iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ scheme
جزئیات خدمات ترجمه در ترجمه تخصصی
data
standard
classification
شبکه
cluster
cluster
cluster
active queue management
The 10th Annual IEEE- CCNC Smart Spaces and Sensor Networks
Journal of Network and Computer Applications 41 (2014) 379–388
Correctness
Correctness
IEEE TRANSACTIONS ON COMPUTERS, VOL. 53, NO. 3, MARCH 2004 241
Abstract
ADVANCED CODING TECHNIQUES
264 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—II: EXPRESS BRIEFS, VOL. 61, NO. 4, APRIL 2014
Tetrahedron 67 (2011) 3406e3411
Scalable Packet Classification
The structures of the prepared compounds were established from their
The structures of the prepared compounds were established from their
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—II: EXPRESS BRIEFS, VOL. 58, NO. 7, JULY 2011 407
2010 Second International Workshop on Education Technology and Computer Science
602 IEEE TRANSACTIONS ON BROADCASTING, VOL. 57, NO. 2, JUNE 2011
Efficient and Fault-Diagnosable Authentication
Available online at www.sciencedirect.com
Review
Advances in Engineering Software 37 (2006) 601–608
A Comprehensive Study of Visual Cryptography
A robust chaotic algorithm for digital image steganography a b
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
Computers and Electrical Engineering xxx (2014) xxx–xxx
Computers and Electrical Engineering xxx (2014) xxx–xxx
Optik 125 (2014) 6117–6122
Optik 125 (2014) 6117–6122
International Journal of the Physical Sciences Vol. 6(21), pp. 5051-5053, 30 September, 2011
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
198 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 27, NO. 1, FEBRUARY 2012
REVIEW ▌2383
REVIEW ▌2383
Computer Networks 73 (2014) 185–194
J. Shanghai Jiaotong Univ. (Sci.), 2014, 19(4): 466-475
Multimedia Support in Wireless Mesh Networks
Highly Reliable and Power Efficient NOC
This paper first analyzes the mechanism of how BF causes
This paper first analyzes the mechanism of how BF causes
Sasmita Mishra et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 4 (3) , 2013, 451-456
spectrumlike method to insert watermark into the perceptually most significant
An Adaptive Feedback Control Scheme for Resource
An Adaptive Feedback Control Scheme for Resource
An Adaptive Feedback Control Scheme for Resource Allocation in Wireless
Wireless PersCommun(2014)78:247–269
CHAPTER 8. PRIVACY IN ONLINE TRANSACTIONS 138
s i20 took off with the government scrappage scheme a
CHAPTER 8. PRIVACY IN ONLINE TRANSACTIONS 138
Advances in Engineering Software 37 (2006) 601–608
Advances in Engineering Software 37 (2006) 601–608
Advances in Engineering Software 37 (2006) 601–608
Essays
Fig. 1.General scheme of the SELEX method using the DNA library.
The Application of Pooled DNA Sequencing inDisease Association Study Table
2012 International Conference on Systems and Informatics (ICSAI 2012)
hoc networks have been extensively investigated by the research community
we propose a novel approach to secure ownership transfer in
based on the hardness of the Learning Parity with Noise
ONDM 2014, 19-22 May, Stockholm, Sweden
we propose a novel approach to secure ownership transfer in
2013 International Conference on Connected Vehicles and Expo (ICCVE)
390 IEEETRANSACTIONSONINFORMATIONFORENSICSANDSECURITY,VOL.8,NO.2,FEBRUARY2013
222 JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 29, NO. 2, JANUARY 15, 2011
COMPNW 5303 No. of Pages 14, Model 3G
Optimization of Clustering in SPIN-C
JournalofBusinessResearch68(2015)878–882
A Multiobjective Ranking Based Finite States
Energy efficient and perceived QoS aware video routing over Wireless
Hindawi Publishing Corporation
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
created applications on a development platform that a cloud service
created applications on a development platform that a cloud service
created applications on a development platform that a cloud service
created applications on a development platform that a cloud service
created applications on a development platform that a cloud service
created applications on a development platform that a cloud service
IEEE WCNC'14 Track 3 (Mobile and Wireless Networks)
powerfulasagenericmethod,ititisquiteinefficientinpractice.
Iowa State University
Chin. Sci. Bull. (2014) 59(14):1597–1606 csb.scichina.com
Fractal image encoding with flexible classification sets
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
2012 International Conference on Systems and Informatics (ICSAI 2012)
AORC Technical meeting 2014
Stochastic Dynamics of Structures Ch 7
Applied Soft Computing 14 (2014) 609–622
Applied Soft Computing 14 (2014) 609–622
Applied Soft Computing 14 (2014) 609–622
Available online at www.sciencedirect.com
Wang et al. EURASIP Journal on Wireless Communications and Networking 2012, 2012:143
372 M. Ali et al./Information Sciences 305 (2015) 357–383
372 M. Ali et al./Information Sciences 305 (2015) 357–383
368 M. Ali et al./Information Sciences 305 (2015) 357–383
372 M. Ali et al./Information Sciences 305 (2015) 357–383
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE Globecom 2011 proceedings.
An overview of the femtocell conceptClaussen The femtocellconcept aims to
An overview of the femtocell conceptClaussen The femtocellconcept aims to
Coordination Chemistry Reviews 288 (2015) 118–143
Risk Engineering
Materials and Structures (2013) 46:161–172
efficiency and national wellbeing is difficult because these discourses are
Optics Communications 339 (2015) 153–156
Optics Communications 339 (2015) 153–156
1136 IEEE SYSTEMS JOURNAL, VOL. 8, NO. 4, DECEMBER 2014
1136 IEEE SYSTEMS JOURNAL, VOL. 8, NO. 4, DECEMBER 2014
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎–∎∎∎
Appl. Sci. 2013, 3, 656-674; doi:10.3390/app3040656
Wireless Pers Commun (2015) 84:2035–2053
Enabling Public Verifiability and Data Dynamics
Enabling Public Verifiability and Data Dynamics for Storage Security in
Enabling Public Verifiability and Data Dynamics
Enabling Public Verifiability and Data Dynamics
IMPROVED HUFFMAN CODING USING RECURSIVE SPLITTING.
IMPROVED HUFFMAN CODING USING RECURSIVE SPLITTING.
INS 11333 No. of Pages 17, Model 3G
Journal of Network and Computer Applications 59 (2016) 198–207
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows
1136 IEEE SYSTEMS JOURNAL, VOL. 8, NO. 4, DECEMBER 2014
1136 IEEE SYSTEMS JOURNAL, VOL. 8, NO. 4, DECEMBER 2014
1136 IEEE SYSTEMS JOURNAL, VOL. 8, NO. 4, DECEMBER 2014
Heterogeneous wireless sensor network consists of wireless sensor nodes with
The proposed scheme employs two types of sensor nodes that
C03 06/30/2010 11:43:43 Page 71
C04 06/30/2010 12:0:55 Page 95
The proposed scheme employs two types of sensor nodes that
In order to solve the contradiction between the connectivity of
In order to solve the contradiction between the connectivity of
In order to solve the contradiction between the connectivity of
In order to solve the contradiction between the connectivity of
In order to solve the contradiction between the connectivity of
Powered Wireless Sensor Networks Basic security of data transmission in
This schemecan reduce the authenticating process as short as possible
This schemecan reduce the authenticating process as short as possible
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
Journal of Molecular Catalysis A: Chemical 391 (2014) 208–222
A Study on Local Repair Routing Algorithm based on
A Study on Local Repair Routing Algorithm based on
s-XML: An Efficient Mapping Scheme for Storing XML Data in a Relational
Project Code: WJM5110
INTEGRATION, the VLSI journal 52 (2016) 41–50
LOFT: A low-overhead fault-tolerant routing scheme for 3D NoCs
LOFT: A low-overhead fault-tolerant routing scheme for 3D NoCs
CCECE 2014 1569889547
Calhoun: The NPS Institutional Archive
Calhoun: The NPS Institutional Archive
International Journal of Computer Applications (0975 – 8887)
The organic segment is connected to the isocyanide group via
we propose a novel adaptive power control scheme for IoT
we propose a novel adaptive power control scheme for IoT
we propose a novel adaptive power control scheme for IoT
CASE 8
24
Computer Networks 110 (2016) 79–90
It defines security constructs and operating procedures that must be
It defines security constructs and operating procedures that must be
Table 4.7: Compression results using BWCA Classic chain for Lukas corpus[72]. These tests show that BWCA performances are, in average (for the 20 or 100 images tested), between Lossless JPEG and JPEG2000. For 100 images tested, 10
During the twentieth century chemistry changed for ever the way
IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 27, NO. 4, OCTOBER 2012 2133
A New Chaos-based Image Cipher Using a Hash
مA New Chaos-based Image Cipher Using a
A New Chaos-based Image Cipher Using a Hash
An Enhanced Broadcasting Scheme for IEEE 802.11p
An Enhanced Broadcasting Scheme for IEEE 802.11p
Computer Communications 29 (2006) 3037–3050
Computer Communications 29 (2006) 3037–3050
One of the most effective methods of secure communications based
One of the most effective methods of secure communications based
Downloaded from http://iranpaper.ir
One of the most effective methods of secure communications based
Cache-aware Named-data Forwarding in Internet of
Cache-aware Named-data Forwarding in Internet of
A Survey of Provably Secure Searchable Encryption
ARTICLE IN PRESS
ARTICLE IN PRESS
ARTICLE IN PRESS
ARTICLE IN PRESS
J. Vis. Commun. Image R. 42 (2017) 161–172
F. Soroush et al. / Agricultural Water Management 116 (2013) 160–174 163
Evaluation of canopy interception schemes in land
Page 7 of 77 AIChE Journal
AIChE Journal Page 8 of 77
AIChE Journal Page 20 of 77
Page 41 of 77 AIChE Journal
Accepted Manuscript
s behalf even when the user is disconnected from the
s behalf even when the user is disconnected from the
s behalf even when the user is disconnected from the
s behalf even when the user is disconnected from the
detected. A conditional reference scheme and the proposed scheme
Wireless Pers Commun
Downloaded from http://iranpaper.ir
JID:APNUM AID:2871 /FLA [m3G; v1.142; Prn:28/10/2014; 15:38] P.1 (1-17)
JID:APNUM AID:2871 /FLA [m3G; v1.142; Prn:28/10/2014; 15:38] P.13 (1-17)
JID:APNUM AID:2871 /FLA [m3G; v1.142; Prn:28/10/2014; 15:38] P.13 (1-17)
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
257
280 R. QU AND R. P. AGARWAL
57
Corinthia Hotel Our design intent for the exterior lighting of
Nonlinear Analysis: Modelling and Control, 2004, Vol. 9, No. 3, 247–258
Nonlinear Analysis: Modelling and Control, 2004, Vol. 9, No. 3, 247–258
PervasiveandMobileComputing4(2008)658–680
Information Sciences xxx (2013) xxx–xxx
Downloaded from http://iranpaper.ir
J Supercomput (2015) 71:4623–4645
J Supercomput (2015) 71:4623–4645
J Supercomput (2015) 71:4623–4645
J Supercomput (2015) 71:4623–4645
International Journal of Network Security, Vol.14, No.2, PP. 71-79, Mar. 2012 71
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
Available online at www.sciencedirect.com
PervasiveandMobileComputing4(2008)658–680
Information Sciences xxx (2013) xxx–xxx
PervasiveandMobileComputing4(2008)658–680
Commun. Korean Math. Soc. 31 (2016), No. 2, pp. 395–414
IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 19, NO. 2, SECOND QUARTER 2017 721
Downloaded from http://iranpaper.ir
Ava ailable online att www.sciencedirect.com
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2742020, IEEE Access
Tropical forest
we consider the privacy of SCNINR schemes in a network
we consider the privacy of SCNINR schemes in a network
we consider the privacy of SCNINR schemes in a network
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
1
2
1
2
Fully Homomorphic Encryption with Relatively Small Key and
3 Our Somewhat Homomorphic Scheme
Downloaded from http://iranpaper.ir
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
Katz
MADDAH-ALI AND NIESEN: FUNDAMENTAL LIMITS OF CACHING 2857
2858 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 60, NO. 5, MAY 2014
MADDAH-ALI AND NIESEN: FUNDAMENTAL LIMITS OF CACHING 2859
Wireless Pers Commun (2016) 89:93–118
PEDIA ORIGINALRESEARCH TRIC OBESITY doi:10.1111/j.2047-6310.2013.00167.x
applied
applied
Appl. Sci. 2017, 7, 1069 15 of 22
This article is made available via the ACS COVID-19 subset for unrestricted RESEARCH re-use
192 Vol. 7, No. 2 / February 2020 / Optica
Downloaded from https://iranpaper.ir
IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 10, MAY 15, 2021 8387
IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 10, MAY 15, 2021 8387
Received July 27, 2021, accepted August 9, 2021, date of publication August 11, 2021, date of current version August 19, 2021.
Establishing Pairwise Keys in Distributed
Information and Computation 146, 1�23 (1998)
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIE.2021.3055165, IEEE
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/LWC.2020.2994643, IEEE Wireless
ABSTRACT
ABSTRACT
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2016.2572203, IEEE
Multimedia Tools and Applications
Multimedia Tools and Applications
Nomenclature
IEEETRANSACTIONSONSIGNALPROCESSING,VOL.63,NO.3,FEBRUARY1,2015 555