<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Identification of Two-Mass Mechanical Systems Using Torque Excitation: Design and Experimental Evaluation
2
Identification of two-probe TLP contact resistance issues and proposed solutions
3
Identification of Type-2 Fuzzy Models for Time-Series Forecasting Using Particle Swarm Optimization
4
Identification of types of distortion sources in power systems by applying neural networks
5
Identification of typical aromas of red wines with thin film sensors combined with pattern recognition techniques
6
Identification of typical load profiles using K-means clustering algorithm
7
Identification of typical wine aromas by means of an electronic nose
8
Identification of typical wine aromas by means of an electronic nose
9
Identification of UHF Gen 2 RFID privacy and security issues
10
Identification of ulcers in Wireless Capsule Endoscopy videos
11
Identification of ULF emissions for Izu islands earthquakes in July 2000
12
Identification of ultrasound contrast agent dilution systems for ejection fraction measurements
13
Identification of ultrasound-contrast-agent dilution systems for cardiac quantification
14
Identification of Umbrella Constraints in DC-Based Security-Constrained Optimal Power Flow
15
Identification of umbrella constraints in DC-based security-constrained optimal power flow
16
Identification of unaspirated plosives using integrated temporal and spectral features in dynamic representation as acoustic cues
17
Identification of Unavoidable Branch Limit Violations Due to Wind Forecast Errors
18
Identification of unbounded Petri nets from their coverability graph
19
Identification of uncertain systems described by linear fractional transformations
20
Identification of underactuated manipulator based on genetic algorithm
21
Identification of under-damped second-order systems using finite duration rectangular pulse inputs
22
Identification of underwater acoustic noise
23
Identification of underwater mines from electro-optical imagery using an operated-assisted reinforcement on-line learning
24
Identification of underwater vehicle dynamics with neural networks
25
Identification of undetectable faults in combinational circuits
26
Identification of unfalsified plant model sets based on low-correlated bounded noise model
27
Identification of University Poor Students Based on Data Mining
28
Identification of unknown categories with probabilistic neural networks
29
Identification of Unknown Parameters for a Class of Two-Level Quantum Systems
30
Identification of Unknown Payload and Environmental Parameters for Robot Compliant Motion
31
Identification of unknown vibrating pressures in a three-chamber unit using a Computational Inverse Acoustics Method
32
Identification of unsettable flip-flops for partial scan and faster ATPG
33
Identification of unstable DC operating points
34
Identification of unstable system using LQG controller
35
Identification of Unstable Systems using Least-Squares Algorithm
36
Identification of unstable systems using output error and Box-Jenkins model structures
37
Identification of unstable systems using output error and Box-Jenkins model structures
38
Identification of unwanted scatterers on a free-field EMI test range
39
Identification of urban drainage network rainfall-runoff black-box models
40
Identification of urbanization in Ghana based on a discrete approach to analyzing dense Landsat image stacks
41
Identification of UWB emissions from printed circuit boards using principal component analysis
42
Identification of V+N compound nouns in Chinese-English machine translation based on rules in patent texts
43
Identification of vaguely dependent parameters for a class of fuzzy stochastic systems
44
Identification of vapours using a single carbon black/polymer composite sensor and a novel temperature modulation technique
45
Identification of variable frequency induction motor models from operating data
46
Identification of Variable Frequency Induction Motor Models from Operating Data
47
Identification of variable mechanical parameters using extended Kalman Filters
48
Identification of variables to decide optimal hospital for emergency patients
49
Identification of variegated coloring in skin tumors: neural network vs. rule-based induction methods
50
Identification of varieties of cashmere by Vis/NIR spectroscopy technology based on PCA-SVM
51
Identification of varieties of natural textile fiber based on Vis/NIR spectroscopy technology
52
Identification of various kinds of papers using multi-axial tactile sensor with micro-cantilevers
53
Identification of Various Problems in an Environment of Multi Vendor Equipments for PSTN Services in NGN
54
Identification of Vascular Dynamics and Estimation of the Cardiac Output Waveform from Wearable PPG Sensors
55
Identification of vascular parameters based on the same pressure pulses waves used to measure pulse wave velocity
56
Identification of vascular responses to exercise and orthostatic stress in bed rest-induced cardiovascular deconditioning
57
Identification of V-band frequency-selective surface at 11 m standoff distance with a transceiver chipset
58
Identification of vegetation from satellite derived hyper spectral indices
59
Identification of vehicle parameters using modified least square method in ADAMS/Car
60
Identification of vehicle tracks and association to wireless endpoints by multiple sensor modalities
61
Identification of Vehicle-Driver Stability Domain using Human Pilot Structural Model
62
Identification of ventricular tachycardias by means of fast wavelet analysis
63
Identification of Vertical Instabilities in the JET Tokamak
64
Identification of vertical VTOL movement model based on use of local linear models
65
Identification of Very Similar Filled-in Forms with a Reject Option
66
Identification of Vessel Anomaly Behavior Using Support Vector Machines and Bayesian Networks
67
Identification of Viable Biological Strategies for Pest Management by Simulation Studies
68
Identification of vibrating structures and fault detection using neural networks
69
Identification of vibrating structures subject to non stationary excitation : A non stationary stochastic realization problem
70
Identification of Vibrotactile Patterns Encoding Obstacle Distance Information
71
Identification of vibrotactile patterns: building blocks for tactons
72
Identification of Vigilance Lapses using EEG/EOG by Expert Human Raters
73
Identification of Viral Protein Genotypic Determinants Using Combinatorial Filtering and Active Learning
74
Identification of Visual Attention Regions in Machine Vision using Saliency Map
75
Identification of Visual Evoked Potentials in EEG detection by emprical mode decomposition
76
Identification of vocal fold pathology based on Mel Frequency Band Energy Coefficients and singular value decomposition
77
Identification of voice disorders using speech samples
78
Identification of Voice Segments in Stereo Soundtracks
79
Identification of voiceband data signal constellations using a divisive cluster algorithm
80
Identification of voltage collapse margins in power systems
81
Identification of voltage collapse through direct equilibrium tracing
82
Identification of voltage collapse vulnerable buses using modal analysis
83
Identification of voltage control areas and reactive power reserve; An advancement in on-line voltage security assessment
84
Identification of voltage control areas in power systems with large scale wind power integration
85
Identification of voltage sag characteristics from the measured responses
86
Identification of voltage sag origin in a measurement deficient power network
87
Identification of Voltage Sags in Distribution System Using Wavelet Transform and SVM
88
Identification of Voltage Transients on Aircraft Cabling under LTA Excitation
89
Identification of voltage weak buses/areas using neural network based classifier
90
Identification of Volterra kernels by using M-sequence which consists of arbitrary two values
91
Identification of Volterra kernels for nonlinear communication systems with OFDM inputs
92
Identification of Volterra kernels of nonlinear system having backlash type nonlinearity
93
Identification of Volterra kernels of non-linear systems
94
Identification of Volterra kernels of nonlinear systems by separating overlapped kernel slices
95
Identification of Volterra kernels using interpolation
96
Identification of Volterra kernels using interpolation
97
Identification of Volterra nonlinear systems using circular inputs
98
Identification of Volterra systems with a polynomial neural network
99
Identification of Volterra-Laguerre Model in a Laminator System for Vinyl Tile
100
Identification of Volterra-PARAFAC models using partial update LMS algorithms
101
Identification of volume elements in a 3-D X-ray imaging system
102
Identification of vowel features from French stop bursts
103
Identification of vulnerable atherosclerotic plaque using IVUS-based thermal strain imaging
104
Identification of vulnerable lines in power grid based on complex network theory
105
Identification of Vulnerable Lines in Power Grid Based on Complex Network Theory
106
Identification of vulnerable transmission lines in power system switching operations
107
Identification of wafer defect clusters using a self-organizing multilayer perceptron
108
Identification of warning signs in car driving behavior before safety-critical events
109
Identification of warning signs in truck driving behavior before safety-critical events
110
Identification of wastewater biodegradation kinetics
111
Identification of Water Environmental Risk in Industrial Parks
112
Identification of water/solid flow regime using ultrasonic tomography
113
Identification of wavefronts in Partial Discharge acoustic signals using discrete wavelet transform
114
Identification of Wavelet Modulation Based on Gaussian Detection and Kurtosis of Power Spectrum
115
Identification of Wavelet Modulation Signals Based on Time-Frequency Mixed Moment
116
Identification of wavelets and filter bank coefficients in musical instruments
117
Identification of Weak Areas of Network Based on Exposure to Voltage Sags—Part II: Assessment of Network Performance Using Sag Severity Index
118
Identification of Weak Areas of Power Network Based on Exposure to Voltage Sags—Part I: Development of Sag Severity Index for Single-Event Characterization
119
Identification of weak busbars in large scale power system
120
Identification of weak buses for proper placement of reactive compensation through sensitivity analysis using a neural network surrogate model
121
Identification of weak buses in a power network using novel voltage stability indicator in radial distribution system
122
Identification of weak inversion and inversion-rotational transitions within excited vibrational state of ammonia
123
Identification of weak locations in bulk transmission systems using voltage stability margin index
124
Identification of weak locations in bulk transmission systems using voltage stability margin index
125
Identification of weakly nonlinear systems based on Support Vector Machines
126
Identification of weakly nonlinear systems using input and output measurements
127
Identification of Web Communities through Link Based Approaches
128
Identification of web communities using cellular learning automata
129
Identification of Web Query Intent Based on Query Text and Web Knowledge
130
Identification of weed seeds species in mixed sample with wheat grains using SIFT algorithm
131
Identification of weighting function using deterministic input
132
Identification of wetland based on machine learning rules inferring
133
Identification of wheelchair user steering behaviour within indoor environments
134
Identification of whole-brain network modules based on a large scale Granger Causality approach
135
Identification of widely applicable configurations for the electrostimulative total hip revision system
136
Identification of wiener fractional model using Self-Adaptive Velocity Particle Swarm Optimization
137
Identification of wiener model of intelligence sensor based on hybrid neural networks
138
Identification of Wiener model using genetic algorithms
139
Identification of Wiener Models Using Support Vector Machine
140
Identification of Wiener Models with Binary-Valued Output Observations
141
Identification of Wiener models with data pre-filtering
142
Identification of Wiener models with process noise
143
Identification of Wiener nonlinear systems using the key-term separation principle and the filtering approach
144
Identification of wiener systems : the least amount of a priori information
145
Identification of Wiener systems based on fixed point theory
146
Identification of Wiener Systems With Clipped Observations
147
Identification of Wiener systems with internal noises
148
Identification of Wiener systems with known noninvertible nonlinearities
149
Identification of Wiener systems with non-invertible nonlinearity
150
Identification of wiener systems with process noise is a nonlinear errors-in-variables problem
151
Identification of Wiener systems with steady-state non-linearities
152
Identification of Wiener-Hammerstein model with multisegment piecewise-linear characteristic
153
Identification of Wiener-Hammerstein models using linear interpolation in the frequency domain (LIFRED)
154
Identification of Wiener-MLP with feedback NOE-model with extended Kalman filter
155
Identification of Wiener-type nonlinear systems by using M-sequence correlation method
156
Identification of wind turbine mathematical model suitable for advanced controller design
157
Identification of Wind Turbine Model for Controller Design
158
Identification of wind turbine model for individual pitch controller design
159
Identification of winding faults in electric machines using a high frequency method
160
Identification of winding faults in power transformers by low voltage impulse test and neutral current method using wavelet transform approach
161
Identification of winter wheat and its distribution using the CBERS-02B images in an irrigation district along the lower Yellow River, China
162
Identification of Wireless Devices of Users Who Actively Fake Their RF Fingerprints With Artificial Data Distortion
163
Identification of wireless network cards based on signatures of wireless traffic
164
Identification of wireless users via power amplifier imperfections
165
Identification of wood rings from sparse tomographic data
166
Identification of working memory impairments in normal children using wavelet approach
167
Identification of World Wide Web educational materials in conjunction with the National Sea Grant College programs HazNet effort
168
Identification of wound infection by limited set of volatile products
169
Identification of wrist EMG signals using dry type electrodes
170
Identification of yeast cell cycle transcription factors using dynamic system model
171
Identification of yield loss sources in the outer dies using SEM based wafer bevel review
172
Identification of ZVS soft switching boundaries for three-phase dual active bridge converters using harmonic analysis
173
Identification on cytochrome b of Testudinis Carapax et Plastrum and its adulterants
174
Identification on dynamic inverse model for sensor based on genetic neural network
175
Identification over multiple databases
176
Identification parameters method for DC machine including friction
177
Identification parameters of MA model and non-minumum phase channel using adaptive method
178
Identification peer-to-peer traffic for high speed networks using packet sampling and application signatures
179
Identification Performance of Evidential Value Estimation for Fingermarks
180
Identification persons-security components of ID card
181
Identification plane of forms of signals
182
Identification Plus Transmission
183
Identification plus transmission over channels with perfect feedback
184
Identification problem for 3-D anisotropic Preisach model of vector hysteresis
185
Identification problems for semilinear parabolic evolution equations
186
Identification problems in functional differential equations
187
Identification problems in high performance microprocessor controlled electromechanical systems design
188
Identification procedure for McKibben pneumatic artificial muscle systems
189
Identification procedure for real and imaginary material parameters of piezoceramic materials
190
Identification procedures of Preisach model
191
Identification procedures, using the combination of optical and chipcard
192
Identification process dedicated to haptic devices
193
Identification research of pulmonary nodules based on PCA and the improved BP neural network
194
Identification Research on Coordinate Control Influencing Factors among Enterprises of B2B EC Based on Fault Diagnosis
195
Identification research on improved PID neural network and its application
196
Identification residential appliance using NIALM
197
Identification scale of forms of signals
198
Identification scales for urban vegetation classification using high spatial resolution satellite data
199
Identification scheme and name service in the Internet of Energy
200
Identification scheme based on quadratic residue
201
Identification scheme based on Shamir´s `RSA for paranoids´
202
Identification scheme for the affine sensor model
203
Identification state feedback control for the depth control of the studied underwater semi-submersible vehicle
204
Identification studies for twin electrode-pair stimulation with two different component pulse rates [cochlear implants]
205
Identification studies on terahertz spectra of illicit drugs
206
Identification system for optical fiber transmission operation lines with local-light injection and detection coupling system
207
Identification system for smart homes using footstep sounds
208
Identification system of the type of vehicle
209
Identification technique of FET model based on vector nonlinear measurements
210
Identification techniques
211
Identification Techniques
212
Identification Techniques
213
Identification techniques based on heuristic optimization for propagation processes
214
Identification techniques for a robotic link
215
Identification techniques for chemical process fault diagnosis
216
Identification techniques for correlated noise systems with multisensors
217
Identification Techniques for SARSAT Signals
218
Identification techniques for the design of cascade forms perfect-reconstruction two-channel filter banks
219
Identification Technology for Three-Dimensional Fluorescence Spectrum of Mineral Oil Based on Lifting Wavelet - Multi-Resolution Orthogonal Multi-Wavelet Network
220
Identification technology of mobile phone devices using RFF
221
Identification Technology Research on AES for Automobile Keyless System
222
Identification the activities of daily living based on decision tree
223
Identification the characteristics of Indonesian credit card frauds by trough correspondence analysis (An application of simplification quantitative analysis)
224
Identification the limit of conscious perception of surface EEG signals with visual evoked potentials
225
Identification the shape of biconcave Red Blood Cells using Histogram of Oriented Gradients and covariance features
226
Identification the spatial threshold of ecological indicator NDVI by application of optimal dividing algorithm for ordinal
227
Identification theory and single realization behaviour
228
Identification tool for chemical processes
229
Identification tool for cross-directional processes
230
Identification under Frequency Domain Bounded Dynamical Perturbations
231
Identification using compressed biometric images
232
Identification using fractional-order model: An application overview
233
Identification versus CBCD: A comparison of different evaluation techniques
234
Identification versus imaging
235
Identification via channels
236
Identification via compressed data
237
Identification via compressed data
238
Identification via compressed data
239
Identification via Fourier series for a class of lumped and distributed parameter systems
240
Identification via noiseless channels with noisy feedback
241
Identification via orthogonality for a class of hyperbolic distributed parameter processes
242
Identification via the broadcast channel
243
Identification via wiretap channels
244
Identification with ARMA model application to modeling of track geometry irregularity
245
Identification with blended multi-model approach in the frequency domain: an application to a servo pneumatic actuator
246
Identification with modeling uncertainty and reconfigurable control
247
Identification with nonparametric uncertainty
248
Identification with nonparametric uncertainty
249
Identification with non-parametric uncertainty
250
Identification with non-quadratic Lyapunov function and new adaptive laws
251
Identification with Normalized Coprime Factorization
252
Identification with privacy protection based on data hiding
253
Identification with SAW devices in passive remote telemetry systems
254
Identification with the Youla parameterization in identification for control
255
Identification without randomization
256
Identification, Characterization and Analysis of the Douro River Plume From MERIS Data
257
Identification, characterization, and implications of shadow degradation in thin film solar cells
258
Identification, classification and correlation of monitored power quality events
259
Identification, Classification and Phylogenetic Analysis of SET Domain Gene in Barley
260
Identification, control and robustness analysis of a robotic system using fractional control
261
Identification, counting, and sizing of dispersed phase droplet of scanning electron microscopy micrograph using digital image processing
262
Identification, digital control and fuzzy logic techniques applied to a synchronous generator
263
Identification, estimation and control of biological waste-water treatment processes
264
Identification, evaluation, and selection of petroleum exploration and development, and reserve acquisition investments: US petroleum companies
265
Identification, Impact, and Refactoring of Smells in Pipe-Like Web Mashups
266
Identification, judicial review and application of blasting seismic safety
267
Identification, Location, and Reception of Low Earth Orbit Satellites (LEO) Signals
268
Identification, modeling and control by means of Takagi-Sugeno fuzzy systems
269
Identification, Modelling and Prediction of Non-periodic Bursts in Workloads
270
Identification, position sensing, and control of an electrostatically-driven polysilicon microactuator
271
Identification, Prediction and Detection of the Process Fault in a Cement Rotary Kiln by Locally Linear Neuro-Fuzzy Technique
272
Identification, simulation and control for disturbance rejection in industrial boilers
273
Identification, Tracking and Visualization of Platelets in Intravital Microscopy
274
Identification, tracking, validation and forecast of local high resolution precipitation patterns observed through X-band micro radars
275
Identification, uncertainty modelling, and robust controller design for an electromechanical actuator
276
Identification/Observation Using an Extended Luenberger Observer
277
Identification/reduction to a balanced realization via the extended impulse response gramian
278
Identification/reduction to a balanced realization via the extended impulse response Gramian
279
Identification: Why do we need it, how to use it?
280
Identification-adaptive quadratic-cost linear system control
281
Identification-adaptive quadratic-cost linear system control by mean and variance correction
282
Identification-based PID control tuning for power station processes
283
Identification-based power station models for purposes of robust control design
284
Identification-based power unit model for load frequency control purposes
285
Identification-based power unit model for load-frequency control purposes
286
Identification-compensation approach for unknown disturbances via the estimate model of numerical differentiation
287
Identification-driven emotion recognition system for a social robot
288
Identification-free batch authentication for RFID tags
289
Identifications of Concepts, Features, and Concerns in Source Code
290
Identifications of Hasler´s classes of linear resistive circuit structures
291
Identifications of Nanomechanical Properties of Cu-Sn Crystalline Phases
292
Identifications of quality parameters in paper-making industry
293
IDENTIFIED (Integrated Dictionary-based Extraction of Non-language-dependent Token Information for Forensic Identification, Examination, and Discrimination): a dictionary-based system for extracting source code metrics for software forensics
294
Identified predictive control
295
Identified Risks at Swedish Recycling Centres during Handling of Waste from Electric and Electronic Equipment
296
Identified synapses in the snail´s brain
297
Identified-Service Support System and Its Application to Network Broadcasting Services
298
Identifier and database from the same sequence repository provide the greatest number of correct pairings between RNA and protein data
299
Identifier based interval type-2 fuzzy tracking control
300
Identifier based key distribution protocol for Wireless Sensor Networks
301
Identifier Design via Time-Varying Nonlinear Programming
302
Identifier index
303
Identifier index
304
Identifier index
305
Identifier index
306
Identifier index
307
Identifier index
308
Identifier index
309
Identifier Mapping Buffer Management Based on Markov-Repeated-Using-Probability Prediction
310
Identifier Migration in OpenID
311
Identifier Naming Conventions and Software Coding Standards: A Case Study in One School of Software
312
Identifier/locator separation: A worm detection and prevention perspective
313
Identifier-Based Adaptive Robust Control for Servomechanisms With Improved Transient Performance
314
Identifier-Based Context-Dependent API Method Recommendation
315
Identifier-Based Discovery Mechanism Design in Large-Scale Networks
316
Identifier-based universal network architecture
317
Identifikation Zeitvarianter Regelsysteme [Book reviews]
318
Identifilcation of Circuit Breaker Statuses in WLS State Estimator
319
Identifing influential users in an online healthcare social network
320
Identifing reservoir fluid properties in Daniudi Paleozoic gas field by fuzzy clustering analysis method
321
Identifiying causes of power reduction in photovoltaic systems
322
Identify & Measure Social Relations: Routing Algorithm Based on Social Relations in Opportunistic Networks
323
Identify an Adequate Anthropometry to Water Polo Using Social Data Mining
324
Identify and Classify Pulse Information Based on Extension
325
Identify and inquiry into the manufacturing industrial clusters development in Wuhan
326
Identify asthma genes across three phases based on protein–protein interaction network
327
Identify Authorization Control Requirement in Business Collaboration
328
Identify cancer survival related mutation genes from integrated TCGA datasets
329
Identify computer generated characters by analysing facial expressions variation
330
Identify content quality in online social networks
331
Identify Critical Genes in Development with Consistent H3K4me2 Patterns across Multiple Tissues
332
Identify critical success factor of knowledge management in supply chain : Fuzzy DEMATEL approach
333
Identify Discontinuous Parameter of Parabolic System via Point-Tree Structured Genetic Programming
334
Identify earthquake hot spots with 3-dimensional density-based clustering analysis
335
Identify Emergent Trends Based on the Blogosphere
336
Identify flight control system based on least squares support vector machine
337
Identify group roles by text mining on group discussion in a Web-based learning system
338
Identify hemodynamic factors implicated in differentiation of stem cells into endothelial cells
339
Identify household burning smell using an electronic nose system with artificial neural networks
340
Identify Impacts of Evolving Third Party Components on Long-Living Software Systems
341
Identify Implicit Social Network by RST/FL Framework
342
Identify important spectrum bands for classification using importances of wrapper selection applied to hyperspectral data
343
Identify influence of organizational culture from external factors with fuzzy AHP approach
344
Identify Influential Social Network Spreaders
345
Identify Influential Spreaders in Complex Real-World Networks
346
Identify Islands by Complex SAR Image
347
Identify key grasping-related properties based on cutaneous electrotactile stimulation
348
Identify Lead Users by customer competence
349
Identify malaria parasite using pattern recognition technique
350
Identify mismatches for stereo matching using sequential RVR
351
Identify moisture distribution in multilayer oil-immersed paper by Frequency Domain Spectroscopy
352
Identify more non-golay complementary sequences for OFDM with low PMEPR using multi-dimensional root pairs
353
Identify myelopathic cervical spinal cord using diffusion tensor image: A data-driven approach
354
Identify node role and track node evolution in temporal networks
355
Identify of bus incident reason based on Fuzzy cluster analysis
356
Identify of rice resistance to blast (magnaporthe grise) with SSR markers
357
Identify Online Fraudster with Extended Cellular Automata
358
Identify Optical Proximity Correction (OPC) issue in 0.13 μm technology development
359
Identify overloaded transmission lines in TTC and ATC determinations
360
Identify PMSM´s Parameters by Single-Layer Neural Networks with Gradient Descent
361
Identify power equipment partial discharge signals via pulse appearance frequency, duration and pulse polarity
362
Identify problematic layout patterns through volume diagnosis
363
Identify problematic layout patterns through volume diagnosis
364
Identify regions/free spectral range M-sequence code to improve cardinality over AWG-based WDM/OCDMA networks
365
Identify rockburst Grades for Jinping II hydropower station using Gaussian Process for Binary Classification
366
Identify Sentiment-Objects from Chinese Sentences Based on Skip Chain Conditional Random Fields Model
367
Identify Sports Video Shots with "Happy" or "Sad" Emotions
368
Identify Stack Overflow Exploits with Dynamic Binary Instrumentation
369
Identify technology main paths by adding missing citations using bibliographic coupling and co-citation methods in photovoltaics
370
Identify the best alternatives to help the diffusion of teleconsultation by using the Hierarchical Decision Model (HDM)
371
Identify the best location to place data based on social interaction in opportunistic network
372
Identify the Copy & Paste Frames in Compressed Surveillance Video Based on Stream Parameters
373
Identify the effective factors on Website Quality in electronic banking
374
Identify the gene positions of methylated DNA with a database approach
375
Identify the impact of distributed resources on congestion management
376
Identify the impacts of distributed resources on congestion management
377
Identify the motion-actuator states of two wheeled robot with DFDCMS
378
Identify the potential of technology transfer through international trade between Iran and Azerbaijan
379
Identify the reference signal of scalp EEG recording
380
Identify Uncertainty of Cyber Crime and Cyber Laws
381
Identify unrepairability to speed-up spare allocation for repairing memories
382
Identify user variants based on user behavior on social media
383
Identify Visual Human Signature in community via wearable camera
384
Identifying "representative" workloads in designing MpSoC platforms for media processing
385
Identifying "Skylites" for AUV operations under pack ice: insights from ice-draft profiling by moored sonar
386
Identifying `Cover Songs´ with Chroma Features and Dynamic Programming Beat Tracking
387
Identifying ´Linchpin Vertices´ That Cause Large Dependence Clusters
388
Identifying 3-vessel and main stem disease during pain at rest using self-learning techniques
389
Identifying 450 mc interference using a tunable receiver and a panadaptor
390
Identifying 802.11 Traffic From Passive Measurements Using Iterative Bayesian Inference
391
Identifying 802.11 Traffic from Passive Measurements Using Iterative Bayesian Inference
392
Identifying a balancing point for electricity transmission contracts
393
Identifying a Central Nervous System Perturbation that Explains Peripheral Hypocortisolism by Modeling the HPA Axis
394
Identifying a central plant from a set of plants for simultaneous stabilization
395
Identifying a class of multiple shift complementary sequences in the second order cosets of the first order Reed-Muller codes
396
Identifying a company´s noncustomer online communities: a proto-typology
397
Identifying a Criminal´s Network of Trust
398
Identifying a crosslink density relationship of acrylamide hydrogels to be used with passive sensors for detecting periprosthetic infection
399
Identifying a forest hierarchy in an OODB specialization hierarchy satisfying disciplined modeling
400
Identifying a gap in existing validation methodologies for intelligent automotive systems: Introducing the 3xD simulator
401
Identifying a hydraulic-turbine model from measured field data
402
Identifying a moving object with an accelerometer in a camera view
403
Identifying a new service opportunity from potential needs: User-centric service map
404
Identifying a person with an acceleration sensor using tracking system in an intelligent space
405
Identifying a product strategy
406
Identifying a Shared Mental Model Among Incident Responders
407
Identifying a Structural Basis for Plexin A3 Homomeric Interactions
408
Identifying a Subset of System Verilog Assertions for Efficient Bounded Model Checking
409
Identifying a Subset of TMMi Practices to Establish a Streamlined Software Testing Process
410
Identifying a two linked robot with non-symmetrical modified friction and backlash-flexibility models
411
Identifying a vanishing eigenvalue in voltage collapse analysis with consideration of limits
412
Identifying a vanishing eigenvalue in voltage collapse analysis with limits consideration
413
Identifying a Wiener system using a variant of the Wiener G-Functionals
414
Identifying Abbreviation Definitions Machine Learning with Naturally Labeled Data
415
Identifying abdominal organs using robust fuzzy inference model
416
Identifying ability of a recognition method based on the field of induction
417
Identifying abnormal nodes in complex networks by using random walk measure
418
Identifying Abnormal Nodes in Protein-Protein Interaction Networks
419
Identifying abnormalities in Computed Tomography brain images using symmetrical features
420
Identifying accents in Italian text: a preprocessing step in TTS
421
Identifying Accuracy of Social Tags by Using Clustering Representations of Song Lyrics
422
Identifying acid mine-drainage pollution at Captains Flat, NSW, using airborne HYMAP data
423
Identifying Acquisition Patterns of Failure Using Systems Archetypes
424
Identifying activated brain regions from fMRI data based on blind non-negative component separation technique
425
Identifying Activities of Daily Living Using Wireless Kinematic Sensors and Data Mining Algorithms
426
Identifying ad-hoc synchronization for enhanced race detection
427
Identifying adverse drug events from patient social media: A case study for diabetes
428
Identifying adverse drug reaction signal pairs by a multi-agent intelligent system with fuzzy decision model
429
Identifying Adverse Drug Reactions by analyzing Twitter messages
430
Identifying aesthetic highlights in movies from clustering of physiological and behavioral signals
431
Identifying Affinity Classes of Inorganic Materials Binding Sequences via a Graph-Based Model
432
Identifying aging-aware representative paths in processors
433
Identifying an efficient and robust sub-shot segmentation method for home movie summarisation
434
Identifying an EMI source and coupling path in a computer system with sub-module testing
435
Identifying an inaccessible electrostatic source with gradient-based inverse problem methodology and boundary elements
436
Identifying an optimal start-up date for information technology projects: a real options approach
437
Identifying Anatomical Phrases in Clinical Reports by Shallow Semantic Parsing Methods
438
Identifying Anatomical Shape Difference by Regularized Discriminative Direction
439
Identifying and Acquiring the Ideal Business/Technology Teaching In English (BTTIE) Educators for Asian International Schools
440
Identifying and addressing effectiveness in a user-centered design of voluntary medical incident reporting system
441
Identifying and addressing problems in framework reuse
442
Identifying and Addressing Protocol Manipulation Attacks in "Secure" BGP
443
Identifying and Addressing Rogue Servers in Countering Internet Email Misuse
444
Identifying and Addressing Uncertainty in Architecture-Level Software Reliability Modeling
445
Identifying and analyzing security threats to Virtualized Cloud Computing Infrastructures
446
Identifying and analyzing wireless network protocols without demodulation
447
Identifying and annotating generic drug names
448
Identifying and assessing material criticality to promote sustainable material use
449
Identifying and assessing relational understanding in ordinary differential equations
450
Identifying and Authenticating IoT Objects in a Natural Context
451
Identifying and Blocking Pornographic Content
452
Identifying and breaking necessary constraints to web-based metacomputing
453
Identifying and classifying ambiguity for regulatory requirements
454
Identifying and classifying image transforms
455
Identifying and Classifying Suspicious Network Behavior Using Passive DNS Analysis
456
Identifying and Classifying the Determinant Factors of Knowledge Transfer in Strategic Alliances
457
Identifying and communicating expertise in systems reengineering: a patterns approach
458
Identifying and comparing efficiency-loss mechanisms in earth-abundant thin-film solar cells
459
Identifying and Compensating for Phase Center Errors in Wing-Mounted Phased Arrays for Ice Sheet Sounding
460
Identifying and controlling deadband systems using neural networks
461
Identifying and Correcting Mislabeled Training Instances
462
Identifying and Diagnosing Students with Learning Disabilities using ANN and SVM
463
Identifying and discriminating temporal events with connectionist language users
464
Identifying and Evaluating the Threat of Transitive Information Leakage in Healthcare Systems
465
Identifying and Evaluating Usability Heuristics Applicable to Clinical Laboratory Systems
466
Identifying and Exploiting Spatial Regularity in Data Memory References
467
Identifying and exploiting the scale of a search space in differential evolution
468
Identifying and Exploiting the Similarities between Rationale Management and Variability Management
469
Identifying and extracting patient smoking status information from clinical narrative texts in Spanish
470
Identifying and Formulating Information Requirements Based on Semantic Theories of Information
471
Identifying and Implementing Security Patterns for a Dependable Security Case -- From Security Patterns to D-Case
472
Identifying and Keeping Technical Talent During Tough Times
473
Identifying and learning visual attributes for object recognition
474
Identifying and localizing electrical components: a case study of adaptive goal-directed sensing
475
Identifying and localizing robots in a multi-robot system environment
476
Identifying and Locating Surface Defects in Wood: Part of an Automated Lumber Processing System
477
Identifying and locating-dominating codes: NP-completeness results for directed graphs
478
Identifying and Managing Complex Modules in Executable Software Design Models-Empirical Assessment of a Large Telecom Software Product
479
Identifying and managing infrastructure corridor access for economic development, safety, and land use decision making
480
Identifying and managing performance risks in SOA based systems: A full life-cycle approach
481
Identifying and managing risks for automatic test systems
482
Identifying and managing risks for automatic test systems
483
Identifying and managing risks in the development of online educational software
484
Identifying and managing substances of concern in electronics
485
Identifying and Managing Variation Scope in Service Management
486
Identifying and mapping night lights using imaging spectrometry
487
Identifying and measuring dimensions of urban deprivation in Delhi: A town level analysis
488
Identifying and measuring quality in a software requirements specification
489
Identifying and measuring Reach and Richness: Toward a knowledge sharing mechanism selection model
490
Identifying and measuring representative QT intervals in predominantly non-normal ECGs
491
Identifying and measuring stressors present in pre-hospital care
492
Identifying and Modelling Multipath Clusters in Propagation Measurement Data
493
Identifying and monitoring change in wetland environments using SAR
494
Identifying and Overcoming the Design Challenges of Implementing a Multi-Technology System in a High Rise Buildings
495
Identifying and overcoming the risk of fraud in the malaysian electronic land administration system
496
Identifying and placing heterogeneously-sized cluster groupings based on FPGA placement data
497
Identifying and positioning parts using RISC sensors and RISC grippers together
498
Identifying and prefiltering images
499
Identifying and presenting friction properties of materials using a haptic robot
500
Identifying and Preventing Data Leakage in Multi-relational Classification
501
Identifying and proactively managing architecture risk
502
Identifying and qualifying reusable software components
503
Identifying and Quantifying Material Properties That Impact Aggregate Resistivity of Electrical Substation Surface Material
504
Identifying and quantifying printed circuit board inductance
505
Identifying and quantifying the android device users´ security risk exposure
506
Identifying and quantifying variability within a BiCMOS process as part of a DFM strategy
507
Identifying and ranking factors in evaluating the Web 2.0-based educational simulation games
508
Identifying and ranking influential spreaders in complex networks
509
Identifying and reducing critical lag in finite element simulations
510
Identifying and representing the security semantics of an application
511
Identifying and resolving a calibration issue with GMI
512
Identifying and Resolving Hidden Text Salting
513
Identifying and Resolving Least Privilege Violations in Software Architectures
514
Identifying and retrieving distress images from road pavement surveys
515
Identifying and Retrieving of Audio Sequences by using Wavelet Descriptors and Neural Network with User´s Assistance
516
Identifying and segmenting human-motion for mobile robot navigation using alignment errors
517
Identifying and shifting social media network patterns with NodeXL
518
Identifying and specifying holons in manufacturing systems
519
Identifying and Summarizing Systematic Code Changes via Rule Inference
520
Identifying and tracking a guide wire in the coronary arteries during angioplasty from X-ray images
521
Identifying and tracking ellipses: a technique based on elliptical deformable templates
522
Identifying and tracking online financial services through web mining and latent semantic indexing
523
Identifying and Tracking the number of independent clusters of functionally interdependent neurons from biophysical models of population activity
524
Identifying and tracking turbulence structures
525
Identifying and understanding tabular material in compound documents
526
Identifying and update of derived functions in functional databases
527
Identifying and Utilizing Routines of Human Movement
528
Identifying and visualizing Architectural Debt and its efficiency interest in the automotive domain: A case study
529
Identifying and visualizing relevant deviations in longitudinal sensor patterns for care professionals
530
Identifying and Visualizing the Malicious Insider Threat Using Bipartite Graphs
531
Identifying Android malware instructions
532
Identifying andTesting for Insecure Paths in Cryptographic Protocol Implementations
533
Identifying Animals with Dynamic Location-aware and Semantic Hierarchy-Based Image Browsing for Different Cognitive Style Learners
534
Identifying anomalous objects in SAS imagery using uncertainty
535
Identifying Anomalous Traffic Sources Using Flow Statistics
536
Identifying Application Capability of e-Business for IS Success: A Case study of Manufacturing Sectors
537
Identifying Application Key Knowledge through System Operations Modeling
538
Identifying aquifer parameters based on the algorithm of simple pure shape
539
Identifying Architectural Bad Smells
540
Identifying Architectural Change Patterns in Object-Oriented Systems
541
Identifying Architecturally Significant Functional Requirements
542
Identifying artifacts in arterial blood pressure using morphogram variability
543
Identifying Aspects and Analyzing Their Sentiments from Reviews
544
Identifying aspects using fan-in analysis
545
Identifying associations between smartphone usage and mental health during depression, anxiety and stress
546
Identifying At-Risk Employees: Modeling Psychosocial Precursors of Potential Insider Threats
547
Identifying attachment areas on sketched symbols
548
Identifying automation components in modular manufacturing systems: A method for modeling dependencies of manufacturing systems
549
Identifying Bacterial Virulent Proteins by Fusing a Set of Classifiers Based on Variants of Chou´s Pseudo Amino Acid Composition and on Evolutionary Information
550
Identifying bad measurements in compressive sensing
551
Identifying bad parameters of state estimation considering the WAMS measurements
552
Identifying Bands of passivity violations for scattering-based macromodels by a half-size test matrix
553
Identifying barriers in telesurgery by studying current team practices in robot-assisted surgery
554
Identifying barriers to efficient recovery and sustainable end of life management of electronic waste
555
Identifying Barriers to the Systematic Literature Review Process
556
Identifying Barriers to using Business-to-Employee (B2E) Portals: Some Lessons Learned from an Australian University
557
Identifying base competencies as prerequisites for software engineering education
558
Identifying behavior models for process plants
559
Identifying Behavioral Characteristics in EGM Gambling Data Using Session Clustering
560
Identifying Behaviors in Crowd Scenes Using Stability Analysis for Dynamical Systems
561
Identifying benefits between the integration of Electric Vehicles and renewable power usage
562
Identifying best feature subset for cardiac arrhythmia classification
563
Identifying best practices for a software development organization through knowledge management
564
Identifying biochemical reaction networks from heterogeneous datasets
565
Identifying bioentity recognition errors of rule-based text-mining systems
566
Identifying biological terms from text by support vector machine
567
Identifying Biologically Significant Pathways by Gene Set Enrichment Analysis Using Fisher´s Criterion
568
Identifying biomarkers for acupuncture treatment via an optimization model
569
Identifying block codes using Groebner bases
570
Identifying books in library using line segment detector and contour clustering
571
Identifying botnet communications using a mashup-based approach
572
Identifying Botnets Using Anomaly Detection Techniques Applied to DNS Traffic
573
Identifying boundaries of dominant regions dictating spectrum sharing opportunities for large secondary networks
574
Identifying Bounds on Sensing Coverage Holes in IoT Deployments
575
Identifying brain dynamic network states via GIG-ICA: Application to schizophrenia, bipolar and schizoaffective disorders
576
Identifying BT-like P2P Traffic by the Discreteness of Remote Hosts
577
Identifying buffer overflow vulnerabilities based on binary code
578
Identifying buildings in aerial images using constraint relaxation and variable elimination
579
Identifying buried objects using the neural network approach
580
Identifying burstiness of local topic using location-based burst detection with a classifier technique
581
Identifying bursty areas of emergency topics in geotagged tweets using density-based spatiotemporal clustering algorithm
582
Identifying Calcium-Binding Sites with Oxygen-Carbon Shell Geometric and Chemic Criteria-A Graph-Based Approach
583
Identifying camcorders using noise patterns from video clips recorded with image stabilisation
584
Identifying camera and processing from cropped JPEG photos via tensor analysis
585
Identifying cancer biomarkers by knowledge discovery from medical literature
586
Identifying Cancer Biomarkers From Microarray Data Using Feature Selection and Semisupervised Learning
587
Identifying cancer biomarkers through a network regularized Cox model
588
IDentifying cancer regions in vital-stained magnification endoscopy images using adapted color histograms
589
Identifying Candidate Cancer Genes Based on Their Somatic Mutations Co-Occurring with Cancer Genes in Cancer Genome Profiling
590
Identifying candidate disease genes using a trace norm constrained bipartite raking model
591
Identifying candidate gene effects by restricting search space in a multivariate genetic analysis of white matter microstructure
592
Identifying candidate genes using the BioWarehouse: a case study
593
Identifying candidate objects using hierarchical clustering analysis
594
Identifying capacity loss due to operational work methods
595
Identifying Catastrophic Failures in Offline Level Generation for Mario
596
Identifying Causal Effects from Data for the Clinical Ventilation Process Modelling
597
Identifying causal relationships in an urban information modeling framework
598
Identifying causal structure in a biological neural network
599
Identifying cause and effect relations between events in concurrent event-based components
600
Identifying centers of circulating and spiraling flow patterns
601
Identifying Central Features of Cotton Leaves in Digital Images with Difficult Backgrounds
602
Identifying centralized hubs within neural functional connections
603
Identifying Chains of Events during Power System Cascading Failure
604
Identifying Challenges for Facilitation in Communities of Practice
605
Identifying challenges of change impact analysis for software projects
606
Identifying challenging operating hours for solar integration in the NV energy system
607
Identifying Changed Source Code Lines from Version Repositories
608
Identifying changes in human skin electrical properties due to long-term NeuroMuscular Electrical Stimulation
609
Identifying channel seepage using pre-dawn thermal imagery
610
Identifying channel-specific impairments in cochlear implant patients via partial least squares discriminant analysis of speech-token confusion matrices
611
Identifying chaotic attractors with neural networks
612
Identifying chaotic systems via a Wiener-type cascade model
613
Identifying child users: Is it possible?
614
Identifying Chinese Hospitality Firm Failures and Differences from Results on Developed Countries: Significant Variables and Predictive Models
615
Identifying Chinese personal names based on Support Vector Machines and transformation-based error-driven learning
616
Identifying Cis-Regulatory Elements and Modules Using Conditional Random Fields
617
Identifying citing sentences in research papers using supervised learning
618
Identifying classes in SAR sea ice imagery using correlated texture
619
Identifying Classes via Cognitive Approach in Object-Oriented System
620
Identifying Client Goals for Web Service Discovery
621
Identifying climate and other scenarios that influence the performance of coastal infrastructure projects in Alaska
622
Identifying clinical concepts in unstructured clinical notes using existing knowledge within the corpus
623
Identifying cliques in dark web forums - An agglomerative clustering approach
624
Identifying clones in the Linux kernel
625
Identifying Cloud computing usage patterns
626
Identifying Clusters with Attribute Homogeneity and Similar Connectivity in Information Networks
627
Identifying Code for Directed Graph
628
Identifying Code of Individual Features in Client-Side Web Applications
629
Identifying Code Phases Using Piece-Wise Linear Regressions
630
Identifying Code Smells with Multiple Concern Views
631
Identifying Codes and Covering Problems
632
Identifying codes in random networks
633
Identifying Co-expressed miRNAs using Multiobjective Optimization
634
Identifying cogging torque harmonics affected by misalignment in axial flux fractional pitch PMSM
635
Identifying cognitive abilities to improve CS1 outcome
636
Identifying coherent areas in transmission system for transient stability studies in future smart grids
637
Identifying coherent flows in air traffic
638
Identifying Cohesive Subgroups and Their Correspondences in Multiple Related Networks
639
Identifying Collagen Bundles in the Most Superficial Layer of Normal Articular Cartilage
640
Identifying color image origin using curvelet transform
641
Identifying Color in Motion in Video Sensors
642
Identifying Color Laser Printer Using Noisy Feature and Support Vector Machine
643
Identifying Combinatorial Transcription Factor Interactions with Microarray Data and ChIP-Chip Data
644
Identifying Commitment-Based Software Requirements to Thwart Unfair and Deceptive Practices
645
Identifying Common Characteristics in Fundamental, Integrated, and Agile Software Development Methodologies
646
Identifying Common Source Digital Camera from Image Pairs
647
Identifying Commonly-Used Gestalt Principles as a Design Framework for Multi-Sensory Displays
648
Identifying communication models in Process Networks derived from Weakly Dynamic Programs
649
Identifying communities of practice through ontology network analysis
650
Identifying Communities of Trust and Confidence in the Charity and Not-for-Profit Sector: A Memetic Algorithm Approach
651
Identifying Community Structure in Semantic Peer-to-Peer Networks
652
Identifying Complex Biological Interactions based on Categorical Gene Expression Data
653
Identifying complex functions: By investigating various aspects of code complexity
654
Identifying components in 3D density maps of protein nanomachines by multi-scale segmentation
655
Identifying components knowledge management for e-Health (Case study: Mental Hospital, Indonesia)
656
Identifying composite refactorings with a scripting language
657
Identifying comprehension bottlenecks using program slicing and cognitive complexity metrics
658
Identifying Compromised Users in Shared Computing Infrastructures: A Data-Driven Bayesian Network Approach
659
Identifying computational phases from inter-process communication traces of HPC applications
660
Identifying computer generated and digital camera images using fractional lower order moments
661
Identifying computer generated graphics VIA histogram features
662
Identifying Computer Graphics using HSV Color Model and Statistical Moments of Characteristic Functions
663
Identifying congestion in software-defined networks using spectral graph theory
664
Identifying Connectors and Communities: Understanding Their Impacts on the Performance of a DTN Publish/Subscribe System
665
Identifying Consensus Tags in Social Tagging Systems
666
Identifying consistent brain networks via maximizing predictability of functional connectome from structural connectome
667
Identifying Consonance Relationships between Worker and Organization for Fostering Creativity: A Knowledge Based Approach
668
Identifying consumer requirements as an antidote to resistance to smart meters
669
Identifying contact formations from force signals: a comparison of fuzzy and neural network classifiers
670
Identifying contact formations from sensory patterns and its applicability to robot programming by demonstration
671
Identifying contact formations in the presence of uncertainty
672
Identifying contents page of documents
673
Identifying context of text documents using Naïve Bayes classification and Apriori association rule mining
674
Identifying Context-Specific Transcription Factor Targets From Prior Knowledge and Gene Expression Data
675
Identifying context-specific transcription factor targets from prior knowledge and gene expression data
676
Identifying Contextual Properties of Software Architecture in Cloud Computing
677
Identifying contingency requirements using obstacle analysis
678
Identifying Control Redundancy for Computer Interface Analysis
679
Identifying coordinated compound words for Vietnamese word segmentation
680
Identifying core competence
681
Identifying corners of clothes using image processing method
682
Identifying coronary stenosis using an image-recognition neural network
683
Identifying Corresponding Entities Based on Attribute Entropy in Heterogeneous Databases
684
Identifying cortical sources of corticomuscle coherence during bimanual muscle contraction by temporal decorrelation
685
Identifying cortical sources of incoherent fields of the human brain
686
Identifying cortical sulci from localization, shape and local organization
687
Identifying cost reduction and performance improvement opportunities through simulation
688
Identifying cost-effective VP networks
689
Identifying Cover Songs Using Information-Theoretic Measures of Similarity
690
Identifying Criteria for Classifying Paths in ER Schemata by Using a Description Logic
691
Identifying criteria for designing a process architecture in a multimodel environment
692
Identifying criteria for the design of affective socially engaging kinetic architectural structures
693
Identifying Criteria that Should be Considered when Deciding the Proportion of Online to Face-to-Face Components of a Blended Course
694
Identifying Critical Business rules using rough set theory
695
Identifying Critical Code Sections in Dataflow Programming Models
696
Identifying critical components for reliability centred maintenance management of deregulated power systems
697
Identifying Critical Components for Transmission System Reliability
698
Identifying Critical Dependencies Using General Bayesian Network: An Application to Aviation Operation
699
Identifying critical factors impacting virtual work group performance
700
Identifying Critical Factors Influencing Quality of Blood Vessel Information in JPEG Compressed Skin Images
701
Identifying Critical Factors of Community Privacy
702
Identifying critical focuses in research domains
703
Identifying critical incidents in naturalistic driving data: experiences from a promoting real life observation for gaining understanding of road user behaviour in europe small-scale field trial
704
Identifying Critical Limits for the Maximum Loadability of Electric Power Systems
705
Identifying critical measurements & sets for power system state estimation
706
Identifying critical needs for student success in online learning
707
Identifying critical pathways to high performance PV
708
Identifying Critical Positions and Rules of Antigenic Drift for Influenza A/H3N2 Viruses
709
Identifying critical project management techniques and skills for construction professionals to achieving project success
710
Identifying critical sets in state estimation using Gram matrix
711
Identifying Critical Sub-systems in the Simulation of Cyber-physical Systems
712
Identifying critical success & failure factors for TQM implementation: Extract from real case studies
713
Identifying critical success factors for green supply chain management implementation using fuzzy DEMATEL method
714
Identifying Critical Success Factors for knowledge management implementation in organization: A survey paper
715
Identifying critical technology actors in waste flow management
716
Identifying critical variables of principal components for unsupervised feature selection
717
Identifying Crop Leaf Angle Distribution Based on Two-Temporal and Bidirectional Canopy Reflectance
718
Identifying cross site scripting vulnerabilities in Web applications
719
Identifying crosscutting concerns using historical code changes
720
Identifying cryptographic functionality in Android applications
721
Identifying Cultural Markers for Web Application Design Targeted to a Multi-cultural Audience
722
Identifying Culture and Leveraging Cultural Differences for Negotiation Agents
723
Identifying Curve Reaction Point Using NDS Data
724
Identifying Customer Characteristics by Using Rough Set Theory with a New Algorithm and Posterior Probabilities
725
Identifying cutting sound characteristics in machine tool industry with a neural network
726
Identifying cyber attacks via local model information
727
Identifying cyber black holes (deep web)
728
Identifying Cyber Predators through Forensic Authorship Analysis of Chat Logs
729
Identifying cyber strategies vis-a-vis cyber power
730
Identifying Cycle Causes with Enriched Dependency Structural Matrix
731
Identifying Daily Electric Consumption Patterns from Smart Meter Data by Means of Clustering Algorithms
732
Identifying damaged buildings from high-resolution satellite imagery in hazardous areas using morphological operators
733
Identifying Dark Web clusters with temporal coherence analysis
734
Identifying Data Constrained Activities for Migration Planning
735
Identifying Data Inconsistencies Using After-State Database Testing (ASDT) Framework
736
Identifying Data Transfer Objects in EJB Applications
737
Identifying DC bias conditions for maximum DC current in digitally-assisted analog design
738
Identifying deceptive reviews using networking parameters
739
Identifying de-facto standards for e-commerce Web sites
740
Identifying defects in deep-submicron CMOS ICs
741
Identifying degradation mechanisms in RF MEMS capacitive switches
742
Identifying demand sources that minimize risk for a selective newsvendor
743
Identifying depressed from healthy cases using speech processing
744
Identifying deregulated TF/miRNA negative and double-negative feedback loops in prostate cancer
745
Identifying design glitches through automated design analysis
746
Identifying design patterns in object-oriented software systems using unsupervised learning
747
Identifying Design Requirements for Wireless Routing Link Metrics
748
Identifying design requirements using integrated analysis structures
749
Identifying design systematics using learning based diagnostic analysis
750
Identifying design-code inconsistencies in object-oriented software: a case study
751
Identifying determinants of broadband diffusion by stage and by service
752
Identifying Devnagri characters
753
Identifying dielectric and resistive electrode losses in high-density capacitors at radio frequencies
754
Identifying differences between CAD and physical mock-ups using AR
755
Identifying Differences in News Coverage between Cultural/Ethnic Groups
756
Identifying differences in space programs
757
Identifying Differences in the P600 Component of ERP-Signals between OCD Patients and Controls Employing a PNN-based Majority Vote Classification Scheme
758
Identifying different heart tissues from combined functional and viability MRI images
759
Identifying Different Settings in a Visual Diary
760
Identifying differential expression for RNA-seq data with no replication
761
Identifying differentially expressed genes for ordinal phenotypes
762
Identifying differentially expressed genes from probe level intensities in longitudinal affymetrix microarray experiments
763
Identifying differentially expressed genes in microarray experiments with model-based variance estimation
764
Identifying Differentially Expressed Genes via Weighted Rank Aggregation
765
Identifying differentially expressed pathways via a mixed integer linear programming model
766
Identifying differentially expressed transcripts associated with prostate cancer progression using RNA-Seq and machine learning techniques
767
Identifying differentially regulated genes
768
Identifying differentiating characteristics of internet applications using Principal Component Analysis
769
Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach
770
Identifying Discriminative Amino Acids Within the Hemagglutinin of Human Influenza A H5N1 Virus Using a Decision Tree
771
Identifying Disease Definitions with a Correlation Kernel for Symptom Extractions from Text
772
Identifying disease genes from gene expression data based on singular value decomposition
773
Identifying Disease Susceptible DNA Regions Using Underlying Odds Ratio Contour Analysis
774
Identifying diseases assciated with a high risk for acute kidney injury using a hospital information system database
775
Identifying disordered regions in proteins from amino acid sequence
776
Identifying Dissonance and Other Dangers from Requirements
777
Identifying dissonance and other dangers from requirements
778
Identifying Distinct Components of a Multi-author Document
779
Identifying distinguishing size and shape features of mine-like objects in sidescan sonar imagery
780
Identifying distributed features in SOA by mining dynamic call trees
781
Identifying Diverse Set of Images in Flickr
782
Identifying DNA Strands Using a Kernel of Classified Sequences
783
Identifying Document Topics Using the Wikipedia Category Network
784
Identifying Documentation of Delirium in Clinical Notes through Topic Modeling
785
Identifying domain axioms using binary decision diagrams
786
Identifying Domain Context for the Intentional Modelling Technique MAP
787
Identifying Domain Experts in the Blogosphere -- Ranking Blogs Based on Topic Consistency
788
Identifying domain patterns using software stability
789
Identifying dominant factor of EM radiation from asymmetrical differential-paired lines with equi-distance routing
790
Identifying dominant factor of imbalance component and EM radiation from differential-paired lines with serpentine equi-length routing
791
Identifying dominant people in meetings from audio-visual sensors
792
Identifying Dormant Functionality in Malware Programs
793
Identifying driver genomic alterations in cancers by searching minimum-weight, mutually exclusive sets
794
Identifying Driver Nodes in the Human Signaling Network Using Structural Controllability Analysis
795
Identifying drosophila cell-cycle regulated genes from irregular microarray data
796
Identifying drug (cocaine) intake events from acute physiological response in the presence of free-living physical activity
797
Identifying duplicate functionality in textual use cases by aligning semantic actions (SoSyM abstract)
798
Identifying duplications and lateral gene transfers simultaneously and rapidly
799
Identifying dynamic protein complexes based on gene expression profiles and PPI networks
800
Identifying dynamics and collective behaviors in microblogging traces
801
Identifying e-business readiness factors contributing to IT distribution channel reseller success: a case analysis of two organizations
802
Identifying Ecological Variability in Vegetation Dynamics Through Temporal Mixture Analysis
803
Identifying edge chirality of graphene using polarization resolved μ-Raman spectroscopy
804
Identifying Effecting Factors and Landslide Mapping of Cameron Highland Malaysia
805
Identifying Effective IT Project Manager Personality Characteristics
806
Identifying effective policies in approximate dynamic programming: Beyond regression
807
Identifying effective software engineering (SE) team personality types composition using rough set approach
808
Identifying effective software metrics using genetic algorithms
809
Identifying Effective Test Cases through K-Means Clustering for Enhancing Regression Testing
810
Identifying efficient cane growers and exploiting their expertise in improving inefficient ones?
811
Identifying efficient combinations of error detection mechanisms based on results of fault injection experiments
812
Identifying elderly activity types by interval type-2 fuzzy models
813
Identifying electrical safety needs, implementing improvement, and measuring results
814
Identifying electrical safety needs, implementing improvement, and measuring results
815
Identifying electrically weak and strong segments of a power system from a voltage stability viewpoint
816
Identifying electromagnetic attacks against airports
817
Identifying elephant flows by building a Reversible Counting Bloom Filter
818
Identifying Elephant Flows Using a Reversible MultiLayer Hashed Counting Bloom Filter
819
Identifying EM radiation from asymmetrical differential-paired lines with equi-distance routing
820
Identifying Emerging Customer Requirements in an Early Design Stage by Applying Bayes Factor-Based Sequential Analysis
821
Identifying emerging security concepts using software artifacts through an experimental case
822
Identifying emerging Web-communication patterns between government and citizens
823
Identifying Emotion through Implicit and Explicit Measures: Cultural Differences, Cognitive Load, and Immersion
824
Identifying emotion topic — An unsupervised hybrid approach with Rhetorical Structure and Heuristic Classifier
825
Identifying Employee Internet Abuse
826
Identifying Employees for Re-skilling Using an Analytics-Based Approach
827
Identifying enablers for future e-Services
828
Identifying end-user requirements for communication systems in disadvantaged environments
829
Identifying energy-efficient concurrency levels using machine learning
830
Identifying engagement indicators to support educational research
831
Identifying engineering, clinical and patient´s metrics for evaluating and quantifying performance of brain-machine interface (BMI) systems
832
Identifying entanglement using quantum "ghost" interference and imaging
833
Identifying enterotype in human microbiome by decomposing probabilistic topics into components
834
Identifying enumeration types modeled with symbolic constants
835
Identifying Environmental Factors Affecting Bank Branch Performance using Data Envelopment Analysis
836
Identifying epileptic seizures based on a template-based eyeball detection technique
837
Identifying Equivalent URLs Using URL Signatures
838
Identifying Error in AUV Communication
839
Identifying error proneness in path strata with genetic algorithms
840
Identifying error-box parameters from the twelve-term vector network analyzer error model
841
Identifying Error-Prone Software—An Empirical Study
842
Identifying essential features for the classification of real and pseudo microRNAs precursors using fuzzy decision trees
843
Identifying essential proteins based on protein domains in protein-protein interaction networks
844
Identifying essential proteins via integration of protein interaction and gene expression data
845
Identifying essential segments and points in 2D image for extracting a realizable 3D shape using rule-based approach
846
Identifying evacuation routes via the P-graph methodology
847
Identifying Event Impacts by Monitoring the News Media
848
Identifying Evolution Problems for Large Long Term Industrial Evolution Systems
849
Identifying Evolving Groups in Dynamic Multimode Networks
850
Identifying Exacerbating Cases in Chronic Diseases Based on the Cluster Analysis of Trajectory Data on Laboratory Examinations
851
Identifying execution points for dynamic analyses
852
Identifying Experimental Incidents in Software Engineering Replications
853
Identifying explosives at a distance [News]
854
Identifying extended entity-relationship object structures in relational schemas
855
Identifying extensions required by RUP (rational unified process) to comply with CMM (capability maturity model) levels 2 and 3
856
Identifying external network branch status errors using synchronized phasor measurements
857
Identifying eye blinks in EEG signal analysis
858
Identifying fabrication defects of metal packaged fibre Bragg grating sensors for smart pre-stressing strands
859
Identifying Fabrics With a Variable Emission Airborne Spiking Sonar
860
Identifying faces in a 2D line drawing representing a manifold object
861
Identifying faces using multiple retrievals
862
Identifying Facilitators and Inhibitors of Market Structure Change: A Hybrid Theory of Unbiased Electronic Markets
863
Identifying factors affecting drivers´ selection of unconventional outside left-turn lanes at signallised intersections
864
Identifying factors influencing reliability of professional systems
865
Identifying factors that influence student failure rate using Exhaustive CHAID (Chi-square automatic interaction detection)
866
Identifying factors that influence the success of ICT in developing a learning community: the CELT experience
867
Identifying Failure Causes in Java Programs: An Application of Change Impact Analysis
868
Identifying failure inducing developer pairs within developer networks
869
Identifying failure mechanisms in LDMOS transistors by analytical stability analysis
870
Identifying Failure-Correlated Dependence Chains
871
Identifying Failure-Inducing Combinations in a Combinatorial Test Set
872
Identifying Failure-Inducing Combinations Using Tuple Relationship
873
Identifying Failures in Grids through Monitoring and Ranking
874
Identifying fake and potential corporate members in telecommunications operators
875
Identifying Faked Hotel Reviews Using Authorship Analysis
876
Identifying fault location in distribution systems with high Distributed Generation penetration
877
Identifying fault prone modules: an empirical study in telecommunication system
878
Identifying fault-prone function blocks using the neural networks an empirical study
879
Identifying faults
880
Identifying faults in large-scale distributed systems by filtering noisy error logs
881
Identifying faulty insulator strings by detecting insulator corona pulse current
882
Identifying faulty traffic detectors with Floating Car Data
883
Identifying Faulty TSVs in 3D Stacked IC during Pre-bond Testing
884
Identifying Feature Interactions in Multi-Language Aspect-Oriented Frameworks
885
Identifying features for multi-modality coding
886
Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
887
Identifying features in reconstructing 3D solids from sectional views
888
Identifying Features via Homotopy on Handwritten Mathematical Symbols
889
Identifying feedback mechanisms behind complex cell behavior
890
Identifying fetal heart anomalies using fetal ECG and Doppler cardiogram signals
891
Identifying fiber bundles with regularised к-means clustering applied to the grid-based data
892
Identifying film takes for cinematic analysis
893
Identifying Findings for Software Process Improvement in SMEs: An Experience
894
Identifying fine movement difficulties in Parkinson´s disease using a computer assessment tool
895
Identifying firsthand accounts of emergencies from social media
896
Identifying flaws in the secure routing protocol
897
Identifying flows in the long cycle manufacturing process
898
IDENTIFYING FLUORESCENCE MICROSCOPE IMAGES IN ONLINE JOURNAL ARTICLES USING BOTH IMAGE AND TEXT FEATURES
899
Identifying fMRI Model Violations With Lagrange Multiplier Tests
900
Identifying focal patterns in social networks
901
Identifying Follow-Correlation Itemset-Pairs
902
Identifying Forest Dynamics for Change Detection Using Multitemporal SPOT Imagery
903
Identifying FPGA IP-Cores Based on Lookup Table Content Analysis
904
Identifying Fracture by Time-Frequency Analysis of Well Logs
905
Identifying Fragments to be Extracted from Long Methods
906
Identifying fraudulent online transactions using data mining and statistical techniques
907
Identifying Frequency Domain Uncertainty Bounds for Robust Controller Design - Theory with Application to a Fixed-Bed Reactor
908
Identifying frequency-domain features for an EEG-based pain measurement system
909
Identifying frequent flows in large datasets through probabilistic bloom filters
910
Identifying Frequent Items in P2P Systems
911
Identifying frequent terms in text databases by association semantics
912
Identifying fruitful connections between and among researchers and practitioners
913
Identifying Functional Binding Motifs of Tumor Protein p53 Using Support Vector Machines
914
Identifying functional clusters in the brain using phase synchrony
915
Identifying functional connectivity of motor neuronal ensembles improves the performance of population decoders
916
Identifying functional connectomics abnormality in attention deficit hyperactivity disorder
917
Identifying Functional Groups by Finding Cliques and Near-Cliques in Protein Interaction Networks
918
Identifying functional modules in tissue specific protein interaction network
919
Identifying Functional Modules Using MST-Based Weighted Gene Co-Expression Networks
920
Identifying functional networks via sparse coding of whole brain FMRI signals
921
Identifying functional requirements for flexible airspace management concept using human-in-the-loop simulations
922
Identifying functional requirements for flexible airspace management concept using human-in-the-loop simulations
923
Identifying Fungal Regulatory Motif Patterns Using SCOPE, an Ensemble Learning Method Motif Finder
924
Identifying fusion events in fluorescence microscopy images
925
Identifying future field accesses in exhaustive state space traversal
926
Identifying future skills for technical communicators: An action plan
927
Identifying gamakas in Carnatic music
928
Identifying gaps in health research and training in Africa: Designing online surveys for Cloud-oriented training
929
Identifying gaps in IT retail Information Security policy implementation processes
930
Identifying gender from human faces using correlation filters
931
Identifying Gender from Unaligned Facial Images by Set Classification
932
Identifying gender independent biomarkers responsible for human muscle aging using microarray data
933
Identifying gender, age and Education level by analyzing comments on Facebook
934
Identifying gene and protein names from biological texts
935
Identifying gene ontology concepts in natural-language text
936
Identifying Gene Pathways Associated with Cancer Characteristics via Sparse Statistical Methods
937
Identifying Gene Signatures from Cancer Progression Data Using Ordinal Analysis
938
Identifying gene subnetworks associated with clinical outcome in ovarian cancer using Network Based Coalition Game
939
Identifying gene-disease associations using word proximity and similarity of Gene Ontology terms
940
Identifying generator outage from line flows
941
Identifying Generators at Risk of SSR in Meshed Compensated AC/DC Power Networks
942
Identifying generators for number theoretic transforms
943
Identifying generic agents for active workspaces
944
Identifying generic safety requirements
945
Identifying genes associated with chemotherapy response in ovarian carcinomas based on DNA copy number and expression profiles
946
Identifying Genes with The Concept of Customization
947
Identifying genetic connections with brain functions in schizophrenia using group sparse canonical correlation analysis
948
Identifying genetically spliced languages
949
Identifying Genomic Regulators of Set-Wise Co-Expression
950
Identifying global hot items in distributed dynamic data streams
951
Identifying Global Icebergs in Distributed Streams
952
Identifying Google Talk packets
953
Identifying Governance Dimensions to Evaluate Information Systems Security in Organizations
954
Identifying Gravel Layer Using Time-Domain Analysis Methods for Landfill Leak Repair
955
Identifying ground fault location in High Resistance Grounded systems for Adjustable Speed Drive at low speed
956
Identifying ground fault location in High Resistance Grounded systems using Adjustable Speed Drive
957
Identifying ground-fault locations: Using adjustable speed drives in high-resistance grounded systems
958
Identifying groups of interest through temporal analysis and event response monitoring
959
Identifying groups of preventive controls for a set of critical contingencies in the context of voltage stability
960
Identifying Growth Opportunities Using Information Analytics: A Case Study in Five Industries
961
Identifying growth-patterns in children by applying cluster analysis to electronic medical records
962
Identifying hand-motion patterns via kernel discriminant analysis based dimension reduction and quadratic classifier
963
Identifying Handwritten Text in Mixed Documents
964
Identifying Haptic Exploratory Procedures by Analyzing Hand Dynamics and Contact Force
965
Identifying Harmful Web Pages in Laboratory Information Security Management
966
Identifying Harmonic Attributes From Online Partial Discharge Data
967
Identifying harmonic attributes from on-line partial discharge data
968
Identifying Harmonic Contributions from Non-Linear Loads using Neural Networks
969
Identifying harmonic sources on the power grid - some technical challenges
970
Identifying health inequalities using artificial neural networks (WHO data)
971
Identifying healthy and mastitis Sahiwal cows using electro-chemical properties: A connectionist approach
972
Identifying healthy and pathologically affected voice signals [Lecture notes]
973
Identifying Heart Sound Sources through Multi-Channel Acquisition and a 3-D Model
974
Identifying heavy-hitter flows fast and accurately
975
Identifying heritable composite traits from multivariate phenotypes and genome-wide SNPs
976
Identifying Hidden Confounders in Gene Networks by Bayesian Networks
977
Identifying Hierarchical Structures in Sequences on GPU
978
Identifying high amenity zones in the U.S. and China with advanced GIS techniques
979
Identifying High betweenness Centrality Vertices in Large Noisy Networks
980
Identifying High Cardinality Internet Hosts
981
Identifying high dissemination capability nodes in opportunistic social networks
982
Identifying high performance ERP projects
983
Identifying high risk crime areas using topology
984
Identifying high risk N-k contingencies for online security assessment
985
Identifying High Throughput Paths in 802.11 Mesh Networks: a Model-based Approach
986
Identifying high-cardinality hosts from network-wide traffic measurements
987
Identifying high-dimension subspace subcodes of Reed-Solomon codes
988
Identifying high-level components in combinational circuits
989
Identifying high-level dependence structures using slice-based dependence analysis
990
Identifying Highly Potential Enterprises with Social Computing on Supply Chain Networks
991
Identifying high-rate flows based on Bayesian single sampling
992
Identifying high-rate flows with less memory
993
Identifying High-Rate Flows with Less Memory
994
Identifying high-risk scenarios of complex systems using input domain partitioning
995
Identifying histological concepts on basal cell carcinoma images using nuclei based sampling and multi-scale descriptors
996
Identifying homogenous reconfigurable regions in heterogeneous FPGAs for module relocation
997
Identifying homogenous subgroups for individual patient meta-analysis based on Rough Set Theory
998
Identifying hot and cold data in main-memory databases
999
Identifying Hot Lines of Urban Spatial Structure Using Cellphone Call Detail Record Data
1000
Identifying HotSpots in Lung Cancer Data Using Association Rule Mining