Introduction to Queueing Theory and
Practical aspects of security certification for commercial
Practical aspects of security certification for commercial
to the channel before transmitting in order to avoid collisions
2
Applied Statistics
Received March 26, 2013, accepted May 24, 2013, date of publication August 15, 2013, date of current version August 26, 2013.
Expert Systems with Applications 40 (2013) 6253–6257
Expert Systems with Applications 40 (2013) 6253–6257
Chapter 2
CHAPTER 5:
CHAPTER 5:
Ansari Lari and Golroo 1
Ansari Lari and Golroo 1
Ansari Lari and Golroo 1
Elements of Information Theory - cover
Hydrosystems Engineering
Hydrosystems Engineering
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 6, JUNE 2010, ISSN 2151-9617
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 6, JUNE 2010, ISSN 2151-9617
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 6, JUNE 2010, ISSN 2151-9617
CHAPTER 3:
CHAPTER 3:
CHAPTER 3:
Convergence of Probability Measures WILEY SERIES IN PROBABILITY AND STATISTICS
Convergence of Probability Measures WILEY SERIES IN PROBABILITY AND STATISTICS
3949
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
A Hybrid Bat Algorithm with Path
A Hybrid Bat Algorithm with Path Relinking for the Capacitated
A Hybrid Bat Algorithm with Path Relinking for the Capacitated
A Hybrid Bat Algorithm with Path Relinking for the Capacitated
A Hybrid Bat Algorithm with Path Relinking for the Capacitated
A Hybrid Bat Algorithm with Path Relinking for the Capacitated
a b s t r a c t Our work
Computers & Industrial Engineering 87 (2015) 311–316
The MCMC estimation methods (see Chapter 2 of this book for a fuller
AIP Method
Fig. 5.5 Likelihood for ω00 in oneway ANOVA with ؟؟؟؟, and the meansquare between equal to one standard deviation below its expected value. True valueof ω00 = 5.0. 5.4.3 Inferences Concerning Random Effects
ص 218 Short Time Series The “small n, large J” scenario arises in many studies of individual change. For
journal of information security and applications 20 (2015) 11e25
unwilling to participate and rather rely on small but fixed
unwilling to participate and rather rely on small but fixed
Markov Chains
PhysicaD323–324(2016)73–79
The P ageRank Citation Ranking
This article was downloaded by: [McMaster University]
1
Æ
TraceExtractionforMobilityinCivilAeronautical CommunicationNetworksSimulation 55
Introduction
STOCHASTICINTERESTRATES 221
474 CHAPTER 16 EXPERIMENTAL AND PANEL DATA
Computers and Structures 192 (2017) 96–113
PROBABILITY AND RANDOM VARIABLES
PROBABILITY AND RANDOM VARIABLES
10 Variance of a Random Variable
since the middle term vanishes
x = 0,l,2,...,n
10 Variance of a Random Variable
m S. Let X be a random variable with mean and variance σ'. Show that ?ϊ{\Χ- \>ηÌ<σ'/ιÌ', ( f > 0 ) .
Neurocomputing 275 (2018) 278–287
Quantum Cryptography: A Survey
Pseudo Random Signal Processing Pseudo Random
pubs.acs.org/Macromolecules Article
pubs.acs.org/Macromolecules Article
128 4 Making Statistical Inferences from Samples
The attack can be modeled via a vector starting from