<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Analytical Wideband Model for Strip/Slit Gratings Loaded With Dielectric Slabs
2
Analytical Wideband Model of a Common-Mode Choke
3
Analytical winding foil thickness optimisation of inductors conducting harmonic currents
4
Analytical winding size optimisation for different conductor shapes using Ampere´s law
5
Analytical write field prediction for perpendicular recording heads
6
Analytical yield prediction considering leakage/performance correlation
7
Analytical, experimental, and numerical studies of angular memory signatures of waves scattered from 1-dimensional rough surfaces
8
Analytical, experimental, and numerical studies of angular memory signatures of waves scattered from one-dimensional rough surfaces
9
Analytical, numerical and experimental approach to thermal analysis and design of a travelling wave tube
10
Analytical, numerical, and experimental investigation of guided waves on a periodically strip-loaded dielectric slab
11
Analytical, numerical, and experimental methods for through-the-wall radar imaging
12
Analytical, Numerical-, and Measurement–Based Methods for Extracting the Electrical Parameters of Through Silicon Vias (TSVs)
13
Analytical, Scaleable Large Signal Noise Model for GaAs and InP MMIC Applications
14
Analytical/computational studies of the ground thermal characteristics for underground battery vault applications
15
Analytical/Experimental Hybrid Approach Based on Spectral Power Distribution for Quantitative Degradation Analysis of Phosphor Converted LED
16
Analytical/ML Mixed Approach for Concurrency Regulation in Software Transactional Memory
17
Analytical/Numerical Solution for the Lagrangian Flamelet Model Equations
18
Analytical-based approach for capacitor placement with gradient error compensation and device correlation enhancement in analog integrated circuits
19
Analytical-Based High-Level Simulation of the Microthreaded Many-Core Architectures
20
Analytical-Based Partial Volume Recovery in Mouse Heart Imaging
21
Analytical-Finite Element hybrid model for CMUT arrays with arbitrary membrane geometry
22
Analytically and accurately determined quasi-static parameters of coupled microstrip lines
23
Analytically based extraction of Foster-like frequency-independent antenna equivalent circuits
24
Analytically calculating membrane displacement and the equivalent circuit model of a circular CMUT cell
25
Analytically computing the flux linked by a switched reluctance motor phase when the stator and rotor poles overlap
26
Analytically Computing Winding Currents to Generate Torque and Levitation Force of a New Bearingless Switched Reluctance Motor
27
Analytically derived TOA-DOA distributions of uplink/downlink wireless-cellular multipaths arisen from scatterers with an inverted-parabolic spatial distribution around the mobile
28
Analytically derived TOA-DOA statistics of uplink/downlink wireless multipaths arisen from scatterers on a hollow-disc around the mobile
29
Analytically Derived Uplink/Downlink TOA and 2-D-DOA Distributions With Scatterers in a 3-D Hemispheroid Surrounding the Mobile
30
Analytically derived uplink/downlink TOA and 2D-DOA distributions with scatterers in a 3D hemispheroid surrounding the mobile
31
Analytically derived uplink/downlink TOA/DOA distributions with multi-Gaussian model of scatterers´ spatial distribution
32
Analytically determined quasi-static parameters of shielded or open multiconductor microstrip lines
33
Analytically driven capacitor control for voltage spread reduction
34
Analytically evaluating the impact of wireless channel behavior on an energy-efficient rate-controlled video transmission system
35
Analytically Expressed Dispersion Diagram of Unit Cells for a Novel Type of Holographic Surface
36
Analytically extracted ZTC point for GaAs MESFET
37
Analytically modeling a fault-tolerant messaging protocol
38
Analytically Modeling Application Execution for Software-Hardware Co-design
39
Analytically modeling pipeline paging for wireless systems
40
Analytically modeling power and performance of a CNN system
41
Analytically Modeling Unreliable Parallel Processing Systems with General Task Time Distributions
42
Analytically redundant controllers for fault tolerance: Implementation with separation of concerns
43
Analytically solvable model of photonic crystal structures and novel phenomena
44
Analytically solving radial distortion parameters
45
Analytically solving the Fokker-Planck equation for the statistical characterization of the phase noise in envelope detection
46
Analytically unified DC/small-signal/large-signal circuit design
47
Analytically unravelling inverter output currents
48
Analytically-based approach for the analysis of MRI volume coil loaded with multilayered cylinder
49
Analytically-defined collaborative shape modeling in VRML
50
Analytically-derived explicit closed-form spatial-correlation function for the landmobile uplink with scatterers located stochastically as nonhomogeneous Poisson
51
Analytically-designed multi-beam arrays with predictable sidelobes
52
Analytically-designed planar aperiodic arrays in the presence of mutual coupling
53
Analytically-guided-sampling particle filter applied to range-only target tracking
54
Analytically-selected multi-hypothesis incremental MAP estimation
55
Analytical-numerical approach for levitation force calculation of a cylindrical bearing with permanent magnets used in an electric meter
56
Analytical-Numerical Calculation of Diffraction Coefficients for a Circular Impedance Cone
57
Analytical-numerical hybrid model for flux-switching permanent magnet machines
58
Analytical-numerical investigation of the nonlinear equation for a synthesis problem of waveguide array
59
Analytical-numerical study of the handoff area sojourn time
60
Analytical-Transformation System for Manipulator Kinematics and Dynamics Modelling
61
Analyticity of electromagnetic fields in regions characterized by analytic dielectric parameters and analytic sources
62
Analyticity of entropy rate in families of hidden markov chains
63
Analyticity of Entropy Rate in Families of Hidden Markov Chains (II)
64
Analyticity of Entropy Rate of Hidden Markov Chains
65
Analyticity of Entropy Rate of Hidden Markov Chains With Continuous Alphabet
66
Analyticity, causality, energy conservation and the sign of the imaginary part of the permittivity and permeability
67
Analyticity, Convergence, and Convergence Rate of Recursive Maximum-Likelihood Estimation in Hidden Markov Models
68
Analytic-numeric considerations for contactless reader modulation
69
Analytic-numerical solution for 2D Veselago lens
70
Analytics and algorithms for geometric average trigger reset options
71
Analytics and information integration for smart grid applications
72
Analytics and Transactive Control Design for the Pacific Northwest Smart Grid Demonstration Project
73
Analytics as a service delivery model for the cloud
74
Analytics at Wimbledon: Learning for the enterprise: Game, Set and Tweet
75
Analytics driven master planning for Mecca: Increasing the capacity while maintaining the spiritual context of HAJJ pilgrimage
76
Analytics Ecosystem Transformation: A Force for Business Model Innovation
77
Analytics for distributed smart Grid sensing
78
Analytics for Product Planning: In-Depth Interview Study with SaaS Product Managers
79
Analytics for similarity matching of IT cases with collaboratively-defined activity flows
80
Analytics for Software Project Management -- Where are We and Where do We Go?
81
Analytics Goes on Location with New Approaches
82
Analytics in the age of Big Data and the Internet of Things
83
Analytics of Industrial Operational Data Inspired by Natural Language Processing
84
Analytics on historical data using a clustered insert-only in-memory column database
85
Analytics over Big Data: Exploring the Convergence of DataWarehousing, OLAP and Data-Intensive Cloud Infrastructures
86
Analytics to Improve Service in a Pre-admission Testing Clinic
87
Analytics Using Activity Trackers in the Field of Education
88
Analytics, Machine Learning, and the Internet of Things
89
Analytics: Key to Go from Generating Big Data to Deriving Business Value
90
Analytics-as-a-Service (AaaS) Tool for Unstructured Data Mining
91
Analytics-based optimization for smart grid operations
92
Analytics-Based Solutions for Improving Alert Management Service for Enterprise Systems
93
Analytics-Driven Dashboards Enable Leading Indicators for Requirements and Designs of Large-Scale Systems
94
Analytics-driven dynamic game adaption for player retention in Scrabble
95
Analytics-Enabled Disaster Preparedness and Emergency Management
96
Analytics-Modulated coding of surveillance video
97
Analytic-Wavelet-Ridge-Based Detection of Dynamic Eccentricity in Brushless Direct Current (BLDC) Motors Functioning Under Dynamic Operating Conditions
98
Analyzable Modeling of Legacy Communication in Component-Based Distributed Embedded Systems
99
Analyzation and Simulation of Underwater Laser Communication Based on Monte Carlo Mechanism
100
Analyzation of current characteristics on untransposed double-circuit lines
101
Analyzation of EMP coupling to multi-conductor transmission lines based on the over-relaxation iterative methods
102
Analyzation tools with parameter modification in field of power electronics
103
Analyze 3-D Knee Kinematics after Anterior Cruciate Ligament Reconstruction Using MDCT and Digital Radiography
104
Analyze a Privacy-Preserving Vehicular Communication Protocol and Propose a New One
105
Analyze about Network Businessmen Development Approaches under New Business Civilization
106
Analyze about time synchronization technique in auto-test network system
107
Analyze and calculation damage rate of Terminal Sensitive Projectile based on Monte Carlo Method
108
Analyze and Comment on Spectral Efficiency of VMSK Modulation
109
Analyze and compare the efficiency of two-level and three-level inverter in SVPWM
110
Analyze and design 10-GHz 0.8-V
DD
-117dBc/Hz quadrature LC-VCO in 120nm CMOS technology
111
Analyze and Design High-Speed Power Delivery Networks Using New Multiinput Impedances in Printed Circuit Boards
112
Analyze and design of signal generator for regional radio navigation system
113
Analyze and design receiving system of UV communication
114
Analyze and detect malicious code for compound document binary storage format
115
Analyze and evaluate on the investment risks of the Serviced Apartments under the new Real Estate Regulation Policies —Take the developing Serviced Apartment in Jiao Nan as an example
116
Analyze and Evaluate the performance of SCTP at transport layer
117
Analyze and Fault Diagnosis by Multi-scale PCA
118
Analyze and improve lifetime in 3L-NPC inverter from power cycle and thermal balance
119
Analyze and Improve the Time Synchronization in EPA
120
Analyze and Improvement of BM Algorithm
121
Analyze and investigation of Luo DC-DC Converter with increased efficiency
122
Analyze and Model the Primitive Attacking Mechanisms of Malicious Codes
123
Analyze and optimize the silicide thickness in 45nm CMOS technology using Taguchi method
124
Analyze and Prevent the Security Risks of E-Commerce Privacy
125
Analyze and process atomic clock difference data with Hilbert-Huang Transform
126
Analyze and Recommend News Comments in E-Government
127
Analyze and reduce the impact of sampling delay on LCL converter with capacitor current feedback active damping
128
Analyze and research of the inverter for grid-connecting photovoltaic system
129
Analyze and research on fuel cam of locomotive diesel engine introduced from US
130
Analyze and Research on the Organizational Maturity and Its Evaluation System
131
Analyze and simulation of linear antenna array fed with composite right/left-handed transmission line
132
Analyze and Understand the Layout Characteristics of Ballot Image
133
Analyze assembly skills using a motion simulator
134
Analyze characteristics of sediment movement in Changjiang River Estuary under a typhoon storm by numerical simulation
135
Analyze Efficient Frontier of the Asset Portfolio Briefly: Based on MATLAB
136
Analyze Electromagnetic Compatibility of High Frequency Switching Power Supply by Finite Element Method of Harmonic Balance
137
Analyze for ERP System Importing Model on Game Theory
138
Analyze gain of distributed multichannel manufacturing automation protocol network
139
Analyze gravity tide signal based on ICA with PSO
140
Analyze grid from the perspective of a computing system
141
Analyze Impact of Context Information on Rate Adaptation Algorithm in Vehicular Communication
142
Analyze jitter to improve high-speed design
143
Analyze large-scale communication network behavior through mining TCP control segment information
144
Analyze Linearity and Time-Varying Characteristic of Continuous Detecting Distorted Current System Based on LMS Algorithm
145
Analyze motion texture in dance motion using self-organized criticality
146
Analyze Network Protocol´s Hidden Behavior
147
Analyze of anomalous characteristics of advanced focused detection with DC resistivity in tunnel
148
Analyze of current components in NMOS single event transient
149
Analyze of current control strategy based on vector control for Permanent-Magnet Synchronous Generator in wind power system
150
Analyze of dielectric coated personal communication systems (PCS) antenna and study of its field interaction with the user
151
Analyze of dual-axle four quadrant transducer motor operation mode
152
Analyze of input process parameter variation on threshold voltage in 45nm n-channel MOSFET
153
Analyze of liner influence in transtibial prosthetic taking into account tribological aspects
154
Analyze of low voltage ride-through on-site test platform and test method in medium and large PV power station
155
Analyze of permanent magnet loss of high speed permanent magnet synchronous motor for flywheel energy storage system
156
Analyze of Probabilistic Algorithms under Indeterministic Scheduler
157
Analyze of reallocation population process for hydroelectric projects in Brazil
158
Analyze of sympathovagal balance on ventricular tachyarrhythmia patients using wavelet packet transform
159
Analyze of TCP-based network traffic control on asymmetric links
160
Analyze of temporal and random variability of a 45nm SOI SRAM cell
161
Analyze of the blind equalization based on second-order statistics of the over-sampling signal
162
Analyze of the environment temperature effect over hydro-energetic buildings resistive transducers
163
Analyze of the interchannel interference of OFDM in time-varying channel
164
Analyze of the scour restoration characteristic of the bed material load in the downstream from the hydroproject
165
Analyze of the society right structure behind significant pollution incidents — Gas blowout accident in Kaixian county of Chongqing as an example
166
Analyze on cascadability of 2R O/E/O wavelength converter considering pattern and shape dependencies
167
Analyze on Demand Information Sharing to the Bullwhip Effect in a Simple Supply Chain
168
Analyze on Development Prospects of 300m Level Ultra-high CFRD from Shuibuya High CFRD
169
Analyze on Dynamic Frequency Characteristic of Industrial Electric Power Network under Power Situation when External Faults Occur
170
Analyze on response of runoff to climate change based on the modified GM(1,2) model
171
Analyze on the Forecasting Demand of Front-Line Worker in Logistics´ Industry
172
Analyze Overlapping Baker Square Wave Voltammograms Based on Data Mining
173
Analyze possible benefits of real-time taxi flow optimization using actual data
174
Analyze profit model of logistics outsourcing in the e-commerce enterprise
175
Analyze relationship of rainfall-runoff through the distributed hydrological modeling
176
Analyze reuse distance for multithreaded sparse iterative solver
177
Analyze the ATMOS configuration with VTH abolition logic in 4×1 MUX
178
Analyze the behavior model based on Verilog-A for Sallen-Key low-pass filter
179
Analyze the business service models of electric vehicles (EV) based batteries
180
Analyze the coherence of ambient noise in the bay of bengal ocean region
181
Analyze the context of ubiquitous computing through location measurement and time affirmation of CI & IC
182
Analyze the Digital Watermarking Security Demands for the Facebook Website
183
Analyze the distortion region in Gaussian broadcast channel by bandwidth compression and expansion using different coding schemes
184
Analyze the Dynamic Features of Rat EEG Using Wavelet Entropy
185
Analyze the electromagnetic scattering problem with the non-uniform high order FDTD method
186
Analyze the Impact of User Search Behavior on DHT-based P2P File Sharing System
187
Analyze the improved microporous Carrousel oxidation ditch process about the phosephorus and nitrogen removal and influencing factors
188
Analyze the Influencing Factors of Food Security by Bidirectional Analytic Hierarchy Process
189
Analyze the Mobile Phone TV Standard in China by Game Theory
190
Analyze the montanic pipeline construction bend and elbow measurement
191
Analyze the performance of GPRS DTU and the impact on the remote monitoring street lighting system basebd on GPRS
192
Analyze the position sensor and the axial exciting coil EMF of axial and radial air gap hybrid magnet circuit multi-coupling motor
193
Analyze the relationship between slowlight effect and parameters of double-parallel-microring structure
194
Analyze the requirement of product rendering software based on goal-oriented design method
195
Analyze the worm-based attack in large scale P2P networks
196
Analyze university network traffic to explore usage behaviour and to detect malicious activities
197
Analyze, a new tool for J-MASS
198
ANALYZE: a software system for biomedical image analysis
199
Analyzed binary computing
200
Analyzed Binary Computing
201
Analyzed Historical Data to Improve the Quality of Writing of Construction Specifications
202
Analyzed rate distortion model in standard video codecs for rate control
203
Analyze-NOW-an environment for collection and analysis of failures in a network of workstations
204
Analyze-NOW-an environment for collection and analysis of failures in a network of workstations
205
Analyzer for fluorescent biosensing application
206
Analyzer for profile measurement of a beam from a magnicon electron gun
207
Analyzer Interconnections for Direct Determination of Power-System Swing Curves [includes discussion]
208
Analyzer interconnections for power swing curves
209
Analyzer of the global navigation system signal sources parameters
210
Analyzer of the GNSS simulators parameters
211
Analyzer of transport streams in DVB systems suitable for educational purposes
212
Analyzer spatial energy characteristics pulsed and continuous laser radiation
213
Analyzers of instantaneous spectrum of TV-systems with adaptive predistortion of signal
214
Analyzes and Solves the Top Enterprise Network Data Security Issues with the Web Data Mining Technology
215
Analyzes IPTV Security Threats under the Triple Play
216
Analyzes of International Social Security System and Discussions on Perfecting Chinese Social Security System Especially for State-Own Incorporations
217
Analyzes of the processing performances of a multimedia database server
218
Analyzes of very high-q quartz crystal aimed to high quality 5 MHz resonators achievement
219
Analyzing & Enhancing energy Efficient Communication Protocol for Wireless Micro-sensor Networks
220
Analyzing 180° turns using an inertial system reveals early signs of progression of parkinson´s disease
221
Analyzing 2D current distributions by magnetic field measurements
222
Analyzing 2D temperature field problems in the improved element-free Galerkin method
223
Analyzing 3D Knee Kinematics Using Accelerometers, Gyroscopes and Magnetometers
224
Analyzing 60 GHz radio links for indoor communications
225
Analyzing a 2-D Cavity with Reinforced Concrete Walls Using Generalized Surface Integral Equations
226
Analyzing a bridgeless single stage LLC resonant PFC converter controlled by frequency and pulse width modulations techniques
227
Analyzing a class of decision problems: neural network based approach
228
Analyzing a Controller of a Power Distribution Unit Using Formal Methods
229
Analyzing a CSMA/CD protocol through a Systems of Communicating Machines Specification
230
Analyzing a deformable model using differential geometry
231
Analyzing a Digital Image in a Way that is Useful to a Student of Art
232
Analyzing a distributed slot assignment protocol by Markov chains
233
Analyzing a Fair Exchange E-commerce Protocol Using CSP and FDR
234
Analyzing a Family of Key Protection Schemes against Modification Attacks
235
Analyzing a full-duplex cellular system
236
Analyzing a human-based trust model for mobile ad hoc networks
237
Analyzing a new mechanism of air holes to suppress micro-bending loss
238
Analyzing a noise suppression circuit for impulse dividers using Haar wavelets
239
Analyzing a North American prairie wildfire using remote sensing imagery
240
Analyzing a novel controllable rectifier type SVC and de-icing device´s impact on the transient stability of power system
241
Analyzing a novel model of human blood glucose system at molecular levels
242
Analyzing a Paradox in Dempster-Shafer Theory
243
Analyzing a PowerPC
TM
620 microprocessor silicon failure using model checking
244
Analyzing a Process of Collaborative Game Design Involving Online Tools
245
Analyzing a real world scene sequence using fuzziness
246
Analyzing a self-organizing multi-hop protocol: Ease of simulations and need for real-world tests
247
Analyzing a single-period inventory problem with one-shot decision approaches
248
Analyzing a socio-technical visualization tool using usability inspection methods
249
Analyzing a stochastic inventory system for deteriorating items with stochastic lead time using simulation modeling
250
Analyzing a two-stage entry monitor for high-speed networks
251
Analyzing Abnormal Events from Spatio-temporal Trajectories
252
Analyzing academic and social usage of mobile telecommunications at a Nigerian University
253
Analyzing accelerated degradation data by nonparametric regression
254
Analyzing Access Timing of Removable Flash Media
255
Analyzing accuracy of GPS data for vehicular parameters
256
Analyzing acoustic imagery in 3-D: a case study
257
Analyzing active probing for practical intrusion detection in Wireless Multihop Networks
258
Analyzing Activity Behavior and Movement in a Naturalistic Environment Using Smart Home Techniques
259
Analyzing Actors and Their Discussion Topics by Semantic Social Network Analysis
260
Analyzing Agent-Based Models Using Category Theory
261
Analyzing Agent-Oriented Service Models based on SRMO
262
Analyzing aggregated characteristics of distributed wind farms
263
Analyzing Agricultural Economy Data with Computational Intelligence Method
264
Analyzing air combat simulation results with dynamic bayesian networks
265
Analyzing air conditioning load based on comfort
266
Analyzing algorithm for monitoring greensward in Golf course
267
Analyzing Algorithm of Multi-camera Multi-touch System for Educational Application
268
Analyzing algorithms in Wireless Body Area Sensor Networks: A survey
269
Analyzing Algorithms of Information Security
270
Analyzing Alternatives in Collaborative Technology of Software Contractor by Analytic Network Process
271
Analyzing Alzheimer´s disease gene expression dataset using clustering and association rule mining
272
Analyzing ameliorated nonnegative matrix factorization for wood image representation
273
Analyzing Amplify-and-Forward and Decode-and-Forward Cooperative Strategies in Wyner´s Channel Model
274
Analyzing an agent-based selective information retrieval
275
Analyzing an electromechanical actuator by Schwarz-Christoffel mapping
276
Analyzing an Implemented Mechanism of Intelligent System and Its Work Flow for Straightening Machine of Heavy Beam
277
Analyzing an improvement of MPLS-net structures for the decrease of dialogue transmission delay
278
Analyzing an Offender´s Journey to Crime: A Criminal Movement Model (CriMM)
279
Analyzing anatomical structures of branching topology through elastic matching of tree encodings
280
Analyzing Anchor-Links to Extract Semantic Inferences of a Web Page
281
Analyzing and addressing the impact of test fixture relays for multi-gigabit ATE I/O characterization applications
282
Analyzing and adjusting user runtime estimates to improve job scheduling on the Blue Gene/P
283
Analyzing and alleviating the impact of errors on an SRAM-based FPGA cluster
284
Analyzing and Assessing Conflicts in Knowledge Chain Based on Fuzzy Synthetic Assessment
285
Analyzing and Calculating Isolation between Antennas on Airplane Wireless System
286
Analyzing and calculating of the cogging torque of Halbach array permanent magnet motor
287
Analyzing and capturing articulated hand motion in image sequences
288
Analyzing and Categorization of the Business Model of Virtual Operators
289
Analyzing and Classifying the Yami Emotion Phrases Using Ontological Structure and Computation
290
Analyzing and Classifying User Search Histories for Web Search Engine Optimization
291
Analyzing and comparing architectural styles
292
Analyzing and comparing Montgomery multiplication algorithms
293
Analyzing and comparing the Montgomery multiplication algorithms for their power consumption
294
Analyzing and comparing thermal models of indoor and outdoor oil-immersed power transformers
295
Analyzing and Compensating for Rotor Time Constant Variation in Induction Machines at Flux-Weakening Operations
296
Analyzing and considering inertial effects in powered lower limb prosthetic design
297
Analyzing and controlling accuracy in stochastic circuits
298
Analyzing and Controlling Information Inference of Fine-Grained Access Control Policies in Relational Databases
299
Analyzing and controlling on the radiation interference of DC/DC module
300
Analyzing and controlling on the radiation interference of DC/DC module
301
Analyzing and Correlating Security Events Using State Machine
302
Analyzing and denoising of impulse voltage waveforms using multi-resolution wavelet analysis (MRA)
303
Analyzing and designing of a dual band active antennas
304
Analyzing and designing of lunar rover motion controller
305
Analyzing and Designing of the Classroom Teaching System Based on the Network
306
Analyzing and designing the cognitive architecture for wireless ad hoc networks
307
Analyzing and Detecting Malicious Flash Advertisements
308
Analyzing and detecting method of Android malware via disassembling and visualization
309
Analyzing and Detecting Review Spam
310
Analyzing and determining optimum on-board power architectures for 48 V-input systems
311
Analyzing and diagnosing interconnect faults in bus-structured systems
312
Analyzing and eliminating the causes of fault sensitivity analysis
313
Analyzing and enhancing direct NDP designs using a control-theoretic approach
314
Analyzing and enhancing the resilience of LTE/LTE-A systems to RF spoofing
315
Analyzing and enhancing the robustness of implicit representations
316
Analyzing and Establishing Data Model of SOA-based Distributed Application System
317
Analyzing and Estimating the project success with a hybrid method based on fuzzy theory and decision making analysis
318
Analyzing and evaluating business process by the Distance reachable matrix
319
Analyzing and evaluating fundamental design process of checkout system for artificial spacecraft
320
Analyzing and exploiting the structure of the constraints in the ILP approach to the scheduling problem
321
Analyzing and exploring feature detectors in images
322
Analyzing and extending hierarchical systems of linguistic rules
323
Analyzing and Extending MUMCUT for Fault-based Testing of General Boolean Expressions
324
Analyzing and filtering contour deformation
325
Analyzing and Forecasting Near-Miss Clones in Evolving Software: An Empirical Study
326
Analyzing and geo-visualizing individual human mobility patterns using mobile call records
327
Analyzing and identifying of cascading failure in supply chain networks
328
Analyzing and Implementing N-qubit Controlled Gates
329
Analyzing and Implementing Peer-to-Peer Systems with the PeerSE Experiment Environment
330
Analyzing and improvement of the thermopile output signal noise ratio of a calorimeter
331
Analyzing and Improving a BitTorrent Networks Performance Mechanisms
332
Analyzing and improving clustering based sampling for microprocessor simulation
333
Analyzing and improving delay defect tolerance in pipelined combinational circuits
334
Analyzing and Improving Internet Voting Protocol
335
Analyzing and Improving MPI Communication Performance in Overcommitted Virtualized Systems
336
Analyzing and Improving of Neural Networks used in Stereo Calibration
337
Analyzing and improving performance scalability of commercial server workloads on a chip multiprocessor
338
Analyzing and improving reliability: a tree-based approach
339
Analyzing and Improving Session Setup Latency of Push-to-Talk over Cellular
340
Analyzing and improving the IEEE 802.11-MAC protocol for wireless LANs
341
Analyzing and improving the latency and throughput performance of self-timed pipelines and rings
342
Analyzing and improving the resistance of overlays against bandwidth exhaustion attacks
343
Analyzing and Improving the Simulation Algorithm of IEEE 802.11DCF Error Frame Model in QualNet Simulator
344
Analyzing and improving the TCP flow fairness in 802.11 based ad hoc networks
345
Analyzing and Managing Role-Based Access Control Policies
346
Analyzing and managing the disturbance in a mining port stockyard system
347
Analyzing and minimizing effects of temperature variation and NBTI on active leakage power of power-gated circuits
348
Analyzing and Minimizing Random Access Delay for Delay-Sensitive Machine-to-Machine Communications: A New Perspective on Adaptive Persistence Control
349
Analyzing and Minimizing the Impact of Opportunity Cost in QoS-aware Job Scheduling
350
Analyzing and mitigating the Radiated Emissions from RF cell towers an initiative towards Green Communication
351
Analyzing and modeling an IMU for use in a low-cost combined vision and inertial navigation system
352
Analyzing and modeling BitTorrent: A game theory approach
353
Analyzing and modeling of a new resonance inverter for low power vehicular application
354
Analyzing and modeling of dynamic magnetic suspension plate in the electromagnetic launcher
355
Analyzing and modeling of far-end crosstalk in twisted multi-pair metallic cables
356
Analyzing and Modeling of Medical Data on Distributed Computing Infrastructures
357
Analyzing and modeling of uncertainty factors influencing product recyclability
358
Analyzing and modeling on optimized L-ratio of evaporator section to condenser section for micro heat pipe heat sinks
359
Analyzing and Modeling Open Source Software Bug Report Data
360
Analyzing and modeling performance of a new SMA actuator-based barrier structure
361
Analyzing and modeling spatio-temporal dependence of cellular traffic at city scale
362
Analyzing and Modeling Temporal Patterns of Human Contacts in Cellular Networks
363
Analyzing and modeling the 2D surface tracking patterns of polymeric insulation materials
364
Analyzing and modeling the failure behavior of Wireless Sensor Networks software under errors
365
Analyzing and Modeling the Influence of Workpiece Thickness on Geometry of Slot Machining Wire EDMs
366
Analyzing and Modeling the Performance in Xen-Based Virtual Cluster Environment
367
Analyzing and Modeling Workload Characteristics in a Multiservice IP Network
368
Analyzing and Modelling Office Activities
369
Analyzing and modifying Chord´s stabilization algorithm to handle high churn rates
370
Analyzing and Monitoring Learning Communities in a Serious Games Context
371
Analyzing and Optimizing Adaptive Modulation Coding Jointly With ARQ for QoS-Guaranteed Traffic
372
Analyzing and Optimizing Adaptive Modulation-Coding Jointly with ARQ for QoS-Guaranteed Traffic
373
Analyzing and optimizing energy efficiency of algorithms on DVS systems A first step towards algorithmic energy minimization
374
Analyzing and Optimizing Skype Peer-to-Peer System
375
Analyzing and predicting language model improvements
376
Analyzing and predicting Lifetime of trends using social networks
377
Analyzing and Predicting of Tianjin Coastal Water Quality by Fractional Theory
378
Analyzing and Predicting Security Event Anomalies: Lessons Learned from a Large Enterprise Big Data Streaming Analytics Deployment
379
Analyzing and Predicting Software Quality Trends Using Financial Patterns
380
Analyzing and processing intelligent maintenance systems data to use for planning spare parts supply chains
381
Analyzing and quantifying fault tolerance properties
382
Analyzing and recognizing walking figures in XYT
383
Analyzing and reducing error in 2-D frequency domain homogenization of windings for R, L parameters FE computation
384
Analyzing and reducing the environmental impact of the waste waters from the locomotives repair industry
385
Analyzing and re-engineering business processes using simulation
386
Analyzing and relating bug report data for feature tracking
387
Analyzing and relieving the impact of FCD traffic in LTE-VANET heterogeneous network
388
Analyzing and resolving anomalies in firewall security policies based on propositional logic
389
Analyzing and restraining on harmonic of the SPWM inverter
390
Analyzing and Re-structuring Product Line Dependencies
391
Analyzing and revising high-level robot behaviors under actuator error
392
Analyzing and scaling parallelism for network routing protocols
393
Analyzing and searching process of internet username and password stored in Random Access Memory (RAM)
394
Analyzing and Segmenting Finger Gestures in Meaningful Phases
395
Analyzing and simulating dynamic stability of large marine power station systems
396
Analyzing and Simulating the Inverse and the Direct Dynamics of Parallel Robot Stewart Platform
397
Analyzing and simulating the reduction in PV powerplant variability due to geographic smoothing in Ota City, Japan and Alamosa, CO
398
Analyzing and simulation of MEMS in VHDL-AMS based on reduced order FE-models
399
Analyzing and simulation of MEMS in VHDL-AMS based on reduced-order FE models
400
Analyzing and simulation on MANET system on satellite communication constellation
401
Analyzing and Studying of Dynamic Mechanism Model of Ethylene Distillation Column for Simulation and Control
402
Analyzing and summarizing the web server detection technology based on HTTP
403
Analyzing and synthesizing images by evolving curves
404
Analyzing and Systematizing Current Traceability Schemas
405
Analyzing and testing ATM network equipment using the Atmospheric Test Tool
406
Analyzing and Tracking Burning Structures in Lean Premixed Hydrogen Flames
407
Analyzing and tuning longitudinal-wave bands in periodic piezoelectric rods
408
Analyzing and understanding architectural characteristics of COM+ components
409
Analyzing and validating global fairness of TCP rate allocation
410
Analyzing and verifying locally clocked circuits with the concurrency workbench
411
Analyzing and verifying Petri net model of security protocol based on Maria
412
Analyzing and visualizing news trends over time
413
Analyzing and Visualizing Web Opinion Development and Social Interactions With Density-Based Clustering
414
Analyzing anomalies in anonymized SIP traffic
415
Analyzing Answers in Threaded Discussions Using a Role-Based Information Network
416
Analyzing anterior knee laxity with an arthrometer for assisting diagnosis of anterior cruciate ligament rupture
417
Analyzing AODV Control Packets and Throughput for Different Mobility Degrees and Multiflow Traffic
418
Analyzing appearance and contour based methods for object categorization
419
Analyzing application private information leaks with privacy Petri Net
420
Analyzing Arabic digit recognizer errors using spectrograms
421
Analyzing area and performance penalty of protecting different digital modules with Hamming code and triple modular redundancy
422
Analyzing Area Penalty of 32-Bit Fault Tolerant ALU Using BCH Code
423
Analyzing articulated motion using expectation-maximization
424
Analyzing Artifact Anomalies in a Temporal Structural Workflow for SBS
425
Analyzing artifacts in the time domain waveform to locate wire faults
426
Analyzing artifacts in the time domain waveform to locate wire faults
427
Analyzing Artificial Neural Networks and Dynamic Time Warping for spoken keyword recognition under transient noise conditions
428
Analyzing asking/bidding price in dynamic game for cooperative authentication
429
Analyzing aspects of cyber security standard for M&CS
430
Analyzing Assembler to Eliminate Dead Functions: An Industrial Experience
431
Analyzing Assisted Offloading of Cellular User Sessions onto D2D Links in Unlicensed Bands
432
Analyzing asymmetry biometric in the frequency domain for face recognition
433
Analyzing ATE interconnect performance for serial links of 10 Gbps and above
434
Analyzing Atoms Using the Spice Computer Program
435
Analyzing atrial electricity activity dynamical structure by recurrence complex network
436
Analyzing Attack Trees using Generalized Stochastic Petri Nets
437
Analyzing Attacks in Wireless Ad Hoc Network with Self-Organizing Maps
438
Analyzing autocorrelation fluctuation of EEG signal for estimating depth of anesthesia
439
Analyzing Automated Maintenance architectures to provide flexible smart maintenance capabilities
440
Analyzing Automobile Performance by Powertrain Simulation and Fuzzy Control
441
Analyzing autonomic activity in electrocardiography about general anesthesia by spectrogram with multitaper time-frequency reassignment
442
Analyzing auxiliary systems in nuclear generating stations
443
Analyzing available routing engines for InfiniBand-based clusters with Dragonfly topology
444
Analyzing bacteriological growth using wavelet transform
445
Analyzing basidiocarp motion due to naturally occurring forces by performing FEM on a portabella mushroom
446
Analyzing Behavior of Concurrent Software Designs for Embedded Systems
447
Analyzing Behavior of Less Interrupt Overhead Architecture for Effective Cache Utilization
448
Analyzing Behavioral Aspects of UML Design Class Models against Temporal Properties
449
Analyzing Behavioral Substitution of Web Services Based on Pi-calculus
450
Analyzing Behaviorial Data for Refining Cognitive Models of Operator
451
Analyzing behaviors of three-level PV inverter based on multivariate phase space reconstruction
452
Analyzing belief function networks with conditional beliefs
453
Analyzing Belief Re-revision by Consideration of Reliability Change in Legal Case
454
Analyzing BGP policies: methodology and tool
455
Analyzing bias cancellation techniques for high temperature analog applications
456
Analyzing BigData with Hadoop cluster in HDInsight azure Cloud
457
Analyzing Bike Repositioning Strategies Based on Simulations for Public Bike Sharing Systems: Simulating Bike Repositioning Strategies for Bike Sharing Systems
458
Analyzing bilinear neural networks with new curve fitting for application to human motion analysis
459
Analyzing biological signals with CMAC, a neural network
460
Analyzing BIST robustness
461
Analyzing BitTorrent Traf?c Across Large Network
462
Analyzing Block Scheduling Heuristics for Perioperative Scheduling Flexibility: A Case Study Perspective
463
Analyzing blood cell concentration as a stochastic process
464
Analyzing bone, blood vessels, and biomaterials with microcomputed tomography
465
Analyzing borders between partially contradicting fuzzy classification rules
466
Analyzing Boundary Device Logs on the In-memory Platform
467
Analyzing BPEL Compositionality Based on Petri Nets
468
Analyzing brain signals by combinatorial optimization
469
Analyzing bridging faults impact on EEPROM cell array
470
Analyzing Broadband Divide in the Farming Sector
471
Analyzing broad-band electromagnetics problems with commercial software¿time domain versus fFrequency domain
472
Analyzing broadband, free-field, absorber measurements
473
Analyzing BTI effects on retention registers
474
Analyzing Bus Load Data Using an FPGA and a Microcontroller
475
Analyzing business domain: a methodology and repository system
476
Analyzing business models for mobile augmented reality
477
Analyzing Cache Coherence Protocols for Server Consolidation
478
Analyzing cache performance for video servers
479
Analyzing cache performance on multi-stream execution processor
480
Analyzing caching benefits for YouTube traffic in edge networks — A measurement-based evaluation
481
Analyzing campus mobility patterns of college students by using GPS trajectory data and graph-based approach
482
Analyzing canopy spectra with polynomial expression and retrieval of chlorophyll concentration
483
Analyzing capacitor-based reconfigurable antennas using graph models
484
Analyzing capacity of cooperative MIMO using beamforming in measured channel data
485
Analyzing Carbon Nanotube interconnects in VLSI application
486
Analyzing carbon-fiber composite materials with equivalent-Layer models
487
Analyzing cardiac mapping data, object-oriented style
488
Analyzing cardiovascular variabilities in patients with heart failure
489
Analyzing cascading effects within infrastructure sectors for consequence reduction
490
Analyzing Cascading Failures in Smart Grids under Random and Targeted Attacks
491
Analyzing cause of supply chain competitive advantage based on price transferring mechanism between partners
492
Analyzing causes of failures in the Global Research Network using active measurements
493
Analyzing Cell Designs by Computer for Optimum Performnce
494
Analyzing Cell Designs by Conputer for Optimum Performance
495
Analyzing center of pressure progression during bed exits
496
Analyzing change effort in software during development
497
Analyzing Change Impact in Object-Oriented Systems
498
Analyzing change of eco-environment based on spatial data in the farming-pastoral region of Northern China
499
Analyzing Change over Time in Organizations´ Publics with a Semantic Network Include List: An Illustration with Facebook
500
Analyzing channel assignment with rearrangement in multi-channel wireless line networks
501
Analyzing Chaotic Phenomenon in Brushless DC Thruster Motor of Deepwater Robot with Lyapunov Exponent
502
Analyzing Chaotic Spectra of DC–DC Converters Using the Prony Method
503
Analyzing chaotic spectra of DC-DC converters using the Prony method
504
Analyzing characteristics of information propagation on social network graphs
505
Analyzing characteristics of malicious PDFs
506
Analyzing characteristics of Sagnac loop interferometric stress sensor
507
Analyzing Chat Conversations of Pedophiles with Temporal Relational Semantic Systems
508
Analyzing Checkpointing Trends for Applications on the IBM Blue Gene/P System
509
Analyzing Children´s Speech: An Acoustic Study of Consonants and Consonant-Vowel Transition
510
Analyzing Chronic Diseases with Latent Growth Models: An Analysis of Multiple Sclerosis
511
Analyzing circuit vulnerability to hardware Trojan insertion at the behavioral level
512
Analyzing circuits with widely separated time scales using numerical PDE methods
513
Analyzing City Blocks´ Properties Based on Mobile Data
514
Analyzing Civil Unrest through Social Media
515
Analyzing Close Friend Interactions in Social Media
516
Analyzing cluster degree of equipment manufacture industry in Shenyang
517
Analyzing cluster-head selection mechanisms and improving the LEACH
518
Analyzing code evolution to uncover relations
519
Analyzing Coexistence Issues in Wireless Radio Networks -- The Simulation Environment
520
Analyzing cognitive errors using a dynamic crew-simulation model
521
Analyzing Cognitive Network Access Efficiency Under Limited Spectrum Handoff Agility
522
Analyzing coherent brain networks with Granger causality
523
Analyzing collaboration in self-organizing complex systems of flow
524
Analyzing collaboration networks using simplicial complexes: A case study
525
Analyzing collective behavior in evolutionary swarm robotic systems based on an ethological approach
526
Analyzing Commercial Mobile Phones by a Domain Decomposition Approach
527
Analyzing commodities: Ambiguous differences between goods and services
528
Analyzing common-mode chokes for induction motor drives
529
Analyzing communication models for distributed thread-collaborative processors in terms of energy and time
530
Analyzing Communities vs. Single Agent-Based Web Services: Trust Perspectives
531
Analyzing Community Core Evolution in Mobile Social Networks
532
Analyzing Compatibility of BPEL Processes
533
Analyzing competitive effects of R&D
534
Analyzing Complex FTMS Simulations: a Case Study in High-Level Visualization of Ion Motions
535
Analyzing complex pulse RADAR signals
536
Analyzing complexity of enterprise IT capability based on CAS
537
Analyzing Complexity of Enterprise Production System Based on CAS Theory
538
Analyzing Component Importance in Multifunction Multicapability Systems Developmental Maturity Assessment
539
Analyzing component-based systems using the self-organizing map
540
Analyzing composability in a sparse encoding model of memorization and association
541
Analyzing computation offloading energy-efficiency measurements
542
Analyzing Concurrency Control Algorithms When User and System Operations Differ
543
Analyzing concurrency in computational networks
544
Analyzing Conductance of Mixed Carbon-Nanotube Bundles for Interconnect Applications
545
Analyzing configurations of authentication access points in cloud using attack graph
546
Analyzing conflicts between Clinical Trials from a patient perspective
547
Analyzing Conflicts between Decision-Makers in Determining Criteria to Evaluate Segmentation in Water Distribution Network
548
Analyzing conformance to clinical protocols involving advanced synchronizations
549
Analyzing Conformation of Fusion Protein on Bivalent Single-Chain Antibody with (Gly4Ser)n
550
Analyzing connectivity-based multi-hop ad-hoc positioning
551
Analyzing consistency of security policies
552
Analyzing Consumer Behavior on Residential Energy Efficiency Using Fuzzy Logic Model
553
Analyzing consumerization - Should enterprise business context determine session policy?
554
Analyzing contactor servomechanisms by frequency-response methods
555
Analyzing content development and visualizing social interactions in Web forum
556
Analyzing Content Life Cycle in Mobile Content Sharing Environment
557
Analyzing Context-Aware Service Development under MUPE Platform
558
Analyzing Contextualized Attention Metadata with Rough Set Methodologies to Support Self-regulated Learning
559
Analyzing continuous switching systems: theory and examples
560
Analyzing continuous-time ΔΣ Modulators with generic behavioral models
561
Analyzing contrast enhancement and watershed segmentation using quantitative information measuring
562
Analyzing control challenges for thermal energy storage in foodstuffs
563
Analyzing control system robustness
564
Analyzing controllability of a hardware circuit for its reuse
565
Analyzing Convergence and Rates of Convergence of Particle Swarm Optimization Algorithms Using Stochastic Approximation Methods
566
Analyzing Convergence in e-Learning Resource Filtering Based on ACO Techniques: A Case Study With Telecommunication Engineering Students
567
Analyzing conversations of Web services
568
Analyzing conversations using rich phrase patterns
569
Analyzing conversations with dynamic graph visualization
570
Analyzing convolutional encoders using realization theory
571
Analyzing convolutional neural networks for speech activity detection in mismatched acoustic conditions
572
Analyzing cooperative coevolution with evolutionary game theory
573
Analyzing cooperative lane change models for connected vehicles
574
Analyzing coordination among students in a software engineering project course
575
Analyzing Coordination when Solving Geometry Problems with the Dynamic Geometry Software
576
Analyzing core-periphery structure of complex product development using social network analysis
577
Analyzing corona breakdown with a finite element-based electromagnetic solver
578
Analyzing corporate communications policy using ethnographic methods
579
Analyzing Corporate Innovation using the Data Surface Mining Technique
580
Analyzing correlation between multiple traps in RTN characteristics
581
Analyzing correlation of resident activities based on infrared sensors
582
Analyzing course configurations for teaching object-oriented modeling and design
583
Analyzing creativity of students with neural networks
584
Analyzing credit evolution for credit-based incentive schemes in wireless mesh networks
585
Analyzing Critical Decision-Based Processes
586
Analyzing critical process models through behavior model synthesis
587
Analyzing critical thinking and factors influencing interactions in online discussion forum
588
Analyzing Cross-disciplinary Design Teams
589
Analyzing Cross-Sector Interdependencies
590
Analyzing crosstalk effects on a parallel bus using eye diagram
591
Analyzing crosstalk in the presence of weak bridge defects
592
Analyzing Crowd Labor and Designing Incentives for Humans in the Loop
593
Analyzing Cryptographic Protocols Using AI Planning Technology
594
Analyzing CUDA workloads using a detailed GPU simulator
595
Analyzing cultural contexts for communication
596
Analyzing Current Ripple in Variable-Frequency Boost Converter
597
Analyzing Customer Behavior Model Graph (CBMG) using Markov Chains
598
Analyzing customer satisfaction and service level using AI technique
599
Analyzing Cyber-Physical Energy Systems:The INSPIRE Cosimulation of Power and ICT Systems Using HLA
600
Analyzing cycle stealing on synchronous circuits with level-sensitive latches
601
Analyzing DAC waveform distortion due to finite settling time
602
Analyzing data into quantized components
603
Analyzing data locality in numeric applications
604
Analyzing data mining techniques for wireless sensor network protocols
605
Analyzing Data Prediction in Wireless Sensor Networks
606
Analyzing data sets with missing data: an empirical evaluation of imputation methods and likelihood-based methods
607
Analyzing Dataset with Noise in Geometric Fashion
608
Analyzing Decision-Making Patterns Based on Uncertain Information in a Supply Chain Environment
609
Analyzing Decorrelation of Multi-temporal SAR Data on InSAR
610
Analyzing deflection and torsion of MEMS Bridge
611
Analyzing Degradation Ecological Landscape Pattern for the Karst Plateau on the Basis of GIS Technologies
612
Analyzing delay limits of high-speed wireless ad hoc networks based on IEEE 802.11n
613
Analyzing delays in trajectories
614
Analyzing Delivery, Latency and Power Consumption
615
Analyzing dependability measures at the Electronic System Level
616
Analyzing dependence structure of the human brain in response to visual stimuli
617
Analyzing dependencies in large component-based systems
618
Analyzing deployment from the perspective of software handover and maintenance
619
Analyzing DICOM and non-DICOM Features in Content-Based Medical Image Retrieval: A Multi-Layer Approach
620
Analyzing differences between Internet information system software architectures
621
Analyzing differences in risk perceptions between developers and acquirers in OTS-based custom software projects using stakeholder analysis
622
Analyzing different aspects of social network usages on students behaviors and academic performance
623
Analyzing different cache replacement policies on cloud
624
Analyzing different validation and verification techniques for safety critical software systems
625
Analyzing differential regulatory networks modulated by continuous-state genomic features in glioblastoma multiforme
626
Analyzing digital overlay technique over marine voice channel for disaster dissemination
627
Analyzing discourse structure using lexical cohesion: a connectionist tool
628
Analyzing dispensing plan for emergency medical supplies in the event of bioterrorism
629
Analyzing Distance Measures for Symbolic Data Based on Fuzzy Clustering
630
Analyzing distortion in ASDMs with loop delay
631
Analyzing distortion of aircraft Structural part in NC machining based on FEM simulation
632
Analyzing distributed file synchronization techniques for educational data
633
Analyzing Distributed Java Applications by Automatic Centralization
634
Analyzing distributed whiteboard interactions
635
Analyzing Distribution and Evolution of Research Interests by Term Extraction and Ontology Learning
636
Analyzing Distribution of Implicit Semantic Information in Web Services
637
Analyzing dividend events with neural network rule extraction
638
Analyzing DNA Copy Number Changes Using Fused Margin Regression
639
Analyzing DNS activities of bot processes
640
Analyzing document logic structure by machine learning
641
Analyzing draft speak to craft radically concise text
642
Analyzing driver gaze behavior and consistency of decision making during automated driving
643
Analyzing Duration of Actions Implying Living Willingness Using Wearable Sensors
644
Analyzing dynamic cellular morphology in time-lapsed images enabled by cellular deformation pattern recognition
645
Analyzing dynamic coupling effect resulted by space operations with recursive formulation
646
Analyzing dynamic EMG and VMG signals of respiratory muscles
647
Analyzing dynamic information with spy and roassal: an experience report
648
Analyzing dynamic IPv6 address auto-configuration techniques for group IP-based vehicular communications
649
Analyzing Dynamic of Moisture Equilibrium in Oil-paper Insulation in Power Transformers for Efficient Drying
650
Analyzing dynamic performance of power systems over parameter space using normal forms of vector fields part II: Comparison of the system structure
651
Analyzing dynamic performance of power systems over parameter space using normal forms of vector fields, part I: Identification of vulnerable regions
652
Analyzing dynamic performance of power systems over parameter space using normal forms of vector fields. I. Identification of vulnerable regions
653
Analyzing dynamic performance of power systems over parameter space using normal forms of vector fields. I. Identification of vulnerable regions (Republished)
654
Analyzing dynamic performance of power systems over parameter space using normal forms of vector fields. II. Comparison of the system structure
655
Analyzing dynamic performance of power systems over parameter space using normal forms of vector fields-part I: identification of vulnerable regions
656
Analyzing dynamic performance of power systems over parameter space using normal forms of vector fields-part II: comparison of the system structure
657
Analyzing dynamic processes from the raw magnetic particle measurement signal
658
Analyzing dynamic voting using Petri nets
659
Analyzing dynamical simulations of intrinsically disordered proteins using spectral clustering
660
Analyzing dynamics of arthropod walking
661
Analyzing Early Requirements of Cyber-physical Systems through Structure and Goal Modeling
662
Analyzing eBay Platform Strategies: An Application of Meyer´s Product Platform Strategy Model
663
Analyzing ECL´s noise margin
664
Analyzing e-commerce process
665
Analyzing Economic Spatial-Temporal Disparities at County Level in Jiangsu Based on ESDA-GIS
666
Analyzing educational and social usage of mobile telecommunications in a South African university
667
Analyzing educational comments for topics and sentiments: A text analytics approach
668
Analyzing EEG scalp current density using the Hjorth estimator
669
Analyzing EEG signals under insulin-induced hypoglycemia in type 1 diabetes patients
670
Analyzing EEG signals using the probability estimating guarded neural classifier
671
Analyzing effect of bad measurement data on load flow and state estimation in power system
672
Analyzing effect of distraction caused by dual-tasks on sharing of brain resources using SOM
673
Analyzing effect of generation size in intra-session network coding for multiple flows of TCP traffic
674
Analyzing effect of loss differentiation algorithms on improving TCP performance
675
Analyzing Effect of Network Processor´s Cache Dependent Parameter on MPI Broadcast Performance
676
Analyzing effect of noise on LMS-type approaches to blind estimation of simo channels: Robustness issue
677
Analyzing Effectiveness of Workshops for Learning Agile Development Principles
678
Analyzing effects of cache parameters on memory power consumption of video applications
679
Analyzing effects of cost estimation accuracy on quality and productivity
680
Analyzing Effects of Electricity Subsidy on Social Welfare in Iran by Integrated System Approach and Artificial Neural Network
681
Analyzing effects of face modalities
682
Analyzing Effects of Intra-Uterine Cocaine Exposure on Adolescent Brain Structure with Symmetric Diffeomorphisms
683
Analyzing Effects of Monetary Policy Change on Government Bond Yield Curve in Exchange by Using GRNN
684
Analyzing effects of multi agent´s technology towards software quality assurance and quality engineering
685
Analyzing effects of pole/slot combination of IPM type BLDC motor under stator-turn fault condition
686
Analyzing effects of sodium pentobarbital on hemodynamic responses by using a graphic control system
687
Analyzing Efficacy of Constrained Test Program Generators - A Case Study
688
Analyzing electrical effects of RTA-driven local anneal temperature variation
689
Analyzing electrical patterns in an experimental swine model of dyssynchrony and CRT
690
Analyzing Electroencephalograms Using Cloud Computing Techniques
691
Analyzing electromagnetic pulse coupling by combining TLT, MoM, and GTD/UTD
692
Analyzing electromagnetic scattering using characteristic basis function method with compressed sensing
693
Analyzing electromagnetic structures with curved boundaries on Cartesian FDTD meshes
694
Analyzing Electronic Book Acceptance: A Compatibility Perspective
695
Analyzing elementary cognitive tasks with Bloom´s taxonomy using low cost commercial EEG device
696
Analyzing EM Scattering from Randomly Rough Surfaces by Combining the Stochastic Second-Degree Iterative Method, the Sparse Matrix Algorithm and Chebyshev Approximation
697
Analyzing Email Account Creation: Expectations vs Reality
698
Analyzing Email Archives to Better Understand Legal Requirements
699
Analyzing Embedded Systems Code for Mixed-Critical Systems Using Hybrid Memory Representations
700
Analyzing emitter dopant inhomogeneities at textured Si surfaces by using 3D process and device simulations in combination with SEM imaging
701
Analyzing empathetic interactions based on the probabilistic modeling of the co-occurrence patterns of facial expressions in group meetings
702
Analyzing empirical data from a reverse engineering project
703
Analyzing encryption protocols using formal verification techniques
704
Analyzing Encryption Technology Applied in Farm Product E-commerce System Security
705
Analyzing end-to-end delivery delay in pure VoIP networks
706
Analyzing End-to-End Energy Consumption for Digital Services
707
Analyzing end-to-end network reachability
708
Analyzing energy and time overhead of security mechanisms in Wireless Sensor Networks
709
Analyzing energy consumption during VM live migration
710
Analyzing energy consumption of industrial robots
711
Analyzing Energy Efficiency of a Cooperative Content Distribution Technique
712
Analyzing energy friendly steady state phases of dynamic application execution in terms of sparse data structures
713
Analyzing Energy-Delay Behavior in Room Temperature Single Electron Transistors
714
Analyzing Energy-Efficiency and Route-Selection of Multi-level Hierarchal Routing Protocols in WSNs
715
Analyzing Energy-Time Tradeoff in Power Overprovisioned HPC Data Centers
716
Analyzing engineering design stories — Predicting engagement in inventive action
717
Analyzing engineering simulations in a virtual environment
718
Analyzing Enhanced Terahertz-Pulse Power and Frequency Using a Field-Carrier Transport Approach
719
Analyzing Ensemble Systems for Protected Biometric Data
720
Analyzing Enterprise Architecture in National Governments: The Cases of Denmark and the Netherlands
721
Analyzing Enterprise Social Media Networks
722
Analyzing entrainment of heartbeat and respiration with surrogates
723
Analyzing epileptogenic brain connectivity networks using clinical EEG data
724
Analyzing equivalences of UML statechart diagrams by structural congruence and open bisimulations
725
Analyzing error propagation in range-based multihop sensor localization
726
Analyzing error-prone system structure
727
Analyzing Errors with the Boolean Difference
728
Analyzing Euler-Fermat Theorem Based Multicast Key Distribution Schemes with Chinese Remainder Theorem
729
Analyzing Event-Related Brain Dynamics in Continuous Compensatory Tracking Tasks
730
Analyzing Exceptional Interfaces on Evolving Frameworks
731
Analyzing exchanges between principals and teachers in primary and middle school
732
Analyzing Execution Dynamics of Scientific Workflows for Latency Minimization in Resource Sharing Environments
733
Analyzing expected time by scheduler-luck games
734
Analyzing exploration exploitation trade-off by means of P-I similarity index and dictyostelium based genetic algorithm
735
Analyzing extended sliding frame reservation-aloha MAC protocol against asymmetric radio link problem in MANET/VANET
736
Analyzing extent and influence of mobile device´s participation in Mobile Cloud Computing
737
Analyzing extraordinary optical transmission phenomenon by a vertical mode expansion method
738
Analyzing facial expressions for virtual conferencing
739
Analyzing Facial Expressions Using Intensity-Variant 3D Data For Human Computer Interaction
740
Analyzing Facial Images using Empirical Mode Decomposition for Illumination Artifact Removal and Improved Face Recognition
741
Analyzing failure frequency and severity in communication networks
742
Analyzing failure mechanism for complex software-intensive systems
743
Analyzing failures and attacks in Map & Encap protocols
744
Analyzing fault effects in fault insertion experiments
745
Analyzing fault effects in the 32-bit OpenRISC 1200 microprocessor
746
Analyzing Fault Models for Reversible Logic Circuits
747
Analyzing fault tolerance on parallel genetic programming by means of dynamic-size populations
748
Analyzing Fault-Impact Region of Composite Service for Supporting Fault Handling Process
749
Analyzing fault-induced transients with wavelets
750
Analyzing Feasibility of Requirement Driven Service Composition
751
Analyzing Feature Significance from Various Systems for Mass Diagnosis
752
Analyzing feature traces to incorporate the semantics of change in software evolution analysis
753
Analyzing feedback: Properly simulating the open loop
754
Analyzing fetal breathing rates using matching pursuits
755
Analyzing financial distress of listed companies using neural network
756
Analyzing financial performance with self-organizing maps
757
Analyzing Fingerprints of Indian Population Using Image Quality: A UIDAI Case Study
758
Analyzing finite MANETs by transformations to equivalent static graphs
759
Analyzing finite-length protograph-based spatially coupled LDPC codes
760
Analyzing finite-wordlength effects in block state space filters
761
Analyzing firm-level strategy for Internet-focused reintermediation
762
Analyzing First-Order Role Based Access Control
763
Analyzing Fixed and Mobile Convergence Services in China
764
Analyzing fixed-priority global multiprocessor scheduling
765
Analyzing Flow Isolation in Shared Resource Systems
766
Analyzing fMRI data based on multi-resolution factorial kriging
767
Analyzing fMRI data with graph-based visualizations of self-organizing maps
768
Analyzing for Lyapunov stability with adaptive critics
769
Analyzing for optical front transmission pulsation characteristic and study for the detection technique
770
Analyzing Forest Ecosystem Using Multisource Digital Image Data
771
Analyzing Forged SSL Certificates in the Wild
772
Analyzing form images by using line-shared-adjacent cell relations
773
Analyzing formal requirements specifications using an off-the-shelf model checker
774
Analyzing Formal Verification and Testing Efforts of Different Fault Tolerance Mechanisms
775
Analyzing FPGA simultaneous switching noise in printed circuit boards
776
Analyzing freeway travel times within a case study: Reliability of route traversal times
777
Analyzing Functional Brain Connectivity by Means of Commute Times: A New Approach and its Application to Track Event-Related Dynamics
778
Analyzing Functional Coverage in Bounded Model Checking
779
Analyzing fundamental aggregation functions in power systems
780
Analyzing fundamental propagation modes in V-groove plasmonic waveguides
781
Analyzing fuzziness in product quality and reliability information-flow during time-driven product-development-process
782
Analyzing fuzzy association rules with Fingrams in KEEL
783
Analyzing fuzzy partitions of Saccharomyces cerevisiae cell-cycle gene expression data by Bayesian validation method
784
Analyzing fuzzy risk based on a new similarity measure between interval-valued fuzzy numbers
785
Analyzing fuzzy surface modeling using load-balanced computation
786
Analyzing gait pathologies using a depth camera
787
Analyzing gait with spatiotemporal surfaces
788
Analyzing gangbuster frequency selective surface using improved spectral domain method
789
Analyzing GAREKI factors of collapsed wooden buildings for rescue
790
Analyzing Gateway Association in Wireless Mesh Network
791
Analyzing gaussian proposal distributions for mapping with rao-blackwellized particle filters
792
Analyzing gene behaviors with genetic computation
793
Analyzing gene expression data for childhood medulloblastoma survival with artificial neural networks
794
Analyzing gene expression data: Fuzzy decision tree algorithm applied to the classification of cancer data
795
Analyzing gene expression time-courses
796
Analyzing Gene Relationships for Down Syndrome with Labeled Transition Graphs
797
Analyzing genetic algorithm for web service selection
798
Analyzing genetic factors involved in recombinant protein expression enhancement
799
Analyzing goal semantics for rights, permissions, and obligations
800
Analyzing government regulations using structural and domain information
801
Analyzing GPRS mobile network traffic with map reduce
802
Analyzing Graceful Degradation for Mixed Critical Fault-Tolerant Real-Time Systems
803
Analyzing Grammy, Emmy, and Academy Awards Data Using Regression and Maximum Information Coefficient
804
Analyzing graphics processor unit (GPU) instruction set architectures
805
Analyzing grasping for inferring cognitive states of users
806
Analyzing grey matter diffusivity of autism in the context of white matter connectivity
807
Analyzing group communication for preventing data leakage via email
808
Analyzing group dynamics for incidental topics in online social networks
809
Analyzing Group Interactions in Conversations: a Review
810
Analyzing group learning behavior based on cellular automata
811
Analyzing groupware design by means of usability results
812
Analyzing handovers in vehicular communication using Network Simulator
813
Analyzing harbor water and earth temperatures
814
Analyzing hard-real-time programs for guaranteed schedulability
815
Analyzing hardware constraints of Gabor filtering operation for Facial Expression Recognition System
816
Analyzing Harmonic Monitoring Data Using Supervised and Unsupervised Learning
817
Analyzing healthcare provider centric networks through secondary use of health claims data
818
Analyzing heap error behavior in embedded JVM environments
819
Analyzing heart rate variability in infants using non-linear Poincaré techniques
820
Analyzing hepatitis data using ordered information
821
Analyzing heterogeneous system architectures by means of cost functions: A comparative study for basic operations
822
Analyzing High Dimensional Data
823
Analyzing high energy physics data using databases: a case study
824
Analyzing High-Density ECG Signals Using ICA
825
Analyzing high-dimensional data by subspace validity
826
Analyzing high-dimensional multispectral data
827
Analyzing high-dimensional multivaríate network links with integrated anomaly detection, highlighting and exploration
828
Analyzing high-leverage corporate innovation using the data surface mining technique
829
Analyzing highway flow patterns using cluster analysis
830
Analyzing hot-carrier effects on cold CMOS devices
831
Analyzing housing price volatility in Shanghai
832
Analyzing how social agents influence interpersonal communication
833
Analyzing human and virtual agent interaction under irrational decision making
834
Analyzing Human Behavior Using Case-Based Reasoning with the Help of Forensic Questions
835
Analyzing Human Body 3-D Motion of Golf Swing From Single-Camera Video Sequences
836
Analyzing human body shadowing at 60 GHz: Systematic wideband MIMO measurements and modeling approaches
837
Analyzing Human Centric Data for Sharing Mobile Internet with Social Buddies
838
Analyzing human fingertip usage in dexterous precision manipulation: Implications for robotic finger design
839
Analyzing human interactions with a network of dynamic probabilistic models
840
Analyzing Human Movements from Silhouettes Using Manifold Learning
841
Analyzing Human Movements from Silhouettes via Fourier Descriptor
842
Analyzing human skill through control trajectories and motion capture data
843
Analyzing human´s continuous learning ability with the reflection cost
844
Analyzing human´s continuous learning processes with the reflection sub task
845
Analyzing Hyperspectral and Hypertemporal Data by Decoupling Feature Redundancy and Feature Relevance
846
Analyzing hyperspectral BRDF data of a grass lawn and watercress surface using an empirical model
847
Analyzing hysteresis loops via coupling factors for inductive sensing technique
848
Analyzing I/O patterns for the design of energy-efficient image servers
849
Analyzing IEEE 802.11 DCF for FU-FB Systems under Multipath Fading Channels Using TUA
850
Analyzing IEEE 802.11n standard: outdoor performanace
851
Analyzing IKEv2 Performance when Protecting Mobile IPv6 Signaling
852
Analyzing image compression with efficient transforms & multistage vector quantization using radial basis function neural network
853
Analyzing Image Deblurring Through Three Paradigms
854
Analyzing Image Structure by Multidimensional Frequency Modulation
855
Analyzing Image-Text Relations for Semantic Media Adaptation and Personalization
856
Analyzing imaging biomarkers for traumatic brain injury using 4d modeling of longitudinal MRI
857
Analyzing immediate correlations between names and pop culture of North America in the 21st century
858
Analyzing Impact Factors on Composite Services
859
Analyzing impact of background plating from alkaline Ni bath for Ni-Cu metallization
860
Analyzing impact of image scaling algorithms on viola-jones face detection framework
861
Analyzing Impact of Introducing CCN on Profit of ISPs
862
Analyzing impact of multiple ABB and AVS domains on throughput of power and thermal-constrained multi-core processors
863
Analyzing impact of outliers´ detection and removal from the test sample in Blind Source Extraction using Multivariate Calibration Techniques
864
Analyzing impact of video codec, encapsulation methods and streaming protocols on the quality of video streaming
865
Analyzing impacts of physical interference on a transmission in IEEE 802.11 mesh networks
866
Analyzing implementation of lean production control with the Viable System Model
867
Analyzing implicit group messaging: A novel messaging paradigm for group-oriented content distribution
868
Analyzing Implicit Social Networks in Multiplayer Online Games
869
Analyzing important ground water parameters in West Bengal with a fuzzy approach in the context of arsenic pollution
870
Analyzing improvements for a mine maintenance system of connected equipment and machines the value and benefits of data sharing
871
Analyzing Inaccurate Artifact Usages in a Workflow Schema
872
Analyzing incentives and scheduling in a major metropolitan hospital operating room through simulation
873
Analyzing incoming workload in Cloud business services
874
Analyzing influence factors of technology transfer using fuzzy set theory
875
Analyzing influence of network topology on designing ISP-operated CDN
876
Analyzing Influencing Factors of Organizational Innovative Climate Based on DEMATEL Method
877
Analyzing information content of MR images
878
Analyzing information flow control policies in requirements engineering
879
Analyzing Information Flow in JavaScript-Based Browser Extensions
880
Analyzing information intermediaries in electronic brokerage
881
Analyzing information propagation in a transoceanic aircraft delay tolerant network
882
Analyzing information security culture: increased trust by an appropriate information security culture
883
Analyzing information security investment in networked supply chains
884
Analyzing information transfer in time-varying multivariate data
885
Analyzing infra-acoustic wave disturbance-observed by our Doppler detector in typhoon season
886
Analyzing infrasonic disturbances observed by our HF-Doppler detector
887
Analyzing inland-orientation of port supply chain based on advertising-R&D model
888
Analyzing innovative model of the Small and Medium Enterprises financing: Supply chain financing
889
Analyzing Input Harmonic Currents of a Six-pulse AC/DC Converter by an Efficient Time-domain Approach
890
Analyzing Input Match Manipulation Based on Comparative Theory
891
Analyzing inspection data for heuristic effectiveness
892
Analyzing Institutions related to the Logistics Enterprises
893
Analyzing instruction prefetching techniques via a cache performance model: effectiveness and limitations
894
Analyzing intellectual capital cluster index in Thailand´s hard disk drive cluster
895
Analyzing interaction between Denial of Service (DoS) attacks and threats
896
Analyzing interaction between distributed denial of service attacks and mitigation technologies
897
Analyzing interaction between network protocols, topology and traffic in wireless radio networks
898
Analyzing interaction communication networks in enterprises and identifying hierarchies
899
Analyzing interaction orderings with model checking
900
Analyzing interconnection design safety using bent pin analysis
901
Analyzing interference between CDMA850 and WCDMA900
902
Analyzing interference from static cellular cooperation using the Nearest Neighbour Model
903
Analyzing inter-firm networks for enhancing large-scale regional clusters
904
Analyzing internal-switching induced simultaneous switching noise
905
Analyzing international scientific collaboration pattern for China by using ESI database
906
Analyzing Internet Packet Traces using Lindley´s Recursion
907
Analyzing Internet security protocols
908
Analyzing Internet Slang for Sentiment Mining
909
Analyzing Interoperability Requirements for Adaptive Service-Based Applications: A Goal-Oriented Approach
910
Analyzing Interpersonal Empathy via Collective Impressions
911
Analyzing interrelated markets in the electricity sector — The case of wholesale power trading in Germany
912
Analyzing intrinsic motion textures created from naturalistic video captures
913
Analyzing Intrusion Detection System: An ensemble based stacking approach
914
Analyzing Involvements of Reviewers through Mining a Code Review Repository
915
Analyzing Isochronic Forks with Potential Causality
916
Analyzing IT impact on organizational structure: A case study
917
Analyzing IT outsourcing relationships as alliances among multiple clients and vendors
918
Analyzing Item Features for Cold-Start Problems in Recommendation Systems
919
Analyzing Java software by combining metrics and program visualization
920
Analyzing jitter at high data rates
921
Analyzing job performance structural model using decision making trail and evaluation laboratory technique
922
Analyzing KANSEI from facial expressions with fuzzy quantification theory II
923
Analyzing Key Process Areas in Process Improvement Model for Service Provider Organization, CMMI-SVC
924
Analyzing Knowledge Transfer Effectiveness--An Agent-Oriented Modeling Approach
925
Analyzing k-step induction to compute invariants for SAT-based property checking
926
Analyzing landslide with multi-temporal remote sensing images and DEM data
927
Analyzing large dynamic set-point change tracking of MRAC by exploiting fuzzy logic based automatic gain tuning
928
Analyzing large free-response qualitative data sets — a novel quantitative-qualitative hybrid approach
929
Analyzing Large Scale Real-World Wireless Multihop Network
930
Analyzing Large Sparse Markov Chains of Kronecker Products
931
Analyzing large spreadsheet programs
932
Analyzing Large-Scale Arrays Using Tangential Equivalence Principle Algorithm With Characteristic Basis Functions
933
Analyzing Large-Scale DNA Sequences on Multi-core Architectures
934
Analyzing Large-Scale News Video Databases to Support Knowledge Visualization and Intuitive Retrieval
935
Analyzing Large-Scale Non-Periodic Arrays With Synthetic Basis Functions
936
Analyzing late ventricular potentials
937
Analyzing lead information from SAR images
938
Analyzing Leadership Dynamics in Distributed Group Communication
939
Analyzing Leaky Waveguide Modes by Pseudospectral Modal Method
940
Analyzing learner engagement to enhance the teaching-learning experience
941
Analyzing Learners´ Interaction with an Educational Hypermedia System: A Focus on Learning Styles
942
Analyzing learning dynamics: How to average?
943
Analyzing Least Squares and Kalman Filtered Compressed Sensing
944
Analyzing Legacy System´s Interfaces through Monte Carlo Simulation
945
Analyzing life tests of CIS solar modules for degradation modeling
946
Analyzing Lifecycle Behavior of Android Application Components
947
Analyzing Limited Size Archivers of Multi-objective Optimizers
948
Analyzing limits of one type of disturbance observer based PI control by the performance portrait method
949
Analyzing LINC Systems
950
Analyzing Linear Communication Networks Using the Ribosome Flow Model
951
Analyzing Load Case of Mill Roller Bearing with Boundary Element Method
952
Analyzing loads for balancing: Potential for the Belgian case
953
Analyzing Local Field Potentials in the healthy basal ganglia under Deep Brain Stimulation
954
Analyzing Local Structure in Kernel-Based Learning: Explanation, Complexity, and Reliability Assessment
955
Analyzing Locomotion Synthesis with Feature-Based Motion Graphs
956
Analyzing Log Files for Postmortem Intrusion Detection
957
Analyzing Logistics Industry Association of Zhejiang in China Based on Extension of Input-Output Table
958
Analyzing logistics service performance level based on customer perception
959
Analyzing long-chain rules extracted from a learning classifier system
960
Analyzing Long-Running Controller Applications for Specification Violations Based on Deterministic Replay
961
Analyzing Long-Term Access Locality to Find Ways to Improve Distributed Storage Systems
962
Analyzing looming motion components from their spatiotemporal spectral signature
963
Analyzing losses from hazard exposure: a conservative probabilistic estimate using supply chain risk simulation
964
Analyzing losses using junction temperature of 300V 2.4kW 96% efficient, 1MHz GaN synchronous boost converter
965
Analyzing Lossy Radial-Line Stubs (Short Papers)
966
Analyzing low frequency couplings in substations under steady-state conditions: part I
967
Analyzing low frequency couplings in substations under steady-state conditions: part II
968
Analyzing low-density parity-check codes on partial response channels with erasures using density evolution
969
Analyzing low-frequency electromagnetic scattering from a composite object
970
Analyzing machine concepts and delivery strategies to cut delivery costs for forest fuels using a discrete-event simulation model
971
Analyzing macroscopic behavior in a swarm robotic system based on clustering
972
Analyzing magnetic nanoparticle content in biological samples: Acsusceptometry using offset fields
973
Analyzing Magnetizing Inrush Current Problem Caused By Voltage Dip by Using Discrete Fourier Transform
974
Analyzing Malware by Abstracting the Frequent Itemsets in API Call Sequences
975
Analyzing Malware Log Data to Support Security Information and Event Management: Some Research Results
976
Analyzing manipulator and feel system effects in aircraft flight control
977
Analyzing manipulator characteristics in the closed-loop pilot/vehicle system
978
Analyzing manufacturing processes to determine the placement of diagnostic systems
979
Analyzing manufacturing test costs
980
Analyzing market power in a multistage and multiarea electricity and natural gas system
981
Analyzing Market Shares of Competitive Public Transportation Pivotal Facilities with a Continuous Equilibrium Modeling Approach
982
Analyzing massive astrophysical datasets: Can Pig/Hadoop or a relational DBMS help?
983
Analyzing Massive Machine Maintenance Data in a Computing Cloud
984
Analyzing Maximum Length of Instruction Sequence in Network Packets for Polymorphic Worm Detection
985
Analyzing MBSA Performance Using NetLogo
986
Analyzing measurements of nonlinear transfer functions with Tschebyshev polynomials
987
Analyzing Measurements of the R Statistical Open Source Software
988
Analyzing medical contexts in ubiquitous computing home environments with denotational mathematics
989
Analyzing Medical Data-Some Statistical Considerations
990
Analyzing medical processes
991
Analyzing meme propagation in multimemetic algorithms: Initial investigations
992
Analyzing Memory Access on CPU-GPGPU Shared LLC Architecture
993
Analyzing memory bandwidth requirements of video algorithms
994
Analyzing memory effect in RF power amplifier using three-box modeling
995
Analyzing Memory Requirements for Pervasive Grid Applications
996
Analyzing message-passing programs through visual slicing
997
Analyzing metal fixed-point cells from their plateaus
998
Analyzing method efficiency for power transformers insulation design
999
Analyzing Method of Random Vibration Characteristic for Armature System of Hermetically Sealed Electromagnetic Relay
1000
Analyzing Method of the Inner Heat Source in Breast Based on Infrared Imaging and Clinical Application