<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Identifying hsa-miR-122 target sites in HCV isolate JFH-1
2
Identifying Hub Proteins and Their Essentiality from Protein-protein Interaction Network
3
Identifying human and tracking using WSN with webcam and GSM
4
Identifying human faces in general appearances
5
Identifying human interactions in indoor environments
6
Identifying human spatio-temporal activity patterns from mobile-phone traces
7
Identifying humans using comparative descriptions
8
Identifying hypertrophic cardiomyopathy patients by classifying individual heartbeats from 12-lead ECG signals
9
Identifying Hysteresis Losses in Magnetic Media
10
Identifying ideal values of parameters for software performance testing
11
Identifying ill tool combinations via Gibbs Sampler for semiconductor manufacturing yield diagnosis
12
Identifying Image Authenticity by Detecting Inconsistency in Light Source Direction
13
Identifying Image Composites Through Shadow Matte Consistency
14
Identifying image spam authorship with variable bin-width histogram-based projective clustering
15
Identifying Image Spam based on Header and File Properties using C4.5 Decision Trees and Support Vector Machine Learning
16
Identifying Immature Precursor Cells in Bone Marrow Pathological Images Based on Distance Transform and Internal Structures of Cells
17
Identifying Impaired Cochlear Implant Channels via Speech-Token Confusion Matrix Analysis
18
Identifying Implicit Architectural Dependencies Using Measures of Source Code Change Waves
19
Identifying implicitly declared self-tuning behavior through dynamic analysis
20
Identifying important characteristics in the KDD99 intrusion detection dataset by feature selection using a hybrid approach
21
Identifying important factors in deterministic investment problems using design of experiments
22
Identifying Important Features for Intrusion Detection using Discriminant Analysis and Support Vector Machine
23
Identifying important features for intrusion detection using support vector machines and neural networks
24
Identifying Important Nodes in Weighted Covert Networks Using Generalized Centrality Measures
25
Identifying Important Users in Sina Microblog
26
Identifying Incentive Factors in IT Governance: An Exploratory Study
27
Identifying inconsistencies in multiple clinical practice guidelines for a patient with co-morbidity
28
Identifying increased risk of post-infarct people with diabetes using multi-lag Tone-Entropy analysis
29
Identifying Incremental Costs For Successive Generations Of Implantable Cardiac Pacemakers
30
Identifying indicators of insider threats: Insider IT sabotage
31
Identifying Indirect Attribute Correspondences in Multilingual Schemas
32
Identifying individual fires from satellite-derived burned area data
33
Identifying individual process patterns by means of non-invasive measurements: preliminary results
34
Identifying individual vulnerability based on public data
35
Identifying Individuality Using Mental Task Based Brain Computer Interface
36
Identifying individuals in video by combining ´generative´ and discriminative head models
37
Identifying individuals using ECG beats
38
Identifying induction machine parameters using a genetic optimization algorithm
39
Identifying industrial clusters in Malaysia
40
Identifying industrial processes through VNIR-SWIR reflectance spectroscopy of their waste materials
41
Identifying Infeasible GUI Test Cases Using Support Vector Machines and Induced Grammars
42
Identifying Infection Sources and Regions in Large Networks
43
Identifying infection sources in large tree networks
44
Identifying Influential Actors in Social Network Platforms
45
Identifying Influential Bloggers: Time Does Matter
46
Identifying Influential Nodes in Bipartite Networks Using the Clustering Coefficient
47
Identifying Influential Nodes in Online Social Networks Using Principal Component Centrality
48
Identifying influential scholars in academic social media platforms
49
Identifying Influential Taggers in Trust-Aware Recommender Systems
50
Identifying informal communities and leaders for total quality management using network analysis of email
51
Identifying Information Assets for Open Data: The Role of Business Architecture and Information Quality
52
Identifying Information Sender Configuration of Web Pages
53
Identifying Informational Needs for Open Government: The Case of Egypt
54
Identifying innovation strategy by examining business ecosystem: Exploratory research on Korea smart-phone market via network analysis
55
Identifying inorganic material affinity classes for peptide sequences based on context learning
56
Identifying inrush current using sinusoidal proximity factor
57
Identifying inrush currents from internal faults using symmetrical components in power transformers
58
Identifying in-set and out-of-set speakers using neighborhood information
59
Identifying Insider-Based Jammers in Multi-Channel Wireless Networks
60
Identifying insightful salinity and temperature variations in ocean data
61
Identifying Instances of Model Design Patterns and Antipatterns Using Model Clone Detection
62
Identifying interacting SNPs with parallel fish-agent based logic regression
63
Identifying Interaction Barriers in the Use of Remote Controls
64
Identifying Interaction Groups in Social Network Using a Game-Theoretic Approach
65
Identifying inter-area oscillations using Hilbert-Huang trasformation for improving damping through PSS
66
Identifying interdependencies using attack graph generation methods
67
Identifying Interest Flooding in Named Data Networking
68
Identifying interesting topology structure of membrane protein interaction networks based on intelligent agents
69
Identifying interesting visitors through Web log classification
70
Identifying Interface Elements Implied in Protein-Protein Interactions Using Statistical Tests and Frequent Item Sets
71
Identifying Interface States in AlInN/GaN Heterostructure by Photocurrent Method
72
Identifying internal faults of transformers through the similarity degree between voltage and current
73
Identifying Inter-organizational Key Performance Indicators from EDIFACT Messages
74
Identifying intertemporal relationships in corporate R&D expenditures
75
Identifying Intracellular pDNA Losses From a Model of Nonviral Gene Delivery
76
Identifying intrusions in computer networks with principal component analysis
77
Identifying invalid states for sequential circuit test generation
78
Identifying inverse human arm dynamics using a robotic testbed
79
Identifying inverted repeat structure in DNA sequences using correlation framework
80
Identifying isometric recruitment curves of electrically stimulated muscle
81
Identifying Issues that Adversely Affect Data Center Reliability through Electrical System Audits
82
Identifying IT Service Management Challenges: A Case Study in Two IT Service Provider Companies
83
Identifying IT User Mindsets: Acceptance, Resistance and Ambivalence
84
Identifying Jammers in Wireless Sensor Network with an Approach to Defend Reactive Jammer
85
Identifying JET instabilities with neural networks
86
Identifying junk electronic mail in Microsoft outlook with a support vector machine
87
Identifying Justifications in Written Dialogs
88
Identifying key attributes of projects that affect the field quality of communication software
89
Identifying key design parameters for Monte Carlo simulation of Doppler spread channels
90
Identifying key digital prepress competence requirements for printing technology workforce
91
Identifying key factors in agent-based simulation model on processes in time-constrained environment
92
Identifying Key Features for P2P Traffic Classification
93
Identifying key players in a covert network using behavioral profile
94
Identifying key players in a social network: Measuring the extent of an individual´s Neighbourhood Connectivity
95
Identifying key process characteristics and predicting etch rate from high-dimension datasets
96
Identifying Key Requirements for a New Product Line
97
Identifying Key Users for Targeted Marketing by Mining Online Social Network
98
Identifying Key-Players in Online Activist Groups on the Facebook Social Network
99
Identifying Kinetic Constants by the Intrinsic Properties of Markov Chain
100
Identifying Knowledge Brokers and Their Role in Enterprise Research through Social Media
101
Identifying knowledge components in software requirement elicitation
102
Identifying Knowledge Divergence by Vocabulary Monitoring in Software Projects
103
Identifying knowledge domain and incremental new class learning in SVM
104
Identifying Knowledge Management Challenges in a Service Desk: A Case Study
105
Identifying knowledge management needs in software maintenance groups: a qualitative approach
106
Identifying knowledge-building phases in computer-supported collaborative learning: A review
107
Identifying Known and Unknown Peer-to-Peer Traffic
108
Identifying lake longer-term dynamics via fuzzy relations and non-linear Kalman filters
109
Identifying landmark cues with LIDAR laser scanner data taken from multiple viewpoints
110
Identifying lane types: A modular approach
111
Identifying Language Origin of Named Entity With Multiple Information Sources
112
Identifying Language Origin of Person Names With N-Grams of Different Units
113
Identifying latent dynamic components in biological systems
114
Identifying Leaders and Followers in Online Social Networks
115
Identifying leaf in a natural image using morphological characters
116
Identifying learners robust to low quality data
117
Identifying learning difficulties based on email responses of technologically-impoverished users
118
Identifying Learning Object Pedagogical Features to Decide Instructional Setting
119
Identifying Learning Styles in Learning Management Systems by Using Indications from Students´ Behaviour
120
Identifying learning-inductive content in programming discussion forums
121
Identifying least affected parameters in analyzing Electrical Impedance Myography with alteration in subcutaneous fat thickness via finite element model
122
Identifying leaves with watershed and CSS: Implementation of segmentation and object matching
123
Identifying legacy re-host conversion candidates: Keeping current with technology
124
Identifying Legitimate Clients under Distributed Denial-of-Service Attacks
125
Identifying library functions in executable file using patterns
126
Identifying licensing of jar archives using a code-search approach
127
Identifying life style factors of Bottom-of-Pyramid People to facilitate a ubiquitous learning environment: Sri Lankan experience
128
Identifying line vulnerability in power system using maximum flow based complex network theory
129
Identifying linear models from time domain simulations
130
Identifying linear models of systems suffering nonlinear distortions
131
Identifying linear models of systems suffering nonlinear distortions, with a gas turbine application
132
Identifying linear reduced-order models for systems with arbitrary initial conditions using Prony signal analysis
133
Identifying Linux bug fixing patches
134
Identifying Lithology and Matrix for Unconventional Reservoir Based on Geochemical Elements Logs
135
Identifying Load Inventory from Measurments
136
Identifying local gene expression patterns in biomolecular networks
137
Identifying Local Temporal Burstiness Using MACD Histogram
138
Identifying local trust value with neural network in P2P environment
139
Identifying Local Ultrametricity of EEG Time Series for Feature Extraction in a Brain-Computer Interface
140
Identifying Long Lived Social Communities Using Structural Properties
141
Identifying Long-range Dependent Network Traffic through Autocorrelation Functions
142
Identifying low reflection amplitude and low level phase noise points for permanent scatterer (PS) interferometry
143
Identifying Low-ProfileWeb Server´s IP Fingerprint
144
Identifying Lymphoma in Microscopy Images with Classificational Cellular Automata
145
Identifying machine query for an intelligent web browser system
146
Identifying main areas generating stormwater pollution from satellite imagery and ancillary data
147
Identifying main crop classes in an irrigated area using high resolution image time series
148
Identifying main resistance factors in ERP implementation: A case study
149
Identifying main topics in density-based spatial clusters using network-based representative document extraction
150
Identifying Malicious Attacks to Wireless Localization in Bad Channel Conditions
151
Identifying malicious behavior in MANET through data path information
152
Identifying Malicious Metering Data in Advanced Metering Infrastructure
153
Identifying malicious node using trust value in cluster based MANET (IMTVCM)
154
Identifying Malicious Nodes in Mobile Ad Hoc Networks using a Reputation Scheme based on Reinforcement Learning
155
Identifying Malicious Peers Before It´s Too Late: A Decentralized Secure Peer Sampling Service
156
Identifying malicious peers in MANETs
157
Identifying malignant and benign breast lesions using vibroelastography
158
Identifying malware genera using the Jensen-Shannon distance between system call traces
159
Identifying Mammalian MicroRNA Targets Based on Supervised Distance Metric Learning
160
Identifying management procedures to deal with connection of Electric Vehicles in the grid
161
Identifying manipulations with dual video watermark
162
Identifying Man-Made Objects Along Urban Road Corridors From Mobile LiDAR Data
163
Identifying manufacturing induced rotor and stator misalignment in brushless permanent magnet motors
164
Identifying mapping relationships between functions and technologies: An approach based on association rule mining
165
Identifying Markov blankets with decision tree induction
166
Identifying Marks [Electronics Tagging]
167
Identifying mass parameters for gravity compensation and automatic torque sensor calibration
168
Identifying Masses in Mammograms Using Template Matching
169
Identifying maximal rigid components in bearing-based localization
170
Identifying Meaningful Concept Map Elements from a Cultural Perspective
171
Identifying meaningful locations
172
Identifying meaningful locations
173
Identifying Mechanisms That Highly Accelerated Tests Miss
174
Identifying Medical Terms Related to Specific Diseases
175
Identifying medicine bottles by incorporating RFID and video analysis
176
Identifying Merge-Beneficial Software Kernels for Hardware Implementation
177
Identifying Metabolite Biomarkers in Unstable Angina In-Patients by Feature Selection Based Data Mining Methods
178
Identifying metamorphic virus using n-grams and Hidden Markov Model
179
Identifying metastasis in bone scans with Stochastic Diffusion Search
180
Identifying method friendships to remove the feature envy bad smell: NIER track
181
Identifying method of rocket resistance coefficients based on sensitivity function
182
Identifying Metrics´ Biases When Measuring or Approximating Size in Heterogeneous Languages
183
Identifying micro-anatomical compartments of mammalian optic nerve based on NMR T2-relaxation analysis
184
Identifying MIMO Wiener systems using subspace model identification methods
185
Identifying MIMO wireless devices based on radiometric signatures
186
Identifying minimal shift counters: a search technique
187
Identifying minimally redundant wavenumbers for vibrational microspectroscopic image analysis
188
Identifying MiRNA and Imaging Features Associated with Metastasis of Lung Cancer to the Brain
189
Identifying miRNA-mediated signaling subpathways by integrating paired miRNA/mRNA expression data with pathway topology
190
Identifying misconceptions held about the engineering design process
191
Identifying missed monitoring alerts based on unstructured incident tickets
192
Identifying mobiles hiding behind wireless routers
193
Identifying mode confusion potential in software design
194
Identifying Model Inaccuracies and Solution Uncertainties in Noninvasive Activation-Based Imaging of Cardiac Excitation Using Convex Relaxation
195
Identifying Model of Industry Clusters Life Cycle Based on RS-ANN
196
Identifying Model Parameters of Semiconductor Devices Using Optimization Techniques
197
Identifying modeling errors in mine electrical power flow input
198
Identifying models of HVAC systems using semiparametric regression
199
Identifying Modes of Intent from Driver Behaviors in Dynamic Environments
200
Identifying modular function via edge annotation in gene correlation networks using Gene Ontology search
201
Identifying modular relations in complex brain networks
202
Identifying modules via concept analysis
203
Identifying modules via concept analysis
204
Identifying modules which do not propagate errors
205
Identifying monitoring nodes in MANET by detecting unauthorized and malicious nodes
206
Identifying More Equivalent Mutants via Code Similarity
207
Identifying most relevant non-redundant gene markers from gene expression data using PSO-based graph -theoretic approach
208
Identifying most responsive regions in the HIP using composite models
209
Identifying Most Significant Genes on Imputed Gene Expression Dataset
210
Identifying Motion Capture Tracking Markers with Self-Organizing Maps
211
Identifying Movement Onset Times for a Bed-Based Pressure Sensor Array
212
Identifying moving bodies from CCTV videos using machine learning techniques
213
Identifying multipath within terrestrial video using a locally modified GCR signal
214
Identifying multiple abdominal organs from CT image series using a multimodule contextual neural network and spatial fuzzy rules
215
Identifying multiple infection sources in a network
216
Identifying multiple interacting bad data in power system state estimation
217
Identifying multiple stem-loops pre-miRNA using support vector machine
218
Identifying multi-regime behaviors of memes in Twitter data
219
Identifying multivariate EEG synchronization networks through multiple subject community detection
220
Identifying multi-view patterns with hierarchy and granularity based multimodal (HGM) cogntive model
221
Identifying Multi-Word Terms by Text-Segments
222
Identifying musculo-tendon parameters of human body based on the musculo-skeletal dynamics computation and Hill-Stroeve muscle model
223
Identifying music-induced emotions from EEG for use in brain-computer music interfacing
224
Identifying mutated core modules in glioblastoma by integrative network analysis
225
Identifying myocardial ischemia by inversely computing transmembrane potentials from body-surface potential maps
226
Identifying named entities in biomedical text based on stacked generalization
227
Identifying named entities on a University intranet
228
Identifying natural degradation/aging in power MOSFETs in a live grid-tied PV inverter using spread spectrum time domain reflectometry
229
Identifying NBTI-Critical Paths in Nanoscale Logic
230
Identifying network attacks from a social perspective
231
Identifying Network Correlates of Brain States Using Tensor Decompositions of Whole-Brain Dynamic Functional Connectivity
232
Identifying network failure via detecting changes in power profile
233
Identifying network packets across translational boundaries
234
Identifying network traffic features suitable for honeynet data analysis
235
Identifying Networks of Semantically-Similar Individuals from Public Discussion Forums
236
Identifying neural components of emotion in free conversation with fMRI
237
Identifying Neural Discharges using Time-Frequency Distributions for EEG
238
Identifying neuron communities during a reach and grasp task using an unsupervised clustering analysis
239
Identifying New IT-Based Service Concepts Based on the Technological Strength: A Text Mining and Morphology Analysis Approach
240
Identifying New Methylated Arginines via Granular Decision Fusion with SVM Modeling
241
Identifying new prognostic features for remaining useful life prediction
242
Identifying new prognostic features for remaining useful life prediction using particle filtering and Neuro-Fuzzy System predictor
243
Identifying Nocuous Ambiguities in Natural Language Requirements
244
Identifying Node Importance by Combining Betweenness Centrality and Katz Centrality
245
Identifying nodes in a master-slave-fieldbus
246
Identifying noise in an attribute of interest
247
Identifying noise model in closed-loop using subspace method
248
Identifying Noncooperative Subjects at a Distance Using Face Images and Inferred Three-Dimensional Face Models
249
Identifying nondominated alternatives with partial information for multiple-objective discrete and linear programming problems
250
Identifying nonlinear dynamic systems using neural nets and evolutionary programming
251
Identifying non-linear fractional chirps using unsupervised Hilbert approach
252
Identifying nonlinear systems from experimental data
253
Identifying Non-Redundant Gene Markers from Microarray Data: A Multiobjective Variable Length PSO-Based Approach
254
Identifying Non-Robust Untestable RTL Paths in Circuits with Multi-cycle Paths
255
Identifying nonstationary measurement noise in linear systems (Corresp.)
256
Identifying non-technological barriers to Wind power: Local communities
257
Identifying nonverbal cues for automated human-robot turn-taking
258
Identifying novel glioma associated pathways based on integrated ‘omics’ data
259
Identifying nuclear protein subcellular localization using feature dimension reduction method
260
Identifying nude pictures
261
Identifying number of neurons in extracellular recording
262
Identifying objects from hand configurations during in-hand exploration
263
Identifying objects in a conventional procedural language: an example of data design recovery
264
Identifying objects in legacy systems
265
Identifying objects using cluster and concept analysis
266
Identifying objects using RF transmitters and receivers, and retrieving data using GSM
267
Identifying Obstacles In The Path To More
268
Identifying obstacles in the shift to electronic media by professional societies: a Delphi study of the IEEE
269
Identifying Oceanographic Data Gaps in the EEZ
270
Identifying of Hydraulic Turbine Generating Unit Model Based on Neural Network
271
Identifying of user interface elements from use case descriptions
272
Identifying oil-gas layer by minimum distance clustering
273
Identifying on-line behavior and some sources of difficulty in two competitive approaches for constrained optimization
274
Identifying online communities of interest using side information
275
Identifying online credit card fraud using Artificial Immune Systems
276
Identifying online learners´ requirements for an efficient feedback and support system
277
Identifying online opinion leaders using K-means clustering
278
Identifying opaque behavioural changes
279
Identifying operating conditions from pre-weld information for resistance spot welding
280
Identifying operative goals by modeling project selection decisions in research and development
281
Identifying Opinion Holders in Opinion Text from Online Newspapers
282
Identifying Opinion Leaders in BBS
283
Identifying Opinion Sentences and Opinion Holders in Internet Public Opinion
284
Identifying opportunities and constraints for goal achievement through relationship analysis
285
Identifying Opportunities for Byte-Addressable Non-Volatile Memory in Extreme-Scale Scientific Applications
286
Identifying Opportunities for Web Services Security Performance Optimizations
287
Identifying Optimal Components in a Reliability System
288
Identifying Optimal Composite Services by Decomposing the Service Composition Problem
289
Identifying Optimal Gaussian Filter for Gaussian Noise Removal
290
Identifying optimal generic processors for biomedical implants
291
Identifying Optimal Jobs to Work On: The Role of Attitude in Job Selection
292
Identifying optimal measurement subspace for ensemble Kalman filter
293
Identifying Optimum Artificial Bee Colony (ABC) Algorithm´s Parameters for Scheduling the Manufacture and Assembly of Complex Products
294
Identifying Organizational Knowledge Paths through Social Network Lens: Synthesis of Multi-Industry Case Studies
295
Identifying orthologs: cycle splitting on the breakpoint graph
296
Identifying Outbound Tourism Visitors by Using E-Services Behavioral and Psychological Markers
297
Identifying outdated requirements based on source code changes
298
Identifying Outliers in Large Matrices via Randomized Adaptive Compressive Sampling
299
Identifying Ovarian Cancer Chemotherapy Response Relevant Gene Cliques
300
Identifying overlapping communities in complex networks with multimodal optimization
301
Identifying overlapping functional modules in biological networks by Markov random walk
302
Identifying overly strong conditions in refactoring implementations
303
Identifying P2P flow with behavior characteristics
304
Identifying P2P Network Activities on Encrypted Traffic
305
Identifying Pain and Hunger in Infant Cry with Classifiers Ensembles
306
Identifying painters from color profiles of skin patches in painting images
307
Identifying parallel jobs for Multi-Physics simulators scheduling
308
Identifying parallelism in programs with cyclic graphs
309
Identifying Parameter Errors via Multiple Measurement Scans
310
Identifying parameters in active magnetic bearing system using LFT formulation and Youla factorization
311
Identifying parasitic current pathways in CIGS solar cells by modelling dark JV response
312
Identifying Participants´ Roles in Open Government Platforms and Its Impact on Community Growth
313
Identifying part-of-speech patterns for automatic tagging
314
Identifying passive UHF RFID tags using signal features at different Tari durations
315
Identifying patients and visualize their vitality data through augmented reality
316
Identifying patterns for human activities of daily living in smart homes
317
Identifying patterns in temporal variation of functional connectivity using resting state FMRI
318
Identifying Patterns in Texts
319
Identifying patterns of conformational changes in HLA-A*0201-related immunological activities
320
Identifying patterns of copy number variants in case-control studies of human genetic disorders
321
Identifying patterns of software acquisition projects through the application of the MECT method
322
Identifying patterns towards Algorithm Based Fault Tolerance
323
Identifying PCB Contaminated Transformers Through Active Learning
324
Identifying people with soft-biometrics at Fleet Week
325
Identifying Performance Bottlenecks in Work-Stealing Computations
326
Identifying performance bottlenecks on modern microarchitectures using an adaptable probe
327
Identifying performance deviations in thread pools
328
Identifying Performance Metrics to Maximize MANETs Throughput
329
Identifying Performance-Critical Components in Transaction-Oriented Distributed Systems
330
Identifying periodicity of microarray gene expression profiles by autoregressive modeling and spectral estimation
331
IDENTIFYING PERSON RE-OCCURRENCES FOR PERSONAL PHOTO MANAGEMENT APPLICATIONS
332
Identifying Personalization Patterns Using Intelligent Techniques in XML-Based Communication Records
333
Identifying Personalized Context-Aware Knowledge Structure for Individual User in Ubiquitous Learning Environment
334
Identifying phenomenological magnetoresistive properties of spin valves
335
Identifying photographic images and photorealistic computer graphics using multifractal spectrum features of PRNU
336
Identifying photorealistic computer graphics using second-order difference statistics
337
Identifying Physical Activity Profiles in COPD Patients Using Topic Models
338
Identifying Physical Interactions from Climate Data: Challenges and Opportunities
339
Identifying physical properties of deformable objects by using particle filters
340
Identifying physiologically significant pumping state transitions in implantable rotary blood pumps used as left ventricular assist devices: an in-vivo study
341
Identifying physiologically significant pumping states in implantable rotary blood pumps using non-invasive system observers
342
Identifying Pitfalls of System Integration -- An Exploratory Study
343
Identifying Place Histories from Activity Traces with an Eye to Parameter Impact
344
Identifying places of interest for tourists using knowledge discovery techniques
345
Identifying players in broadcast sports videos using conditional random fields
346
Identifying poles from time-domain data using discrete Laguerre system
347
Identifying policies that are most likely to produce a desirable outcome
348
Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks
349
Identifying positional homologs as bidirectional best hits of sequence and gene context similarity
350
Identifying positive feedback structures for assessing the uniqueness of the DC solution by using topological conditions
351
Identifying positive roles for endogenous stochastic noise during computation in neural systems
352
Identifying Potential Core Assets in Service-Based Systems to Support the Transition to Service-Oriented Product Lines
353
Identifying potential coupling sources in the x86 instruction set
354
Identifying Potential Interaction between BWR Plant Dynamics and Power System Electromechanical Oscillations
355
Identifying Potential Leaders for Virtual Teams
356
Identifying Potential Pollution Sources in River Basin via Water Quality Reasoning Based Expert System
357
Identifying potentially user-interested concepts in an ontology
358
Identifying Potentially-Impacted Area by Vulnerabilities in Networked Systems Using CVSS
359
Identifying power flow control infeasibilities in large scale power system models
360
Identifying Power Flow Control Infeasibilities in Large-Scale Power System Models
361
Identifying Power Models State Space Techniques
362
Identifying power profiles in the photovoltaic power station data by self-organizing maps and dimension reduction by Sammon´s projection
363
Identifying Power Quality Disturbances in Real Time Using Incremental Wavelet Decomposition and Least Square Support Vector Machine
364
Identifying pre-conditions with the Z/EVES theorem prover
365
Identifying precursory cancer lesions using temporal texture analysis
366
Identifying Predictive Metrics for Supervisory Control of Multiple Robots
367
Identifying Predictive Regions from fMRI with TV-L1 Prior
368
Identifying Prestress Loss of Long Span Bridge Based on Genetic Algorithm Combined with Neural Network
369
Identifying primitives for a calorimeter trigger
370
Identifying princes of Sleeping Beauty - knowledge mapping in discovering princes
371
Identifying principal social signals in private student-teacher interactions for robot-enhanced education
372
Identifying principle and method for atmospheric environmental risk sources
373
Identifying problematic classes in text classification
374
Identifying Process Improvement Targets in Test Processes: A Case Study
375
Identifying prognostic indicators for electrical treeing in solid insulation through PD analysis
376
Identifying program power phase behavior using power vectors
377
Identifying program, test, and environmental changes that affect behaviour
378
Identifying projected clusters from gene expression profiles
379
Identifying propagated response delays in performance monitoring of n-tier applications
380
Identifying properties of software change request process: Qualitative investigation in very small software companies
381
Identifying Prostate Cancer-Related Networks from Microarray Data Based on Genotype-Phenotype Networks Using Markov Blanket Search
382
Identifying prosumer´s energy sharing behaviours for forming optimal prosumer-communities
383
Identifying protein binding functionality of protein family sequences by aligned pattern clusters
384
Identifying protein binding functionality of protein family sequences by Aligned Pattern clusters
385
Identifying protein complexes based on local fitness method
386
Identifying Protein Complexes Based on Multiple Topological Structures in PPI Networks
387
Identifying protein complexes based on neighborhood density in weighted PPI networks
388
Identifying Protein Complexes From Interactome Based on Essential Proteins and Local Fitness Method
389
Identifying Protein Complexes from PPI Networks Using GO Semantic Similarity
390
Identifying protein submitochondrial location by using features of sequence
391
Identifying Protein-Kinase-Specific Phosphorylation Sites Based on the Bagging–AdaBoost Ensemble Approach
392
Identifying protein-protein interaction sites using adapted Bayesian classifier
393
Identifying proteins for microbiosensor applications
394
Identifying prototype states within hydrodynamic model outputs using a self-organizing feature map
395
Identifying Provider Counseling Practices Using Natural Language Processing: Gout Example
396
Identifying Proxy Nodes in a Tor Anonymization Circuit
397
Identifying Purchase-Stage by Applying Pattern Mining to Web Access Logs
398
Identifying purchasing competences and organizational configuration for innovative product development
399
Identifying PV Module Mismatch Faults by a Thermography-Based Temperature Distribution Analysis
400
Identifying quadruped gait in wildlife video
401
Identifying quality characteristic interactions during software development
402
Identifying Quality Factors within Data Warehouse
403
Identifying quality improvement opportunities in a manufacturing enterprise
404
Identifying quality-requirement conflicts
405
Identifying quality-requirement conflicts
406
Identifying questions on Turkish tweets
407
Identifying radar secondary data for signal detection
408
Identifying radiation mechanisms on small conducting objects using radiation modes
409
Identifying Ragas in Indian Music
410
Identifying Rare and Subtle Behaviors: A Weakly Supervised Joint Topic Model
411
Identifying rate mismatch through architecture transformation
412
Identifying reaction of stock price to public information based on fuzzy c-means clustering
413
Identifying reactive market areas
414
Identifying reasons for software changes using historic databases
415
Identifying recombination mechanisms through materials development in perovskite solar cells
416
Identifying Recurrent and Unknown Performance Issues
417
Identifying Recurring Faulty Functions in Field Traces of a Large Industrial Software System
418
Identifying Reduced-Order Models for Large Nonlinear Systems with Arbitrary Initial Conditions and Multiple Outputs using Prony Signal Analysis
419
Identifying redundancies using reduced symbolic simulation [digital VLSI circuits]
420
Identifying Redundancy and Exposing Provenance in Crowdsourced Data Analysis
421
Identifying redundant gate replacements in verification by error modeling
422
Identifying redundant inter-cell margins and its application to reducing routing congestion
423
Identifying redundant path delay faults in sequential circuits
424
Identifying redundant wire replacements for synthesis and verification
425
Identifying reduplicative words for Vietnamese word segmentation
426
Identifying refactoring opportunities using logic meta programming
427
Identifying refactoring sequences for improving software maintainability
428
Identifying refactoring through formal model based on data flow graph
429
Identifying Refactorings from Source-Code Changes
430
Identifying Regional Cardiac Abnormalities From Myocardial Strains Using Nontracking-Based Strain Estimation and Spatio-Temporal Tensor Analysis
431
Identifying regions of interest for discriminating Alzheimer´s disease from mild cognitive impairment
432
Identifying regulatory signals in DNA-sequences with a nonstatistical approximation approach
433
Identifying related users in Weibo platform
434
Identifying relational error recovery/online plans utilizing fuzzy logic techniques and semantic networks
435
Identifying relations between ecological integrity and environmental stressor information in Tai Lake of China: Towards the development of ecological criteria
436
Identifying relationships of information quality dimensions
437
Identifying relative cut-off scores with neural networks for interpretation of the minnesota living with heart failure questionnaire
438
Identifying relatively high-risk group of coronary artery calcification based on progression rate: Statistical and machine learning methods
439
Identifying Relevant Cross-Layer Interactions in Cognitive Processes
440
Identifying relevant data along selected medical care situation
441
Identifying Relevant Data for a Biological Database: Handcrafted Rules versus Machine Learning
442
Identifying relevant event content for real-time event detection
443
Identifying Relevant Formal Concepts through the Collapse Index
444
Identifying Relevant Messages for Social TV
445
Identifying Relevant Users and Groups in the Context of Credit Analysis Based on Data from Twitter
446
Identifying reliable subnetwork markers in protein-protein interaction network for classification of breast cancer metastasis
447
Identifying Renaming Opportunities by Expanding Conducted Rename Refactorings
448
Identifying repeated structural elements in folded proteins
449
Identifying representative air masses for multi-junction solar cell bandgap optimization to maximize annual energy yield
450
Identifying representative drug resistant mutants of HIV reverse transcriptase
451
Identifying reputable contributors in collaborative software development platforms
452
Identifying requirements and features for communications systems between older people in care settings
453
Identifying requirements conflicts and cooperation: how quality attributes and automated traceability can help
454
Identifying requirements for Business Contract Language: a monitoring perspective
455
Identifying Requirements for Implementing ad-hoc Geo-references BPM
456
Identifying requirements for nursing system
457
Identifying research gaps in requirements engineering education: An analysis of a conceptual model and survey results
458
Identifying Resemblance in Local Plastic Surgical Faces Using Near Sets for Face Recognition
459
Identifying respiratory-related evoked potentials
460
Identifying Restful Web Services in Service-Oriented Software Product Line
461
Identifying Restricted-Faults in Multiprocessor Meshes under the PMC Diagnostic Model
462
Identifying result subdocuments of XML search conditions
463
Identifying reusable functions using specification driven program slicing: a case study
464
Identifying RF Identification Cards From Measurements of Resonance and Carrier Harmonics
465
Identifying RF-DNA instances via phase differences
466
Identifying RFID tag categories in linear time
467
Identifying rhythms of subthalamic neural oscillations in time-frequency domain
468
Identifying rice arsenic stress response pathways based on molecular interaction network
469
Identifying risk factors associate with hypoglycemic events
470
Identifying risk factors for two complication types for neonatal intensive care patients (NICU)
471
Identifying risk profiles and mitigating actions for business communication services
472
Identifying risk using ODC based growth models
473
Identifying riskier combinations of risky behavior using a self-organizing map
474
Identifying risks in expert system projects
475
Identifying risks in XP projects through process modelling
476
Identifying risky areas of software code in Agile/Lean software development: An industrial experience report
477
Identifying RNA-protein interactions using feature dimension reduction method
478
Identifying RNAseq-based coding-noncoding co-expression interactions in breast cancer
479
Identifying roads and houses from scanned aerial photography and combining them with TIGER and digital terrain data of suburban areas
480
Identifying Roadway Surface Disruptions Based on Accelerometer Patterns
481
Identifying robot parameters using partial pose information
482
Identifying rodent olfactory bulb structures with micro-DTI
483
Identifying roles in an IP network with temporal and structural density
484
Identifying root causes of failures in small electric motors
485
Identifying Rootkit Infections Using Data Mining
486
Identifying Routine and Telltale Activity Patterns in Knowledge Work
487
Identifying safety functions using HAZOP
488
Identifying salient poses in lecture videos
489
Identifying salient sounds using dual-task experiments
490
Identifying salient sub-utterance emotion dynamics using flexible units and estimates of affective flow
491
Identifying salient utterances of online spoken documents using descriptive hypertext
492
Identifying SAR permeability zones on groundwater recharge areas
493
Identifying Scanning Activities in Honeynet Data Using Data Mining
494
Identifying scenarios with high potential for future cognitive radio networks
495
Identifying scene illumination using genetic algorithms and neural networks
496
Identifying script on word-level with informational confidence
497
Identifying second-order models of mechanical structures in physical coordinates: An orthogonal complement approach
498
Identifying Security Aspects in Early Development Stages
499
Identifying Security Aspects in Web-Based Federations
500
Identifying security bug reports via text mining: An industrial case study
501
Identifying Security Relevant Warnings from Static Code Analysis Tools through Code Tainting
502
Identifying Security Requirements Hybrid Technique
503
Identifying sedimentary structures and spatial distribution of tsunami deposits with GPR - examples from Spain and Greece
504
Identifying semantic and syntactic relations from text documents
505
Identifying semantically equivalent object fragments
506
Identifying semantically meaningful sub-communities within Twitter blogosphere
507
Identifying semiconductors by D.C. ionization conductivity
508
Identifying Sensitive Data Items within Hadoop
509
Identifying Sensitivity of Users to Alert Display Parameters in Graphical User Interfaces
510
Identifying sensors from fingerprint images
511
Identifying Sentence-Level Semantic Content Units with Topic Models
512
Identifying sentiment patterns of BBS reviews based on associateve memory model
513
Identifying sequences of optimizations for HW/SW compilation
514
Identifying sequential redundancies without search
515
Identifying sequentially untestable faults using illegal states
516
Identifying Service Requirements in Solution and Infrastructure Improvement Projects
517
Identifying sessions to websites as an aggregation of related flows
518
Identifying sets of key players in a network
519
Identifying severe loading condition during the events of cascading outage considering the effects of protection system hidden failure
520
Identifying Shades of Green: The SPECpower Benchmarks
521
Identifying ship echoes in CODAR HF radar data: A Kalman filtering approach
522
Identifying shoulder and elbow passive moments and muscle contributions during static flexion-extension movements in the sagittal plane
523
Identifying signal correlations using discrete event simulation
524
Identifying significant factors affecting Request For Information (RFI) process time
525
Identifying significant frequencies in surface EMG signals for localization of neuromuscular activity
526
Identifying Significant Genes from DNA Microarray Using Genetic Algorithm
527
Identifying significant genes from microarray data
528
Identifying significant mutations in large cohorts of cancer genomes
529
Identifying Significant Places Using Multi-day Call Detail Records
530
Identifying significant single phrases in submitted free - Order arabic natural language questions
531
Identifying signs of systems fragility: A crowdsourcing requirements case study
532
Identifying silent failures of SaaS services using finite state machine based invariant analysis
533
Identifying Similar Cases in Document Networks Using Cross-Reference Structures
534
Identifying similar code with program dependence graphs
535
Identifying similar functional modules by a new hybrid spectral clustering method
536
Identifying Similar Neighborhood Structures in Private Social Networks
537
Identifying Similar Software Datasets through Fuzzy Inference System
538
Identifying Similarity of Software in Apache Ecosystem -- An Exploratory Study
539
Identifying simple discriminatory gene vectors with an information theory approach
540
Identifying single and double edge cutsets in power networks
541
Identifying single-ended contact formations from force sensor patterns
542
Identifying Single-Phase-to-Ground Fault Feeder in Neutral Noneffectively Grounded Distribution System Using Wavelet Transform
543
Identifying skin electrical properties using a standard neuromuscular electrical stimulation voltage pulse
544
Identifying Skype nodes by NetFlow-based graph analysis
545
Identifying Skype Traffic by Random Forest
546
Identifying sleep apnea syndrome using heart rate and breathing effort variation analysis based on ballistocardiography
547
Identifying smallest unique subgraphs in a heterogeneous social network
548
Identifying smart conducting materials for Wi-Fi electromagnetic interference shielding
549
Identifying Smartphone Malware Using Data Mining Technology
550
Identifying smoking associated gene co-expression networks related to oral cancer initiation
551
Identifying Social Communities by Frequent Pattern Mining
552
Identifying social factors and representation for knowledge based coalition formation system
553
Identifying social groups in pedestrian crowd videos
554
Identifying Social Influence in Networks Using Randomized Experiments
555
Identifying Software Decompositions by Applying Transaction Clustering on Source Code
556
Identifying software problems using symptoms
557
Identifying Software Process Management Challenges: Survey of Practitioners in a Large Global IT Company
558
Identifying software productivity improvement approaches and risks: construction industry case study
559
Identifying software quality factors for telecommunication industry in Malaysia
560
Identifying solder surface orientation from color highlight images
561
Identifying Solid-Fluid Parameters of the Subsea Tunnel Based on Evolutionary ANN
562
Identifying solutions of distributed parameter systems by stochastic approximation
563
Identifying some techno-economic criteria in PLC/BPL applications and commercialization
564
Identifying Source Cell Phone using Chromatic Aberration
565
Identifying Source Code Reuse across Repositories Using LCS-Based Source Code Similarity
566
Identifying Sources of Decoherence in a dc SQUID Phase Qubit With a Sub- \\mu{\\rm m} Junction and Interdigitated Capacitor
567
Identifying sources of Operating System Jitter through fine-grained kernel instrumentation
568
Identifying sources of residual reflections within integrated electroabsorption modulated laser cavities
569
Identifying spam tags by mining tag semantics
570
Identifying S-parameter models in the Laplace domain for high frequency multiport linear networks
571
Identifying specific spatial tasks through clustering and geovisual analysis
572
Identifying Spectrum Usage by Unknown Systems using Experiments in Machine Learning
573
Identifying Sports Talents by Social Media Mining as a Marketing Instrument
574
Identifying spots in microarray images
575
Identifying Spurious Interactions and Predicting Missing Interactions in the Protein-Protein Interaction Networks via a Generative Network Model
576
Identifying stable breast cancer subgroups using semi-supervised fuzzy c-means on a reduced panel of biomarkers
577
Identifying stable fixed order systems from time and frequency response data
578
Identifying stable phase coupling associated with cerebral autoregulation using the synchrosqueezed cross-wavelet transform and low oscillation morlet wavelets
579
Identifying Stagnation Periods in Software Evolution by Replaying Editing Operations
580
Identifying stakeholders and their preferences about NFR by comparing use case diagrams of several existing systems
581
Identifying standardization opportunities of an operator-driven, framework for unifying autonomic network and service management
582
Identifying state coding conflicts in asynchronous system specifications using Petri net unfoldings
583
Identifying State Transitions and their Functions in Source Code
584
Identifying State-Free Networked Tags
585
Identifying statistical mimicry attacks in distributed spectrum sensing
586
Identifying stochastic biochemical networks from single-cell population experiments: A comparison of approaches based on the Fisher information
587
Identifying Stock Similarity Based on Episode Distances
588
Identifying story and preview images in news web pages
589
Identifying Strategies for Study Selection in Systematic Reviews and Maps
590
Identifying strength of boards using mechanical modeling and a Weibull-based feature
591
Identifying structural anomalies in image reconstructions of underwater ship hulls
592
Identifying Structural Features of Java Programs by Analysing the Interaction of Classes at Runtime
593
Identifying Structural Heterogeneities between Online Social Networks for Effective Word-of-Mouth Marketing
594
Identifying structural repeats in proteins using graph centrality measures
595
Identifying Structure in Spreadsheets
596
Identifying Structures with Informative Dimensions in Streams
597
Identifying student and organization matching pattern using Apriori algorithm for practicum placement
598
Identifying student retention patterns using GIS technology
599
Identifying students usability needs in collaborative learning environments
600
Identifying students´ behaviors related to internet usage patterns
601
Identifying Students´ Mechanistic Explanations in Textual Responses to Science Questions with Association Rule Mining
602
Identifying subassemblies by ultrasound to prevent fuel handling error in sodium fast reactors: First test performed in water
603
Identifying Sub-community of Finance Research
604
Identifying substations serving majority domestic/residential users
605
Identifying Success and Tragedy of FLOSS Commons: A Preliminary Classification of Sourceforge.net Projects
606
Identifying success factors for WBLMS use by instructors of engineering departments
607
Identifying Successful Motor Task Completion via Motion-Based Performance Metrics
608
Identifying sufficient statistics in information networks
609
Identifying suitable areas for agricultural expansion in the Western Desert of Egypt by multisensor data fusion
610
Identifying superspreaders for epidemics using R0-adjusted network centrality
611
Identifying support surfaces of climbable structures from 3D point clouds
612
Identifying surface acoustic wave ID-tags using the total least squares-estimating signal parameters via the rotational invariance technique algorithm
613
Identifying Surface Materials on an Active Volcano by Deriving Dielectric Permittivity From Polarimetric SAR Data
614
Identifying suspicious activities through DNS failure graph analysis
615
Identifying swing mode bifurcations and associated limits on available transfer capability
616
Identifying symptoms of recurrent faults in log files of distributed information systems
617
Identifying synergistic transcriptional factors involved in the yeast cell cycle using Microarray and ChIP-chip data
618
Identifying syntactic patterns in Croatian WordNet synset definitions
619
Identifying System Characteristics for Development of a Sustainability Management Accounting Information System: Towards a Conceptual Design for the Manufacturing Industry
620
Identifying systematic critical features using silicon diagnosis data
621
Identifying Systematic Failures on Semiconductor Wafers Using ADCAS
622
Identifying tacit knowledge-based requirements
623
Identifying tacit strategies in aircraft maneuvers
624
Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics
625
Identifying target for technology mergers and acquisitions using patent information and semantic analysis
626
Identifying Task Engagement: Towards Personalised Interactions with Educational Robots
627
Identifying team members
628
Identifying Team Style in Soccer Using Formations Learned from Spatiotemporal Tracking Data
629
Identifying technical and economic improvements to the MoneyMaker Hip pump through multi-objective optimization
630
Identifying technical debt cost factors in reflection activities of an agile projects
631
Identifying technical innovations
632
Identifying technical risks in third-party software for embedded products
633
Identifying techniques, topologies and features for maximizing the efficiency of a distribution grid with solid state power devices
634
Identifying Technology Gaps in Hazardous Materials Operations
635
Identifying technology horizons for strategic investment decisions
636
Identifying temporal and spatial responses of cross machine actuators for sheet-forming processes
637
Identifying Temporal Gene Networks Using Signal Processing Metrics on Time-Series Gene Expression Data
638
Identifying temporal relations between main events in new articles
639
Identifying temporal trace of biological process during phase transition
640
Identifying temporal trajectories of association rules with fuzzy descriptions
641
Identifying Terminals in Terminal-Oriented Systems
642
Identifying Test Conditions for Software Maintenance
643
Identifying Test Requirements by Analyzing SLA Guarantee Terms
644
Identifying testable and supportable commercial-off-the-shelf (COTS) equipment
645
Identifying test-critical dependencies
646
Identifying Tests for Logic Fault Models Involving Subsets of Lines without Fault Enumeration
647
Identifying Text Objects Based on Expansion
648
Identifying the ß-Hairpin Motifs in Enzymes by Using Support Vector Machine
649
Identifying the adequate level of abstraction within structural modeling
650
Identifying the barriers of knowledge transfer in collaborative processes of public service sector
651
Identifying the behavior: Nodes, Route and Collusion Attack´s in MANET
652
Identifying the best attributes for Decision Tree Learning Algorithms, inspired by DNA concepts, in computer science
653
Identifying the best feature combination for sentiment analysis of customer reviews
654
Identifying the Bottlenecks to the RF Performance of FinFETs
655
Identifying the capability of overlapping computation with communication
656
Identifying the cause of detected errors
657
Identifying the cause of the NSTX TF coil bundle failure
658
Identifying the causes of poor progress in software projects
659
Identifying the challenges for managing component-based development in global software development: Preliminary results
660
Identifying the Change Point of a Process with the Integration of SPC Charts and Neural Networks
661
Identifying the cold and hot properties of medicinal herbs based on the associated target proteins by pattern recognition technology
662
Identifying the combination of genetic factors that determine susceptibility to cervical cancer
663
Identifying the combination of genetic factors that determine susceptibility to cervical cancer
664
Identifying the Communities in the Metabolic Network Using ´Component´ Definition and Girvan-Newman Algorithm
665
Identifying the community roles of social capitalists in the Twitter network
666
Identifying the Competencies of ´Visual Literacy´ - a Prerequisite for Knowledge Visualization
667
Identifying the Core of Logic-Based Argumentation Systems
668
Identifying the Core/periphery technological positions from affiliation networks: The network analysis of 2-mode
669
Identifying the correlations of different multimedia materials on learning emotion and performance
670
Identifying the cost implications of manufacturing IT/IS investments
671
Identifying the Credit Level of a Company with Bagging-CART Integrated Algorithm
672
Identifying the Critical Features That Affect the Job Performance of Survey Interviewers
673
Identifying the critical indicators for phishing detection in Iranian e-banking system
674
Identifying the cruising dynamics of a medium scale UAV I: Longitudinal dynamics
675
Identifying the Culprits Behind Network Congestion
676
Identifying the Daily Activity Pattern of Community Dynamics Using Digital Footprint
677
Identifying the data quality terminology used by business people
678
Identifying the definite base of COI for extraction of DNA sequences using LPBS
679
Identifying the degree of influential effects for the causal relationships in a Bayesian network model using group decision making technique
680
Identifying the dependent variables of IT personnel transition
681
Identifying the determinants of community acceptance of renewable energy technologies: The case study of a wind energy project from tunisia
682
Identifying the determinants of RFID adoption intention in Hajj organizations
683
Identifying the Diffusion and Drift Conduction Regions in MOSFETs Through S -Parameters
684
Identifying the disruptive potential of the sustainable innovation in the case of e-mobility
685
Identifying the Divergence of a Given Alternative for Consensus Process in Group Decision Making
686
Identifying the Dominant Language of Web Page Using Supervised N-grams
687
Identifying the dominant species of tropical wood species using histogram intersection method
688
Identifying the Dynamic Impact: A Regulatory Perspective on Electronic Money
689
Identifying the dynamic model used by the KUKA LWR: A reverse engineering approach
690
Identifying the effects of extinction ratio and substrate birefringence on magneto-optic Kerr effect measurements
691
Identifying the EMG-force relationship
692
Identifying the evolution of disasters and responses with network-text analysis
693
Identifying the exact fixing actions of static rule violation
694
Identifying the factors affecting the success and failure of e-learning students using cluster analysis
695
Identifying the factors that impact user satisfaction of an electronic nursing documentation system in a pediatric hospital
696
Identifying the Failure-Tolerant Workspace Boundaries of a Kinematically Redundant Manipulator
697
Identifying the First Layer to Fail in Dual-Layer {\\rm SiO}_{\\rm x}/{\\rm HfSiON} Gate Dielectric Stacks
698
Identifying the fractional-order systems with frequency responses: A maximum likelihood algorithm
699
Identifying the future applications of an emerging technology-the case of virtual reality
700
Identifying the fuzzy grey prediction model by genetic algorithms
701
Identifying the Global User
702
Identifying the Good, the Bad, and the Indifferent
703
Identifying the Guard Region for Cognitive Networks under Mutual Interference Constraints
704
Identifying the heat transfer coefficients on the end-windings of an electrical machine by measurements and simulations
705
Identifying the human attention to different colors and intensities using P300
706
Identifying the impact of defects among the defect types in Software development projects
707
Identifying the impact of global warming on population using a clustering based approach
708
Identifying the impact of the SPIRIT program in student knowledge, attitudes, and perceptions toward computing careers
709
Identifying the Information Gain of a Quantum Measurement
710
Identifying the information gain of a quantum measurement
711
Identifying the informational needs of readers; A management responsibility
712
Identifying the intellectual structure of risk management studies
713
Identifying the interface between two sand materials
714
Identifying the Internal and the External Overvoltage of Distribution Networks Based on Fisher Discriminate Method
715
Identifying the joint demand function with copula structure in bankcard market
716
Identifying the key competitive factors in Chinese manufacturing enterprises
717
Identifying the Key Success Factors of the TV Shopping Industries in Cross-Straits
718
Identifying the kinematics of robots and their tasks
719
Identifying the linkability between Web servers for enhanced Internet computing
720
Identifying the Magenetic Part of the Equivalent Circuit of n-Winding Transformer
721
Identifying the Magnetic Part of the Equivalent Circuit of n -Winding Transformers
722
Identifying the main nonlinear contributions: use of multisine excitations during circuit design
723
Identifying the major contributions to risk in phased missions
724
Identifying the Margin of Glioma Using 1H-MRSI Data
725
Identifying the mean vector of bivariate process
726
Identifying the meaning of information signs in traffic facilities
727
Identifying the mechanism of toxic action of selected compounds by artificial neural networks
728
Identifying the modes of a vibratory system excited by narrow band random excitations
729
Identifying the modes of the scale model corresponding to the Grantecan telescope´s primary mirror
730
Identifying the Most Connected Vertices in Hidden Bipartite Graphs Using Group Testing
731
Identifying the most effective reasoning calculi for a knowledge-based system
732
Identifying the most likely outcomes of multilateral negotiations
733
Identifying the most significant genes from gene expression profiles for sample classification
734
Identifying the most suitable university-industry partnership model in developing countries
735
Identifying the nature of domestic load profile from a single household electricity consumption measurements
736
Identifying the need for a sustainable architecture maintenance process
737
Identifying the network coding opportunity
738
Identifying the neural networks subserving specific neural processes
739
Identifying the Neuroanatomical Basis of Cognitive Impairment in Alzheimer´s Disease by Correlation- and Nonlinearity-Aware Sparse Bayesian Learning
740
Identifying the Nucleus Residues in Proteins by Network Approach
741
Identifying the nuisance alarms
742
Identifying the optimal energy-efficient operating points of parallel workloads
743
Identifying the Optimum Design of Turbo-Alternator Using Different Multi-objective Optimization Algorithms
744
Identifying the Optimum Warehouse Capacity Requirement: A System Dynamics Approach
745
Identifying the organizational factors of information security incidents
746
Identifying the organizational in NEBIC theory´s choosing capability
747
Identifying the origin of Non-Radiative Recombination in In(Ga)As Quantum Dot Lasers
748
Identifying the out of control variable in the multivariate process using the discriminant analysis and digital signal filtering
749
Identifying the Overvoltage in Distribution Networks Based on Support Vector Machine
750
Identifying the parameters of the reduced vector Preisach model: theory and experiment
751
Identifying the population of animals through pitch, formant, short time energy-A sound analysis
752
Identifying the potential for failure of businesses in the technology, pharmaceutical and banking sectors using kernel-based machine learning methods
753
Identifying the potential for market power in electric power systems in real-time
754
Identifying the Preisach function for soft magnetic materials
755
Identifying the presence and footprints of multiple incumbent transmitters
756
Identifying the Presence of Destructive Interaction in Systems
757
Identifying the pre-transition state during biological processes by hidden Markov model
758
Identifying the Primary Fault Section After Contingencies in Bulk Power Systems
759
Identifying the Process Capability of the Ontology Development Processes
760
Identifying the Productive and Influential Bloggers in a Community
761
Identifying the promoter features governing differential kinetics of co-regulated genes using fuzzy expressions
762
Identifying the quality evaluation indicator of CRM using an extended DEMATEL method
763
Identifying the queries´ topics based-on computing domain ontology
764
Identifying the recombination losses that limit Voc in thin silicon solar cells by bifacial spectral response measurements
765
Identifying the relationship between voltage harmonic distortion and the load of harmonic producing devices in distribution networks
766
Identifying the Relevance of Social Issues to a Target
767
Identifying the relevant information for software testing technique selection
768
Identifying the Reliability Affecting Parameters of SBB Flip Chip Interconnections for Automotive Applications
769
Identifying the Risk-Return Spectrum of the FSU Oil Economies
770
Identifying the role of ERP in enhancing operational efficiency and supply chain mobility in aircraft manufacturing industry
771
Identifying the role of hypertext in the computing paradigm
772
Identifying the role of silica bridges in polarization splitting based on holey fibers
773
Identifying the root cause of failures in IT changes: Novel strategies and trade-offs
774
Identifying the root causes of data and systems planning problems: an application of the PLEXSYS electronic meeting support system
775
Identifying the root causes of memory bugs using corrupted memory location suppression
776
Identifying the Root Causes of Wait States in Large-Scale Parallel Applications
777
Identifying the same records across multiple Ukiyo-e image databases using textual data in different languages
778
Identifying the semantics of eligibility criteria of clinical trials based on relevant medical ontologies
779
Identifying the shoreward Gulf Stream front at Cape Hatteras with Coastal Ocean Radar surface currents
780
Identifying the Shortest Path in Large Networks using Boolean Satisfiability
781
Identifying the Signal of Interest for Partially Overlapping Ultrasonic Echoes
782
Identifying the singularity conditions of Canadarm2 based on elementary Jacobian transformation
783
Identifying the skull effects to the inertial cavitation threshold of microbubbles in a vessel phantom
784
Identifying the Source of BW Failures in High-Frequency Linear Analog Circuits Based on S-Parameter Measurements
785
Identifying the source of complexity in industrial clusters
786
Identifying The Source Of Dust Produced During LSI Fabrication
787
Identifying the sources of green innovation: markets or regulations?
788
Identifying the sources of unpredictability in COTS-based multicore systems
789
Identifying the split personality of the malicious host in the mobile agent environment
790
Identifying the starting impact set of a maintenance request: a case study
791
Identifying the strength of boards using mixed signals of MOE and X-ray image
792
Identifying the structural architecture of the human inferior parietal lobule using diffusion MRI
793
Identifying the structure of filamentation in laser-plasma
794
Identifying the Structure of Nonlinear Perturbations in Mixers using Multisine Signals
795
Identifying the task dependence in computer supported large scale collaborative manufacturing via E-CARGO model
796
Identifying the time of a step change with MEWMA control charts by artificial neural network
797
Identifying the Topic-Specific Influential Users Using SLM
798
Identifying the Topology of a Coupled FitzHugh–Nagumo Neurobiological Network via a Pinning Mechanism
799
Identifying the true echo path impulse responses in stereophonic acoustic echo cancellation
800
Identifying the tunnel surrounding rock parameters based on particle swarm optimization arithmetic
801
Identifying the two sub-systems of macroeconomic fluctuations
802
Identifying the unavoidable portion of weather impact on airport operations
803
Identifying the uncertainty structure using maximum likelihood estimation
804
Identifying the unknown circuit breaker statuses in power networks
805
Identifying the urban transportation corridor based on mobile phone data
806
Identifying the Use of Data/Voice/Video-Based P2P Traffic by DNS-Query Behavior
807
Identifying the User in Healthcare Information Systems Resear
808
Identifying the user typology for adaptive e-learning systems
809
Identifying the Value for Service Management
810
Identifying the value of enterprise interoperability in the context of innovation ecosystems
811
Identifying the variation of experiences when dealing with problems in complex systems
812
Identifying the workflow potential of business processes
813
Identifying themes and trends in CS research output from India
814
Identifying Themes in Social Media and Detecting Sentiments
815
Identifying Theories Used in North American IS Research: A Bottom-Up, Computational Approach
816
Identifying threatening networks from transactional data
817
Identifying Time-Varying Neuromuscular Response: A Recursive Least-Squares Algorithm with Pseudoinverse
818
Identifying time-varying neuromuscular system with a recursive least-squares algorithm: a Monte-Carlo simulation study
819
Identifying tools for remotely located collaborative interactions
820
Identifying Tools to Support Schools´ Collaborative Teaching and Learning
821
Identifying top challenges for international research on requirements engineering for systems of systems engineering
822
Identifying top Chinese network buzzwords from social media big data set based on time-distribution features
823
Identifying Top Java Errors for Novice Programmers
824
Identifying Top Sellers In Underground Economy Using Deep Learning-Based Sentiment Analysis
825
Identifying Topics by using Word Distribution
826
Identifying top-k Vital Patterns from multi-class medical data
827
Identifying TOP-N opinion leaders on local social network
828
Identifying Traceability between Feature Model and Software Architecture in Software Product Line using Formal Concept Analysis
829
Identifying tractable decentralized control problems on the basis of information structure
830
Identifying Traditional Chinese Medicines by the Chemical Imaging Device
831
Identifying Traffic Jamming by the Spatiotemporal Correlation Function
832
Identifying Traitors Using the Koetter–Vardy Algorithm
833
Identifying trajectory classes in dynamic tasks
834
Identifying Transcription Factor Binding Sites in Promoters of Human Genes
835
Identifying Transcription Factors and microRNAs as Key Regulators of Pathways Using Bayesian Inference on Known Pathway Structures
836
Identifying transcriptional regulatory sites in the human genome using an integrated computation
837
Identifying Transformative Scientific Research
838
Identifying transformer incipient events for maintaining distribution system reliability
839
Identifying Transformer Inrush Current Based on Normalized Grille Curve
840
Identifying transistor roles in teaching microelectronic circuits
841
Identifying Transitivity Threats in Social Networks
842
Identifying translinear loops in the circuit topology
843
Identifying transmission deficiencies in composite electric power systems
844
Identifying travel direction of cellular phone using Naive Bayes
845
Identifying travel mode from GPS trajectories through fuzzy pattern recognition
846
Identifying travelers´ information needs and services for an integrated international real time journey planning system
847
Identifying trust in social networks with stubborn agents, with application to market decisions
848
Identifying trusted routing path in WSNs through TARF
849
Identifying trusted routing path in WSNs through TARF
850
Identifying type of maize with terahertz time-domain spectroscopy
851
Identifying types of Achievements
852
Identifying Types of Physical Activity With a Single Accelerometer: Evaluating Laboratory-trained Algorithms in Daily Life
853
Identifying typical load profiles using neural-fuzzy models
854
Identifying Typical Movements among Indoor Objects -- Concepts and Empirical Study
855
Identifying uncertainty in epicardial activation maps
856
Identifying uncertainty regions in Support Vector Machines using geometric margin and convex hulls
857
Identifying underlying factors in breast cancer using independent component analysis
858
Identifying universal facial emotion markers for automatic 3D facial expression recognition
859
Identifying Unknown Adverse Drug Reaction Signal Pairs in Postmarketing Surveillance Using an Active Multi-agent System Approach
860
Identifying Unknown Android Malware with Feature Extractions and Classification Techniques
861
Identifying unknown proteins
862
Identifying unreliable sources of skill and competency information
863
Identifying unsecured building automation installations
864
Identifying untestable faults in sequential circuits
865
Identifying untestable transition faults in latch based designs with multiple clocks
866
Identifying Uptake, Sessions, and Key Actors in a Socio-technical Network
867
Identifying urban features using RADARSAT images taken at multiple incidence angles
868
Identifying usability risk: A survey study
869
Identifying useful features for recognition in near-infrared periocular images
870
Identifying Useless States in Non-FIFO Distributed Computations by Using Pseudo Timestamps
871
Identifying user attributes through non-i.i.d. multi-instance learning
872
Identifying User Authentication Methods on Connections for SSH Dictionary Attack Detection
873
Identifying user behavior on Twitter based on multi-scale entropy
874
Identifying user clicks based on dependency graph
875
Identifying User Experience Dimensions for Mobile Incident Reporting in Urban Contexts
876
Identifying User Goals from Web Search Results
877
Identifying User Requirements for a Mobile Terminal Centric Ubiquitous Computing Architecture
878
Identifying user strategies in exploratory learning with evolving task modelling
879
Identifying Users and Use of (Electric-) Free-Floating Carsharing in Berlin and Munich
880
Identifying users in social networks with limited information
881
Identifying users of portable devices from gait pattern with accelerometers
882
Identifying users with application-specific command streams
883
Identifying Users´ Interest Similarity Based on Clustering Hot Vertices in Social Networks
884
Identifying valence and arousal levels via connectivity between EEG channels
885
Identifying variable-length meaningful phrases with correlation functions
886
Identifying variables dependency that influences a high level deliberation process in a CI-based Multi-agent System
887
Identifying vascular features with orientation specific filters and B-spline snakes
888
Identifying vehicle descriptions in microblogging text with the aim of reducing or predicting crime
889
Identifying vehicles using vibrometry signatures
890
Identifying virtual composite objects: a step forward to update object views
891
Identifying Virus-Cell Fusion in Two-Channel Fluorescence Microscopy Image Sequences Based on a Layered Probabilistic Approach
892
Identifying Vital/Protect Patterns for Classification in Multiple Phenotypes Medical Data
893
Identifying voltage control areas based on the interdependence of control equipment
894
Identifying voluntary components of human movement-related cortical potential associated with finger movements using wavelet transform
895
Identifying voluntary components of human movement-related cortical potential using dynamic spectrum
896
Identifying vulgar content in eMule network through text classification
897
Identifying vulnerabilities in the supply chain
898
Identifying vulnerabilities of quantum cryptography in secure optical data transport
899
Identifying vulnerabilities of state estimators against cyber-attacks
900
Identifying vulnerable friends on a social networking site
901
Identifying vulnerable lines in a power network using complex network theory
902
Identifying vulnerable websites by analysis of common strings in phishing URLs
903
Identifying wasted effort in the field via developer interaction data
904
Identifying water source from chemical characteristics of spilled water at the mining areas with hierarchical cluster analysis method
905
Identifying weak dielectric objects on conductive surfaces in millimeter-wave imaging
906
Identifying weaknesses in the design for six sigma concept through a pedagogical structure
907
Identifying Weaknesses in VM/Hypervisor Interfaces
908
Identifying Web browsing trends and patterns
909
Identifying web services for automatic assessments of programming assignments
910
Identifying Welding Skills for Robot Assistance
911
Identifying which infrastructures are critical
912
Identifying White-Matter Fiber Bundles in DTI Data Using an Automated Proximity-Based Fiber-Clustering Method
913
Identifying Wind and Solar Ramping Events
914
Identifying wind power ramp causes from multivariate datasets: a methodological proposal and its application to reanalysis data
915
Identifying Windows Installer Package Files for Detection of Pirated Software
916
Identifying Wireless Users via Transmitter Imperfections
917
Identifying word boundaries in handwrittem text
918
Identifying Word Relations in Software: A Comparative Study of Semantic Similarity Tools
919
Identifying worst performing components in a distribution system using Weibull distribution
920
Identifying worst performing feeders
921
Identifying Zigzag based Perceptually Important Points for indexing financial time series
922
Identifying ZVS soft switching boundaries for bi-directional dual active bridge DC-DC converters using frequency domain analysis
923
Identifying, analyzing, and modeling flashcrowds in BitTorrent
924
Identifying, Assigning, and Quantifying Crosscutting Concerns
925
Identifying, classifying, and evaluating digital educational products: Anaylzing procedures of evalution at e-learning awards
926
Identifying, stimulating, and nurturing computer engineers
927
Identifying, Tailoring, and Suggesting Form Template Method Refactoring Opportunities with Program Dependence Graph
928
Identifying, understanding, and analyzing critical infrastructure interdependencies
929
IdentifyingWeather Systems from NumericalWeather Prediction Data
930
IdentifyingWeb Spam by Densely Connected Sites and its Statistics in a JapaneseWeb Snapshot
931
Identifyng microRNAs in plant genomes
932
Identigram/watermark removal using cross-channel correlation
933
Identities and approximations for the weight distribution of q -ary codes
934
Identities and Inequalities on Fuzzy Set Cardinalities
935
Identities Anonymization in Dynamic Social Networks
936
Identities Yielding Singularity-Free Potential Integrals
937
Identity access management for Multi-tier cloud infrastructures
938
Identity and access management- a comprehensive study
939
Identity and access management for cloud web services
940
Identity and access services in NATO federation scenarios
941
Identity and expression recognition on low dimensional manifolds
942
Identity and identification in online communities: A symbolic interaction perspective
943
Identity and Pairing-Based Secure Key Management Scheme for Heterogeneous Sensor Networks
944
Identity and regional development: an introductory analysis
945
Identity and Security
946
Identity and Variation Spaces: Revisiting the Fisher Linear Discriminant
947
Identity Anonymity for Grid Computing Coordination based on Trusted Computing
948
Identity as a service: A cloud based common capability
949
Identity as Privacy
950
Identity attack and anonymity protection for P2P-VoD systems
951
Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes
952
Identity attributes quantitative analysis and the development of a metrics model using text mining techniques and information theory
953
Identity Authentication Based on Fuzzy Vault and Digital Certificate
954
Identity authentication based on keystroke dynamics using genetic algorithm and particle Swarm Optimization
955
Identity Authentication in RFID Based Logistics-Customs Clearance Service Platform
956
Identity Authentication Scheme for the Distributed Centers System
957
Identity authentication scheme of cloud storage for user anonymity via USB token
958
Identity authentication system based on improved PR-RP model
959
Identity authentication system using face recognition techniques in human-computer interaction
960
Identity authentication technology based on fingerprint recognition in CSCW
961
Identity Aware Sensor Networks
962
Identity awareness and re-use of research data in veillance and social computing
963
Identity Based Authenticated Key Agreement for Tree-Based Group
964
Identity based authenticated key agreement protocols from pairings
965
Identity based broadcast encryption based on one to many identity based proxy re-encryption
966
Identity Based Cryptography for secure AODV routing protocol
967
Identity based digital signature algorithm of XTR system
968
Identity based email sender authentication for spam mitigation
969
Identity Based Encryption using mRSA in data transfer through VPN
970
Identity Based Group Key Management Scheme for Ad Hoc Groups
971
Identity based hybrid signcryption revisited
972
Identity based KCDSA signcryption
973
Identity Based Multi-proxy Multi-signcryption Scheme for Electronic Commerce
974
Identity based partial aggregate signature scheme without pairing
975
Identity Based Private Matching
976
Identity based protocols for secure electronic content distribution and licensing
977
Identity Based Proxy Re-encryption Based on a Variant of BB1 Identity Based Encryption
978
Identity Based Proxy Re-Signature Schemes without Random Oracle
979
Identity based proxy-signcryption scheme from pairings
980
Identity Based Schemes for Securing Mobile Ad Hoc Networks
981
Identity Based Self Delegated Signature - Self Proxy Signatures
982
Identity based signatures schemes
983
Identity based signcryption for advanced metering infrastructure
984
Identity based threshold proxy signcryption scheme
985
Identity based universal re-encryption for mix nets
986
Identity between two computed velocimetry methods
987
Identity Boxing: A New Technique for Consistent Global Identity
988
Identity boxing: secure user-level containment for the grid
989
Identity checking system by visible light
990
Identity considerations for public sector hybrid cloud computing solutions
991
Identity Content Assurance and Tracking Systems (ICATSs) for Military Supply Chain Risk Management: A Preliminary Design
992
Identity Continuance in Single Sign-On with Authentication Server Failure
993
Identity control for spindle motors in hard-disk drives
994
Identity crime: The challenges in the regulation of identity crime
995
Identity crisis: anonymity vs reputation in P2P systems
996
Identity crisis?
997
Identity Data Security System for the Digital Identity Wallet
998
Identity Delegation in Policy Based Systems
999
Identity Delegation in Policy Based Systems
1000
Identity detection from on-line handwriting time series
بازگشت