<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Introduction to the Special Section on Nanocircuits and Systems
2
Introduction to the Special Section on NanoCon 2012
3
Introduction to the Special Section on Nanostructured Materials for Tissue Regeneration
4
Introduction to the Special Section on Networks-on-Chip
5
Introduction to the special section on new emerging technologies in motion control systems - Part I
6
Introduction to the Special Section on New Frontiers in Rich Transcription
7
Introduction to the Special Section on Objective Quality Assessment of Speech and Audio
8
Introduction to the special section on petri nets and performance models
9
Introduction to the Special Section on Prognostics and Health Management
10
Introduction to the Special Section on Real-World Face Recognition
11
Introduction to the Special Section on Rehabilitative Biomechanics
12
Introduction to the Special Section on Rich Transcription
13
Introduction to the Special Section on Smart Devices for Renewable Energy Systems
14
Introduction to the Special Section on Smart, Social, and Converged TV
15
Introduction to the Special Section on Software Maintenance
16
Introduction to the Special Section on Speaker and Language Recognition
17
Introduction to the Special Section on Temporal Change Observation for Bio-Geophysical Parameters
18
Introduction to the Special Section on the 2005 IEEE RFIC Symposium
19
Introduction to the Special Section on the 2007 Asian Solid-State Circuits Conference (A-SSCC´07)
20
Introduction to the Special Section on the 2008 Asian Solid-State Circuits Conference (A-SSCC´08)
21
Introduction to the Special Section on the 2008 Bipolar/BiCMOS Circuits and Technology Meeting
22
Introduction to the Special Section on the 2008 Compound Semiconductor Integrated Circuit Symposium (CSICS´08)
23
Introduction to the Special Section on the 2009 Asian Solid-State Circuits Conference (A-SSCC´09)
24
Introduction to the Special Section on the 2010 Asian Solid-State Circuits Conference (A-SSCC2010)
25
Introduction to the Special Section on the 2010 IEEE International Symposium on Industrial Electronics
26
Introduction to the Special Section on the 2011 Asian Solid-State Circuits Conference (A-SSCC)
27
Introduction to the Special Section on the 2012 Asian Solid-State Circuits Conference (A-SSCC)
28
Introduction to the Special Section on the 2013 Compound Integrated Circuits Symposium
29
Introduction to the Special Section on the 2013 IEEE Asian Solid-State Circuits Conference (A-SSCC)
30
Introduction to the Special Section on the 2013 IEEE Bipolar/BiCMOS Circuits and Technology Meeting
31
Introduction to the Special Section on the 2014 Compound Semiconductor Integrated Circuit Symposium
32
Introduction to the Special Section on the 2014 IEEE Asian Solid-State Circuits Conference (A-SSCC)
33
Introduction to the special section on the 2014 IEEE radio frequency integrated circuits (rfic) symposium
34
Introduction to the Special Section on the 23rd Bipolar/BiCMOS Circuits and Technology Meeting
35
Introduction to the Special Section on the 23rd International Symposium on Space Terahertz Technology (ISSTT)
36
Introduction to the Special Section on the 25th Bipolar/BiCMOS Circuits and Technology Meeting
37
Introduction to the Special Section on the 26th Bipolar/BiCMOS Circuits and Technology Meeting
38
Introduction to the Special Section on the 32nd Annual IEEE Compound Semiconductor Integrated Circuit Symposium
39
Introduction to the Special Section on the ACM SIGSOFT Foundations of Software Engineering Conference
40
Introduction To The Special Section On The Electromagnetic Properties Of Sea Ice
41
Introduction to the special section on the Fifth IEEE International Nanoelectronics Conference (IEEE INEC)
42
Introduction to the special section on the fifth international workshop on multimedia information systems
43
Introduction to the Special Section on the Fifth International Workshop on Multi-temporal Imagery Analysis
44
Introduction to the Special Section on the HEVC Standard
45
Introduction to the Special Section on the IEEE Compound Semiconductor Integrated Circuit Symposium (CSICS 2008)
46
Introduction to the Special Section on the IEEE Radio Frequency Integrated Circuits (RFIC) Symposium
47
Introduction to the Special Section on The More Electric Aircraft: Power Electronics, Machines, and Drives
48
Introduction to the special section on video surveillance
49
Introduction to the special section on virtual endoscopy
50
Introduction to the Special Section on Visual Computing in the Cloud: Cloud Gaming and Virtualization
51
Introduction to the Special Section on Visual Computing in the Cloud: Fundamentals and Applications
52
Introduction to the Special Section on Voice Transformation
53
Introduction to the Special Section: Designing a Better User Experience for Self-Service Systems
54
Introduction to the special section: Navigating the boundaries in global training and education: new literacies, competencies, and practices
55
Introduction to the special section: professional communication in Russia
56
Introduction to the special section-issues in corporate and organizational communication: communication and change
57
Introduction to the special session on “Interconnect enhances architecture: Evolution of wireless NoC from planar to 3D”
58
Introduction to the special session on “Silicon photonic interconnects: an illusion or a realistic solution?”
59
Introduction to the special session on 40 years of European Microwave Conference
60
Introduction to the Special Session on Autonomic and Situation-Aware Communication Services
61
Introduction to the special session on formal verification of telecommunications systems
62
Introduction to the special session on optoelectronic and photonic structures
63
Introduction to the special session on project management in ICT
64
Introduction to the special session on secure implementations
65
Introduction To The Special Session On Visual Languages For Human-to-human Communication
66
Introduction to the special session on wireless protocols security & hardware implementations
67
Introduction to the Special Topics Issue on High-Power Microwave Generation
68
Introduction to the SPREAD Report
69
Introduction to the SRC Design Sciences Program
70
Introduction to the Symposium
71
Introduction to the symposium on application of magnetism in bioengineering
72
Introduction to the SystemC AMS DRAFT standard
73
Introduction to the SystemC AMS extension standard
74
Introduction to the Teaching Reform of the Course "Computer Organization Principles"
75
Introduction to the Technical Program ICCE 2005
76
Introduction to the Technical Program of IEEE GCCE 2012
77
Introduction to the Technical Program of IEEE GCCE 2013
78
Introduction to the technical program of ISCE 2010
79
Introduction to the Technical Program of ISCE2009
80
Introduction to the technology management in the knowledge based economy minitrack
81
Introduction to the technology supported learning minitrack
82
Introduction to the technology supported learning minitrack
83
Introduction to the technology-supported learning minitrack
84
Introduction to the telemedicine minitrack
85
Introduction To The Testing For The Shielding Quality Of EMI Gaskets And Gasketed Joints
86
Introduction to the Theory and Application of the Laplace Transformation
87
Introduction to the theory and applications of neural networks with quadratic junctions
88
Introduction to the theory and design of active filters
89
Introduction to the theory of error-correcting codes
90
Introduction to the Theory of Finite Automata
91
Introduction to the theory of finite-state machines
92
Introduction to the theory of Fuzzy subsets
93
Introduction to the Theory of Fuzzy Subsets-vol. 1: Fundamental Theoretical Elements
94
Introduction to the Theory of Infinite Series
95
Introduction to the Theory of Neural Computation {Book Reviews]
96
Introduction to the theory of space charge optics
97
Introduction to the Theory of Switching Circuits
98
Introduction to the Theory of VLF Propagation
99
Introduction to the third special issue on free-electron lasers
100
Introduction to the three sessions on square-loop materials and their applications
101
Introduction to the three-dimensional frequency-independent phased-array (3D-FIPA)-a new class of phased array design
102
Introduction to the Topics in Organizational Systems and Technology Minitrack
103
Introduction to the TOPPERS project - open source RTOS for embedded systems
104
Introduction to the Track A
105
Introduction to the Track B
106
Introduction to the Track C
107
Introduction to the Transformational Government Minitrack
108
Introduction to the Transformational Government Minitrack
109
Introduction to the trends in outsourcing of information systems minitrack
110
Introduction to the trends in outsourcing of information systems minitrack
111
Introduction to the trends in outsourcing of information systems minitrack
112
Introduction To The Trends In Outsourcing Of Information Systems Minitrack
113
Introduction to the trends in outsourcing of information systems minitrack
114
Introduction To The Trends In Outsourcing Of Information Systems Minitrack
115
Introduction to the Unified Modeling Language
116
Introduction to the US Coast Guard differential GPS program
117
Introduction to the use of real options and a comparison with existing methods
118
Introduction to the use of real options and a comparison with existing methods
119
Introduction To The Visual Simulation Environment
120
Introduction to the VLF Papers
121
Introduction to the web-based education (WBE) diffusion across disciplines and global boundaries
122
Introduction to the Wellmade Design Methodology
123
Introduction to the witness visual interactive simulator and oleII automation
124
Introduction to the Work and Play in Virtual Worlds Minitrack
125
Introduction to the Working and Gaming in 3D Virtual Environments Minitrack
126
Introduction to the Workshop
127
Introduction to the workshop
128
Introduction to the Workshop on Business-Driven Enterprise Application Design & Implementation
129
Introduction to the workshop on music technology and audio processing
130
Introduction to the World of Quantum Computers
131
Introduction to the Yaoyorozu project
132
Introduction to the zigzag modeled ultracapacitor
133
Introduction to Theoretical Approaches to IS Research Minitrack
134
Introduction to Theoretical Approaches to IS Research Minitrack
135
Introduction To Theoretical Issues
136
Introduction to Theories in IS Research Minitrack
137
Introduction to Thermodynamics [Books and Reports]
138
Introduction to third issue
139
Introduction to this issue on management communications
140
Introduction to three papers on radio-propagation studies related to public-safety communications
141
Introduction to time series search engine systems
142
Introduction to time-delay and sampled-data systems
143
Introduction to time-of-flight imaging
144
Introduction to tool demonstrations
145
Introduction to tool demonstrations
146
Introduction to topic 2
147
Introduction to Topics in Organizational Systems and Technology Minitrack
148
Introduction to Topics in Organizational Systems and Technology Minitrack
149
Introduction to Topics in Organizational Systems and Technology Minitrack
150
Introduction to Transformational Government Minitrack
151
Introduction to Transformational Government Minitrack
152
Introduction to Transients
153
Introduction to Transistor Electronics
154
Introduction to Transportation Systems [Book Review]
155
Introduction to turn-off silicon-controlled rectifiers
156
Introduction to Two P2P Network Based Reputation Systems
157
Introduction to type-2 fuzzy logic systems
158
Introduction to Ultra-High Frequency Radio Engineering
159
Introduction to Ultrasonic Motors [Books and Reports]
160
Introduction to ultrasound holographic Q-imaging
161
Introduction to ultra-trace laser spectroscopy and its industrial applications
162
Introduction to ultra-wideband antennas
163
Introduction To Umts
164
Introduction to uncertainty bounds and their use in the design of interval type-2 fuzzy logic systems
165
Introduction to Understanding the Familiar Unknown Minitrack
166
Introduction to Universal Plug and Play content synchronization service
167
INTRODUCTION TO URINARY TRACT ANATOMY AND DISEASES
168
Introduction to use of formal methods in software and hardware
169
Introduction to Usitbility Testing
170
Introduction to V.L.S.I. Systems
171
Introduction to Valves, Including Reference to Cathode Ray Tubes
172
Introduction to various controlling techniques for inverters as a part of undergraduate course in power electronics
173
Introduction to VC learning theory
174
Introduction to VCCI [EMC standards]
175
Introduction to VCCI kit module EMI program An approach for module level EMI quantification
176
Introduction to vector sampling expansion
177
Introduction to very-long-baseline interferometry
178
Introduction to VHDL-A. 2. Continuous and mixed continuous/discrete concepts
179
Introduction to VHDL-AMS. 1. Structural and discrete time concepts
180
Introduction to Virtualization: Environments, Research, and Education Minitrack
181
Introduction to Virtualization: Environments, Research, and Education Minitrack
182
Introduction to Visual Analysis of Massive Date for Decision Support and Operational Management Minitrack
183
Introduction to Visualization and Analytics for Decision Support, Operational Management, and Scientific Discovery Minitrack
184
Introduction to VR technology
185
Introduction to wave power
186
Introduction to wave propagation and scattering in random media
187
Introduction to waveform recorder testing
188
Introduction to wavelets
189
Introduction to WCDMA enhanced uplink
190
Introduction to web computing
191
Introduction to Web Mining Minitrack
192
Introduction to Web Mining Minitrack
193
Introduction to wide-area control of power systems
194
Introduction to Wireless and Mobile Systems [Book Review]
195
Introduction to Wireless Networks Minitrack
196
Introduction to Wireless Networks Minitrack
197
Introduction to Wireless Networks Minitrack
198
Introduction to Wireless Networks Minitrack
199
Introduction to WITNESS and linking to process mapping tools
200
Introduction to WLLs [Book Review]
201
Introduction to work flow modeling with bpsimulator
202
Introduction to Working and Gaming in 3D Virtual Environments Minitrack
203
Introduction to XMPP protocol and developing online collaboration applications using open source software and libraries
204
Introduction to ZeroWIN
205
Introduction to: panel on impact of aging on reliability and cost of transmission
206
Introduction trends in dielectric research during 1959
207
Introduction trends in dielectric research during 1961
208
Introduction trends in dielectric research during 1962
209
Introduction trends in dielectric research during 1963
210
Introduction trends in dielectric research during i960
211
Introduction trends in research and development in 1957
212
Introduction trends in research and development in 1958
213
Introduction Tutorial on Resolution
214
Introduction&#8212;Multiple-Valued Logic
215
Introduction&#8212;Parallel and Distributed Computing
216
Introduction, August, 1969
217
Introduction, history, and theory of wind power
218
Introduction, message from the symposium chairs
219
Introduction, Nov. 1970
220
Introduction, overview, and status of the Microwave Autonomous Copter System (MACS)
221
Introduction, overview, and status of the NPOESS aerosol polarimetry sensor (APS)
222
Introduction, September, 1968
223
Introduction: A new perspective [Scanning Our Past]
224
Introduction: Advances in Teaching and Learning Technologies Minitrack
225
Introduction: Bringing Communication Science To Technical Communication- Advancing The Profession
226
Introduction: Changing regularities of genre [commentary]
227
Introduction: Computer Arithmetic
228
Introduction: Cybersecurity
229
Introduction: Electric Power Systems Restructuring :Engineering, Economics and Policy Track
230
Introduction: Experience Reports
231
Introduction: Experience Reports
232
Introduction: From Your Editor
233
Introduction: Lessons Learned around the World: Key Success Factors to Enable Process Change
234
Introduction: Parallel and Distributed Processing
235
Introduction: Special Issue on Image Bandwidth Compression
236
Introduction: Special issue on optical bistability
237
Introduction: Special Issue on Semiconductor Logic and Memory
238
Introduction: Special Issue on Space Shuttle Communications and Tracking
239
Introduction: Special Issue on Spread Spectrum Communications
240
Introduction: special issue on structuring complex information for electronic publication
241
Introduction: The Best Papers of ISSTA
242
Introduction: trends and directions in microelectronics (Guest Editors´ Introduction)
243
Introduction: Welcome to AESS tutorial [Guest Editorial]
244
Introduction:advances in teaching and learning technologies mini-track
245
Introduction-Alternate Distribution Technologies
246
Introductions
247
Introductions of SAR reduced solution and LTE antenna design
248
Introduction--Special issue on laser photochemistry
249
Introductory analog electronics course incorporating in-class team design problems and multi-team design based laboratories
250
Introductory analysis of the influence of the parameters in torpedo force-body shaping design
251
Introductory Circuit Analysis
252
Introductory Circuit Analysis Learning From Abstract and Contextualized Circuit Representations: Effects of Diagram Labels
253
Introductory Circuit Theory
254
Introductory circuits: a course in crisis
255
Introductory circuits: reference node r model impact
256
Introductory Comments
257
Introductory Computing Construct Use in an End-User Programming Community
258
Introductory Course of Adaptive Management for Urban Wetland Restoration
259
Introductory digital design & computer architecture curriculum
260
Introductory Digital Electronics [Book Reviews]
261
Introductory Electrical Engineering
262
Introductory electronics courses
263
Introductory EPAC: an analog FPGA
264
Introductory Game Development Course: A Mix of Programming and Art
265
Introductory laboratories in semiconductor devices using the Digilent Analog Discovery
266
Introductory lecture
267
Introductory lecture
268
Introductory lecture
269
Introductory lecture on character recognition
270
Introductory lecture on low-temperature storage and switching devices
271
Introductory lecture on peripheral equipment
272
Introductory lecture on special aspects of logical design
273
Introductory materials
274
Introductory materials
275
Introductory mathematics computer course
276
Introductory message from WACV 2009 general chair
277
Introductory message from Winter-PETS 2009 co-chair
278
Introductory message: Initiating China Communications as a joint CIC-IEEE publication
279
Introductory Nanotechnology Courses: Experiences of an Educator
280
Introductory network theory
281
Introductory note
282
Introductory notes to a lecture on ¿Variable-speed alternating-current motors without commutators¿
283
Introductory Offer to New Members of the Computer Professional´s Book Club [advertisement]
284
Introductory Offer to New Members of the Computer Professionals´ Book Club [advertisement]
285
Introductory pages
286
Introductory paper: Device fabrication
287
Introductory paper: System utilization
288
Introductory physics: an attempt to change attitudes
289
Introductory Pre-College Engineering Design Course Based upon Collaborative Learning to High School Students
290
Introductory probabilistic and stochastic analysis and design of circuits
291
Introductory programming languages in higher education
292
Introductory Project in Electrical Engineering as a tool to improve motivation among second-year students
293
Introductory Quantum Optics [Book Review]
294
Introductory remarks
295
Introductory remarks
296
Introductory Remarks
297
Introductory Remarks
298
Introductory Remarks
299
Introductory Remarks
300
Introductory Remarks
301
Introductory Remarks
302
Introductory Remarks
303
Introductory Remarks
304
Introductory Remarks
305
Introductory Remarks
306
Introductory Remarks
307
Introductory remarks [Special issue intro.]
308
Introductory Remarks for the Panel Discussion on Computer Control
309
Introductory remarks from the conference chairman
310
Introductory Remarks from the Conference Chairman Why We Need Every Engineer to Be a Leader
311
Introductory remarks on mobile channel allocations
312
Introductory remarks on nanodielectrics
313
Introductory remarks on nanodielectrics
314
Introductory remarks on present theories of atomic structure
315
Introductory remarks to the discussion on "R.M.A. specification for testing and expressing the overall performance of radio receivers" before the Wireless Section
316
Introductory remarks to the discussion on "R.M.A. specification for testing and expressing the overall performance of radio receivers" before the Wireless Section
317
Introductory remarks to the general discussion on electrical engineering education
318
Introductory remarks to the Lagrangian session
319
Introductory remarks to the session
320
Introductory Remarks, Dec. 1974, Part II
321
Introductory Remarks, July 1971
322
Introductory Session, 1969 G-MTT International Microwave Symposium
323
Introductory signal processing labs based on filterbank applications
324
Introductory Signals and Circuits
325
Introductory study on the Discrete Trigonometric Transform (DTT) wavelet-like decomposition-reconstruction procedure
326
Introductory survey
327
Introductory Survey to Open-Source Mobile Robot Simulation Software
328
Introductory Systems Engineering
329
Introductory Transmission Systems for Technicians
330
Introductory tutorial: Agent-based modeling and simulation
331
Introductory tutorial: Agent-based modeling and simulation
332
Introductory tutorial: Agent-based modeling and simulation
333
Introductory UART Experiments for a Microcomputer Course
334
Introductory ultra-low-voltage electronics
335
Introdution to Telephony and Telegraphy
336
Intron Identification Approaches Based on Weighted Features and Fuzzy Decision Trees
337
Introscopy of solids at Novosibirsk terahertz free electron laser
338
Introspecting for RSA Key Material to Assist Intrusion Detection
339
Introspection in system-level language frameworks: meta-level vs. integrated
340
Introspection into an Agile Workflow Engine for Long-Term Processes
341
Introspection Mechanisms for Semi-Formal Verification in a System-Level Design Environment
342
Introspection on China´s curriculum reform
343
Introspection on control-grounded capabilities. Relevance in task allocation problems
344
Introspection on experimental psychology
345
Introspection: a low overhead binding technique during self-diagnosing microarchitecture synthesis
346
Introspection-Based Fault Tolerance for COTS-Based High-Capability Computation in Space
347
Introspection-Based Verification and Validation
348
Introspections on the Semantic Gap
349
Introspective classification for pedestrian detection
350
Introspective failure analysis: avoiding correlated failures in peer-to-peer systems
351
Introspective In-Flight Checkout Techniques for Manned Space Vehicle Electronics Systems
352
Introspective semantic segmentation
353
IntroStat: a hypertext-based electronic textbook to introduce fundamental methods of biomedical statistics
354
Introversion and the implication of intelligent tutoring systems: a lesson from Arab students
355
Intruder [interactive environment]
356
Intruder Activity Analysis under Unreliable Sensor Networks
357
Intruder alert! [Book Review]
358
Intruder capturing game on a topological map assisted by information networks
359
Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
360
Intruder detection based on graph structured hypothesis testing
361
Intruder detection by extracting semantic content from surveillance videos
362
Intruder detection by visual cryptography in wireless sensor networks
363
Intruder detection considering a Java platform application
364
Intruder detection for automated access control systems with Kinect device
365
Intruder Detection System Architecture for an SOA-Based C4I2SR System
366
Intruder detection system by image processing
367
Intruder detection systems for water-hatches at reservoir sites
368
Intruder detection using a wireless sensor network with an intelligent mobile robot response
369
Intruder Detection: An Optimal Decision Analysis Strategy
370
Intruder disturbance determination of coaxial cables by impulse reflectometer TX6000
371
Intruder Location Tracking
372
Intruder recognition using ECG signal
373
Intruder sensor using low probability of interception SS-FH signals
374
Intruder tracking in WSNs using binary detection sensors and mobile sinks
375
Intruder tracking using wireless sensor network
376
Intruders in the Grid
377
Intruders pattern identification
378
IntruDetector: a software platform for testing network intrusion detection algorithms
379
Intruding a substation? - IT network security in power systems a guide for practical IT based architectures
380
Intruding target detection using wireless sensor network
381
Intruducing the IEEE Power & Energy Library
382
Intrusion activity projection for cyber situational awareness
383
Intrusion Alert Correlation based on D-S Evidence Theory
384
Intrusion alert normalization method using AWK scripts and attack name database
385
Intrusion Alerts Correlation Based Assessment of Network Security
386
Intrusion Alerts Correlation Model Based on XSWRL Ontology
387
Intrusion analysis with deep packet inspection: Increasing efficiency of packet based investigations
388
Intrusion and anomaly detection in trusted systems
389
Intrusion and anomaly detection model exchange for mobile ad-hoc networks
390
Intrusion and misuse detection in large-scale systems
391
Intrusion Attack Pattern Analysis and Signature Extraction for Web Services Using Honeypots
392
Intrusion avoidance for SCADA security in industrial plants
393
Intrusion Aware System-on-a-Chip Design with Uncertainty Classification
394
Intrusion behavior detection through visualization
395
Intrusion countermeasures security model based on prioritization scheme for intranet access security (emerging concepts category)
396
Intrusion damage assessment for multi-stage attacks for clouds
397
Intrusion Detection Alarm Filtering Technology Based on Ant Colony Clustering Algorithm
398
Intrusion Detection Algorithm Based on Semi-supervised Learning
399
Intrusion Detection Algorithm of Artificial Immune Based on Decision Tree and Genetic Algorithm
400
Intrusion detection analysis by integrating roulette wheel and pseudo-random into back propagation networks
401
Intrusion Detection and Attack Classification Using Feed-Forward Neural Network
402
Intrusion detection and avoidance — NIS-03
403
Intrusion detection and classification in forest area using inter-sensor communication signals and SVM
404
Intrusion detection and classification using optical fiber vibration sensor
405
Intrusion detection and defense mechanism for packet replication attack over MANET using swarm intelligence
406
Intrusion detection and honeypots in nested virtualization environments
407
Intrusion Detection and Internet Services Failure Reporting System
408
Intrusion detection and prevention system: Challenges & opportunities
409
Intrusion detection and response using mobile agent technology
410
Intrusion detection and security policy framework for distributed environments
411
Intrusion detection and self healing model for network security
412
Intrusion detection and simulation for high-speed networks
413
Intrusion detection and tolerance for transaction based applications in wireless environments
414
Intrusion Detection and tolerance in Grid-based applications
415
Intrusion Detection and Tracking with Pan-Tilt Cameras
416
Intrusion detection at 100G
417
Intrusion detection based on “Hybrid” propagation in Bayesian Networks
418
Intrusion Detection Based on Adaptive Polyclonal Clustering
419
Intrusion Detection Based on Adaptive RBF Neural Network
420
Intrusion Detection Based on An Improved ART2 Neural Network
421
Intrusion detection based on ant colony algorithm of fuzzy clustering
422
Intrusion detection based on artificial immune system with self-similar traffic
423
Intrusion detection based on clustering a data stream
424
Intrusion detection based on clustering genetic algorithm
425
Intrusion detection based on Core Vector Machine and ensemble classification methods
426
Intrusion detection based on cross-correlation of system call sequences
427
Intrusion Detection Based on Data Mining
428
Intrusion Detection Based on Density Level Sets Estimation
429
Intrusion Detection Based on Fuzzy Association Rules
430
Intrusion Detection Based on Fuzzy Reasoning*
431
Intrusion Detection Based on Fuzzy Support Vector Machines
432
Intrusion Detection based on Grid
433
Intrusion detection based on hidden Markov model
434
Intrusion Detection Based on Immune Dynamical Matching Algorithm
435
Intrusion Detection Based on Improved Fuzzy C-means Algorithm
436
Intrusion Detection based on KELM with Levenberg-Marquardt optimization
437
Intrusion detection based on K-Means clustering and Naïve Bayes classification
438
Intrusion detection based on k-means clustering and OneR classification
439
Intrusion Detection Based on Minimax Probability Machine with Immune Clonal Feature Optimized
440
Intrusion detection based on MinMax K-means clustering
441
Intrusion detection based on model checking timed interval temporal logic
442
Intrusion detection based on multi-layer minimax probability machine classifier
443
Intrusion detection based on neural networks and Artificial Bee Colony algorithm
444
Intrusion detection based on Neuro-Fuzzy classification
445
Intrusion Detection Based on One-class SVM and SNMP MIB Data
446
Intrusion detection based on quantum interference
447
Intrusion Detection Based on RBF Neural Network
448
Intrusion Detection Based on Simulated Annealing and Fuzzy C-means Clustering
449
Intrusion Detection Based on Support Vector Machine Divided up by Clusters
450
Intrusion Detection Based on Support Vector Machine Using Heuristic Genetic Algorithm
451
Intrusion detection based on SVM and decision fusion
452
Intrusion detection based on system call finite-state automation machine
453
Intrusion detection based on the immune human system
454
Intrusion detection based on the semi-supervised Fuzzy C-Means clustering algorithm
455
Intrusion detection based on the short sequence model
456
Intrusion detection based on traffic analysis in wireless sensor networks
457
Intrusion Detection Based on Variable Prefix of System Call
458
Intrusion Detection based Sample Selection for imbalanced data distribution
459
Intrusion detection based security architecture for wireless sensor networks
460
Intrusion Detection by Heterosis Immunization with Gene Migration
461
Intrusion Detection by New Data Description Method
462
Intrusion Detection by Ultra-Wide Bandwidth Radar
463
Intrusion Detection Combining Multiple Decision Trees by Fuzzy logic
464
Intrusion Detection Engine Based on Dempster-Shafer´s Theory of Evidence
465
Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions
466
Intrusion Detection for Computational Grids
467
Intrusion Detection for Encrypted Web Accesses
468
Intrusion Detection for Grid and Cloud Computing
469
Intrusion Detection for High-Speed Networks Based on Producing System
470
Intrusion detection for IEEE 802.11 based industrial automation using possibilistic anomaly detection
471
Intrusion detection for link state routing protocol through integrated network management
472
Intrusion detection for MANET to detect unknown attacks using Genetic algorithm
473
Intrusion Detection for Object-Based Storage System
474
Intrusion Detection for Transportation Information Security Systems Based on Genetic Algorithm-Chaos and RBF Neural Network
475
Intrusion detection for wireless local area network
476
Intrusion detection for wireless power networks, near-field communication, and side-channel attacks
477
Intrusion Detection for Wireless Sensor Networks Based on Multi-agent and Refined Clustering
478
Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme
479
Intrusion Detection Force: an infrastructure for Internet-scale intrusion detection
480
Intrusion detection framework of cluster-based wireless sensor network
481
Intrusion detection framework of cluster-based wireless sensor network
482
Intrusion detection in advanced metering infrastructure based on consumption pattern
483
Intrusion detection in aerial imagery for protecting pipeline infrastructure
484
Intrusion detection in Bluetooth enabled mobile phones
485
Intrusion Detection in Cloud Computing
486
Intrusion detection in computer networks by multiple classifier systems
487
Intrusion detection in computer networks using Optimum-Path Forest clustering
488
Intrusion detection in computer networks using tabu search based fuzzy system
489
Intrusion Detection in Controlled Discrete Event Systems
490
Intrusion Detection in Cyber-Physical Systems: Techniques and Challenges
491
Intrusion detection in distributed systems, an approach based on taint marking
492
Intrusion detection in encrypted accesses with SSH protocol to network public servers
493
Intrusion Detection in Gaussian Distributed Heterogeneous Wireless Sensor Networks
494
Intrusion detection in Gaussian distributed Wireless Sensor Networks
495
Intrusion detection in heterogeneous Wireless Sensor Networks with an energy efficient localization algorithm
496
Intrusion detection in hierarchically structured wireless multi-hop networks
497
Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks
498
Intrusion detection in Honeynets by compression and hashing
499
Intrusion Detection in IMS: Experiences with a Hellinger Distance-Based Flooding Detector
500
Intrusion detection in IT networks with limited observations
501
Intrusion Detection in MANET using fuzzy logic
502
Intrusion detection in MANET using Self Organizing Map (SOM)
503
Intrusion detection in MANETS - the second wall of defense
504
Intrusion detection in mobile AdHoc networks using machine learning approach
505
Intrusion Detection in Mobile Ad-Hoc Networks: A Mobile Agent Approach
506
Intrusion Detection in Online Controller of Digital Microfluidic Biochips
507
Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test
508
Intrusion detection in RBAC-administered databases
509
Intrusion detection in real-time database systems via time signatures
510
Intrusion detection in RFID systems
511
Intrusion detection in role administrated database: Transaction-based approach
512
Intrusion detection in SCADA systems using machine learning techniques
513
Intrusion detection in scada systems using one-class classification
514
Intrusion detection in sensor networks based on measurements
515
Intrusion detection in sensor networks: a non-cooperative game approach
516
Intrusion Detection in the Cloud
517
Intrusion detection in VANETs through verification of vehicle movement data
518
Intrusion detection in virtual machine environments
519
Intrusion detection in web applications: Evolutionary approach
520
Intrusion detection in wireless ad hoc networks
521
Intrusion Detection in Wireless Mesh Networks Using a Hybrid Approach
522
Intrusion detection in wireless networks using clustering techniques with expert analysis
523
Intrusion detection in wireless networks using Genetic Algorithm
524
Intrusion detection in wireless sensor network using genetic K-means algorithm
525
Intrusion detection in wireless sensor networks for destructive intruders
526
Intrusion Detection in Wireless Sensor Networks: The S-Model Learning Automata Approach
527
Intrusion detection learning algorithm through network mining
528
Intrusion detection method according to the characteristics of refreshing process
529
Intrusion Detection Method Based on Classify Support Vector Machine
530
Intrusion Detection Method Based on Fuzzy Hidden Markov Model
531
Intrusion Detection Method Based on Sparse Neural Network
532
Intrusion Detection Method Based on Wavelet Neural Network
533
Intrusion detection method research based on optimized self-buildup clustering neural network
534
Intrusion detection model based on Android
535
Intrusion detection model based on ensemble learning for U2R and R2L attacks
536
Intrusion Detection Model Based on Hierarchical Fuzzy Inference System
537
Intrusion Detection Model Based on Hierarchical Structure in Wireless Sensor Networks
538
Intrusion Detection Model Based on Improved Support Vector Machine
539
Intrusion Detection Model Based On Particle Swarm Optimization and Support Vector Machine
540
Intrusion Detection Model Based on Support Vector Regression and Principal Components Analysis
541
Intrusion detection model based on the improved neural network and expert system
542
Intrusion detection model of mobile agent based on Aglets
543
Intrusion detection model using fusion of PCA and optimized SVM
544
Intrusion Detection Models Analysis and Study of a New Structure
545
Intrusion detection of in-band wormholes in MANETs using advanced statistical methods
546
Intrusion detection of sinkhole attacks in large-scale wireless sensor networks
547
Intrusion detection oriented distributed negative selection algorithm
548
Intrusion Detection Parameterization Exchange data model
549
Intrusion Detection Quantitative Analysis with Support Vector Regression and Particle Swarm Optimization Algorithm
550
Intrusion detection research based on improved PSO and SVM
551
Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed
552
Intrusion detection scheme using traffic prediction for wireless industrial networks
553
Intrusion detection solution to WLANs
554
Intrusion detection system (IDS) for combating attacks against cognitive radio networks
555
Intrusion Detection System against Sink Hole Attack in Wireless Sensor Networks with Mobile Sink
556
Intrusion detection system- An efficient way to thwart against Dos/DDos attack in the cloud environment
557
Intrusion detection system based on ant colony memory principle
558
Intrusion detection system based on classification
559
Intrusion Detection System Based on Data Mining
560
Intrusion Detection System based on Data Mining
561
Intrusion Detection System Based on Feature Selection and Support Vector Machine
562
Intrusion Detection System Based on Fuzzy Choose-Closed Principle
563
Intrusion detection system based on fuzzy default logic
564
Intrusion detection system based on growing grid neural network
565
Intrusion detection system based on improved BP Neural Network and Decision Tree
566
Intrusion Detection System Based on Improved SVM Incremental Learning
567
Intrusion Detection System Based on KNN-MARS
568
Intrusion Detection System Based on Matching Pursuit
569
Intrusion detection system based on mobile agent
570
Intrusion detection system based on Multi-Layer Perceptron Neural Networks and Decision Tree
571
Intrusion detection system based on multi-strategy pruning algorithm of the decision tree
572
Intrusion detection system based on new association rule mining model
573
Intrusion detection system based on partially ordered events and patterns
574
Intrusion Detection System Based on Payoff Matrix for Wireless Sensor Networks
575
Intrusion Detection System Based on Principal Component Analysis and Grey Neural Networks
576
Intrusion detection system based on Software Defined Network firewall
577
Intrusion detection system based on system behavior
578
Intrusion detection system based on wavelet cluster algorithm
579
Intrusion detection system by improved preprocessing methods and Naïve Bayes classifier using NSL-KDD 99 Dataset
580
Intrusion Detection System by Integrating PCNN and Online Robust SVM
581
Intrusion detection system combining misuse detection and anomaly detection using Genetic Network Programming
582
Intrusion detection system for container security
583
Intrusion Detection System for Electric Power Information Network Based on Improved Ball Vector Machine
584
Intrusion detection system for grid computing using SNORT
585
Intrusion Detection System for IEC 60870-5-104 based SCADA networks
586
Intrusion Detection System for IP Multimedia Subsystem using K-Nearest Neighbor classifier
587
Intrusion Detection System for network security in synchrophasor systems
588
Intrusion Detection System for Power-Aware OLSR
589
Intrusion detection system for RPL from routing choice intrusion
590
Intrusion detection system for signal based SIP attacks through timed HCPN
591
Intrusion detection system for the protection of railway assets by using Fiber Bragg Grating sensors: a Case Study
592
Intrusion detection system for Wireless Nano sensor Networks
593
Intrusion Detection System for WSN-Based Intelligent Transportation Systems
594
Intrusion Detection System in Cloud Computing: Challenges and opportunities
595
Intrusion detection system in wireless ad-hoc networks based on mobile agent technology
596
Intrusion detection system in Wireless Sensor Network based on mobile agent
597
Intrusion Detection System Intended for Multigigabit Networks
598
Intrusion Detection System Model Based on Extension Detecting
599
Intrusion Detection System Modeling
600
Intrusion Detection System of IPv6 Based on Protocol Analysis
601
Intrusion detection system on MAC layer for attack prevention in MANET
602
Intrusion Detection System Platform Based on Light-Weighted Hybrid Artificial Immune Algorithms
603
Intrusion Detection System Research Based on Data Mining for IPv6
604
Intrusion Detection System Resiliency to Byzantine Attacks: The Case Study of Wormholes in OLSR
605
Intrusion Detection System Technique Based on BP-SVM
606
Intrusion detection system to detect malicious misbehaviour nodes in MANET
607
Intrusion detection system to detect variant attacks using learning algorithms with automatic generation of training data
608
Intrusion Detection System Using Bagging Ensemble Method of Machine Learning
609
Intrusion detection system using Bagging Ensemble Selection
610
Intrusion detection system using contour-based multi-planar visual hull method
611
Intrusion detection system using contour-based multi-planar visual hull method
612
Intrusion Detection System using decision tree algorithm
613
Intrusion detection system using Discrete Fourier Transform
614
Intrusion detection system using fuzzy genetic algorithm
615
Intrusion detection system using genetic algorithm
616
Intrusion detection system using Honey Token based Encrypted Pointers to mitigate cyber threats for critical infrastructure networks
617
Intrusion detection system using Optimum-Path Forest
618
Intrusion Detection System using Self Organizing Maps
619
Intrusion Detection System Using Self-Organizing Maps
620
Intrusion detection system using stream data mining and drift detection method
621
Intrusion detection system using various detectors
622
Intrusion Detection System with packet filtering for IP Spoofing
623
Intrusion detection system with the data mining technologies
624
Intrusion Detection System with Wavelet and Neural Artifical Network Approach for Networks Computers
625
Intrusion detection system: Hybrid approach based mobile agent
626
Intrusion detection systems adapted from agent-based artificial immune systems
627
Intrusion detection systems for community wireless mesh networks
628
Intrusion detection systems for High Performance Computing environment
629
Intrusion Detection Systems in mobile ad hoc networks: A survey
630
Intrusion Detection Systems using Linear Discriminant Analysis and Logistic Regression
631
Intrusion Detection Systems: technology and development
632
Intrusion detection technique by using fuzzy ART on computer network security
633
Intrusion detection technique by using k-means, fuzzy neural network and SVM classifiers
634
Intrusion Detection Techniques for Infrastructure as a Service Cloud
635
Intrusion detection techniques for virtual domains
636
Intrusion detection techniques in mobile ad hoc and wireless sensor networks
637
Intrusion Detection Techniques in Wireless Ad Hoc Networks
638
Intrusion detection technology based on CEGA-SVM
639
Intrusion detection technology based on data parsing and finite automaton
640
Intrusion Detection Technology Based on SVDD
641
Intrusion detection technology research based high-speed network
642
Intrusion detection testing and benchmarking methodologies
643
Intrusion detection through artificial neural networks
644
Intrusion detection using a cascade of boosted classifiers (CBC)
645
Intrusion detection using a hybridization of evolutionary fuzzy systems and artificial immune systems
646
Intrusion Detection Using a PCB and IP address
647
Intrusion detection using adaptive time-dependent finite automata
648
Intrusion detection using alert prioritization and multiple minimum supports
649
Intrusion Detection using Artificial Neural Network
650
Intrusion detection using Data Mining
651
Intrusion detection using data mining techniques
652
Intrusion detection using deep belief networks
653
Intrusion Detection Using Ensemble of SVM Classifiers
654
Intrusion detection using error correcting output code based ensemble
655
Intrusion Detection Using Evolutionary Neural Networks
656
Intrusion detection using evolving fuzzy classifiers
657
Intrusion detection using extraction of moving edges
658
Intrusion Detection Using Fuzzy Stochastic Local Search Classifier
659
Intrusion detection using fuzzy window Markov model
660
Intrusion Detection Using Geometrical Structure
661
Intrusion Detection Using Isomap and Support Vector Machine
662
Intrusion detection using keystroke dynamics & fuzzy logic membership functions
663
Intrusion detection using k-Nearest Neighbor
664
Intrusion detection using MLP for MANETs
665
Intrusion detection using mobile agent in ad-hoc networks
666
Intrusion detection using mobile agents in wireless ad hoc networks
667
Intrusion detection using neuarl networks trained by differential evaluation algorithm
668
Intrusion detection using neural network committee machine
669
Intrusion detection using neural networks and support vector machines
670
Intrusion detection using optimal genetic feature selection and SVM based classifier
671
Intrusion detection using principal component analysis
672
Intrusion Detection Using Protocol-based Non-Conformance to Trusted Behaviors
673
Intrusion detection using radial basis function network on sequences of system calls
674
Intrusion Detection Using Random Forests Classifier with SMOTE and Feature Reduction
675
Intrusion detection using signatures extracted from execution profiles
676
Intrusion detection using software defined noise radar
677
Intrusion Detection Using SVM
678
Intrusion Detection Using Third-Parties Support
679
Intrusion Detection via Fuzzy-Genetic Algorithm Combination with Evolutionary Algorithms
680
Intrusion detection via static analysis
681
Intrusion detection via system call traces
682
Intrusion Detection with Data Correlation Relation Graph
683
Intrusion detection with early recognition of encrypted application
684
Intrusion Detection with Neural Networks and Watermarking Techniques for MANET
685
Intrusion detection. Applying machine learning to Solaris audit data
686
Intrusion detection: a bioinformatics approach
687
Intrusion detection: a brief history and overview
688
Intrusion Detection: A Survey
689
Intrusion detection: Ad-hoc networks to ambient intelligence framework
690
Intrusion detection: an application of expert systems to computer security
691
Intrusion detection: An energy efficient approach in heterogeneous WSN
692
Intrusion detection: current capabilities and future directions
693
Intrusion detection: managing the risk of connectivity
694
Intrusion detection: systems and models
695
Intrusion detection-one of the security methods
696
Intrusion diagnosis and compensation for acyclic networked systems using a multinode strategy: Analysis and design
697
Intrusion discovery with data mining on Honeynet
698
Intrusion Evaluation of Communication Network Architectures for Power Substations
699
Intrusion feature selection using Modified Heuristic Greedy Algorithm of Itemset
700
Intrusion Investigations with Data-Hiding for Computer Log-File Forensics
701
Intrusion location capability added to synergistic radar technology
702
Intrusion Monitoring in Process Control Systems
703
Intrusion Objects with Shapes under Randomized Scheduling Algorithm in Sensor Networks
704
Intrusion of a Heated Metal Particle into Ice
705
Intrusion of Agent-Based Social Simulation in economic theory: Will heterogeneous agent bring more clarity in the context of IT-outsourcing?
706
Intrusion Prevention and self-healing algorithms inspired by danger theory
707
Intrusion prevention by image based authentication techniques
708
Intrusion Prevention in Asterisk-Based Telephony System
709
Intrusion Prevention System Base on Immune Vaccination
710
Intrusion prevention system design
711
Intrusion prevention system in the network of digital mine
712
Intrusion Process Modeling for Security Quantification
713
Intrusion Recognition Using Neural Networks
714
Intrusion Resilient Secure Topology Construction in Unstructured Wireless Sensor Network
715
Intrusion Resistant SOAP Messaging with IAPF
716
Intrusion Response as a Resource Allocation Problem
717
Intrusion Response Model Based on AIS
718
Intrusion ripple analysis in distributed information systems
719
Intrusion scenarios detection based on data mining
720
Intrusion sensor data fusion in an intelligent intrusion detection system architecture
721
Intrusion Techniques: Comparative Study of Network Intrusion Detection Systems
722
Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks
723
Intrusion tolerance for Internet applications
724
Intrusion Tolerance in Cloud Applications: The mOSAIC Approach
725
Intrusion tolerance in distributed computing systems
726
Intrusion Tolerance in Wireless Environments: An Experimental Evaluation
727
Intrusion tolerance mechanisms using redundant nodes for wireless sensor networks
728
Intrusion Tolerance Model for Electronic Commerce System
729
Intrusion tolerance schemes to facilitate mobile e-commerce
730
Intrusion tolerance system against denial of service attacks in wireless sensor network
731
Intrusion tolerance via network layer controls
732
Intrusion Tolerant Approach for Denial of Service Attacks to Web Services
733
Intrusion tolerant distributed object systems: project summary
734
Intrusion tolerant GRID in ad-hoc networks
735
Intrusion tolerant middleware
736
Intrusion Tolerant Routing for Mesh Networks
737
Intrusion tolerant serializability for transaction-based SAN environments
738
Intrusion Tolerant Services Through Virtualization: A Shared Memory Approach
739
Intrusion tolerant software architectures
740
Intrusion tolerant system for integrated vetronics survivability strategy
741
Intrusion tolerant systems
742
Intrusion tolerant Web servers via network layer controls
743
Intrusion trap system: an efficient platform for gathering intrusion-related information
744
Intrusion-alarmed fiber optic communication link using a planar waveguide bimodal launcher
745
Intrusion-Resilience in Mobile Unattended WSNs
746
Intrusion-Resilient Secret Sharing
747
Intrusion-resilient, DDoS-resistant and agent-assisted network security system
748
Intrusion-resistant ad hoc wireless networks
749
Intrusions detection based on Support Vector Machine optimized with swarm intelligence
750
Intrusions Detection in Intelligent Agent-Based Non-traditional Grids
751
Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering
752
Intrusion-tolerant Enclaves
753
Intrusion-tolerant framework for heterogeneous Wireless Sensor Networks
754
Intrusion-tolerant group management in Enclaves
755
Intrusion-tolerant middleware: the road to automatic security
756
Intrusion-tolerant self-healing devices for critical infrastructure protection
757
Intrusion-Tolerant Shared Memory through a P2P Overlay Segmentation
758
Intrusive and non-intrusive watermarking
759
Intrusive behavior analysis based on honey pot tracking and ant algorithm analysis
760
Intrusive detection system implementation using deep packet inspection
761
Intrusive Detection Systems Design based on BP Neural Network
762
Intrusive interactivity is not an ambient experience
763
Intrusive speech transmission quality measurement in chinese environment
764
Intrusive Test Automation with Failed Test Case Clustering
765
Intrusiveness-aware Estimation for high quantiles of a packet delay distribution
766
Intrussion detection by penetration test in an organization network
767
Int-serv framework architecture and QoS implementation in the IPv6
768
IntServ operation over DiffServ networks
769
IntServ6: an approach to support QoS over IPv6 networks
770
Intsim: a CAD tool for optimization of multilevel interconnect networks
771
Intuisec: A Framework for Intuitive User Interaction with Smart Home Security using Mobile Devices
772
Intuition as mental image processing: Some psycholinguistic considerations on intuitive sensory data structuring and processing based on mental image directed semantic theory
773
Intuition in Medical Image Segmentation: Visualizing Graph Edge Weights
774
Intuition is strategic decision making: Friend of foe in the fast-paced 21st century
775
Intuition Through Visualization (review of "Introduction to RF Design Using EM Simulators (Kogure, H., et al; 2010)) [Book Review]
776
Intuition vs. Truth: Evaluation of Common Myths about StackOverflow Posts
777
Intuition, Insight, Imagination and Creativity
778
Intuition, perception, and secure communication
779
Intuition´s Role in Decision Making
780
Intuitional decoding algorithm in RAID architecture based on dual parity placement scheme
781
Intuition-driven monitor: a monitor device driven by user´s haptic manipulation
782
Intuitionisitic Fuzzy Ideals of BCH-algebras
783
Intuitionistic counterparts of finitely-valued logics
784
Intuitionistic Description Logic and Legal Reasoning
785
Intuitionistic Fuzzy Aggregation Operators
786
Intuitionistic Fuzzy Analytic Hierarchy Process
787
Intuitionistic fuzzy approach for adaptive presentation in an E-learning environment
788
Intuitionistic Fuzzy Approach to Enhance Text Documents
789
Intuitionistic Fuzzy Automata and Associated Fuzzy Topologies
790
Intuitionistic Fuzzy Bilevel Programming by Particle Swarm Optimization
791
Intuitionistic fuzzy bipolar approach for flexible querying in e-commerce applications
792
Intuitionistic Fuzzy Bonferroni Means
793
Intuitionistic fuzzy Choquet integral operator-based approach for black-start decision-making
794
Intuitionistic fuzzy Choquet integrals and their application in modeling linguistic quantifiers
795
Intuitionistic fuzzy classification and rough approximations
796
Intuitionistic fuzzy cognitive map based on fuzzy measure and integral
797
Intuitionistic Fuzzy Cognitive Maps
798
Intuitionistic Fuzzy Cognitive Maps for Medical Decision Making
799
Intuitionistic fuzzy complemented subsemirings
800
Intuitionistic fuzzy comprehensive evaluation in decision-making problem
801
Intuitionistic fuzzy data warehouse and some analytical operations
802
Intuitionistic fuzzy estimation and generalized net model of e-learning within a university local network
803
Intuitionistic fuzzy estimations of purposeful model parameters genesis
804
Intuitionistic Fuzzy Evaluation for Supply Chain Coordination Degree Based on TOPSIS
805
Intuitionistic fuzzy filter of lattice implication algebras
806
Intuitionistic Fuzzy Finite Automata with Unique Membership Transitions
807
Intuitionistic fuzzy generalized net analysis of periodic deadlock detection in database systems
808
Intuitionistic fuzzy generalized net models of industrial plants components
809
Intuitionistic Fuzzy Geometric Aggregation Operator Based on Fuzzy Measure for Multi-criteria Group Decision Making
810
Intuitionistic fuzzy graph interpretations of multi-person multi-criteria decision making: generalized net approach
811
Intuitionistic Fuzzy Group Decision Making for Supply Chain Information Collaboration Partner Selection
812
Intuitionistic Fuzzy Information Aggregation Using Einstein Operations
813
Intuitionistic Fuzzy Interaction Bonferroni Means and Its Application to Multiple Attribute Decision Making
814
Intuitionistic fuzzy interpretations of multi-person multi-criteria decision making
815
Intuitionistic Fuzzy Lie Sub-superalgebras and Ideals of Lie Superalgebras
816
Intuitionistic Fuzzy Likelihood Methods and Models for Naval Air Defense Situation and Threat Assessment
817
Intuitionistic fuzzy logic based quality assessment of simple genetic algorithm
818
Intuitionistic Fuzzy Multiattribute Decision Making: An Interactive Method
819
Intuitionistic fuzzy multiple attribute group decision making based on projection method
820
Intuitionistic fuzzy numbers decision-making methods based on grey incidence analysis and D-S theory of evidence
821
Intuitionistic fuzzy perceiving methods for situation and threat assessment
822
Intuitionistic Fuzzy Petri Nets Model and Reasoning Algorithm
823
Intuitionistic fuzzy random variables
824
Intuitionistic fuzzy reasoning with cognitive maps
825
Intuitionistic fuzzy relation equations
826
Intuitionistic fuzzy relational calculus: An overview
827
Intuitionistic fuzzy residuated logic and Galois connection
828
Intuitionistic fuzzy Riemann integral
829
Intuitionistic Fuzzy Ring and Its Homomorphism Image
830
Intuitionistic Fuzzy Rough Approximation Operators Based on Intuitionistic Fuzzy Triangle Norm
831
Intuitionistic fuzzy rough set based on intuitionistic similarity relation
832
Intuitionistic Fuzzy Rough Sets Determined by Intuitionistic Fuzzy Implicators
833
Intuitionistic fuzzy rough sets model based on (Θ, Φ)-operators
834
Intuitionistic fuzzy roughness measure for segmentation of brain MR images
835
Intuitionistic Fuzzy Segmentation of Medical Images
836
Intuitionistic fuzzy set application in bacteria recognition
837
Intuitionistic Fuzzy Set Functions, Mass Assignment Theory, Possibility Theory and Histograms
838
Intuitionistic fuzzy sets with membership and non-membership functions of exponential type
839
Intuitionistic Fuzzy Sets with Single Parameter and its Application to Pattern Recognition
840
Intuitionistic fuzzy soft preference relations and application in decision making
841
Intuitionistic Fuzzy Soft Set
842
Intuitionistic fuzzy statistical tools for filters in image processing
843
Intuitionistic Fuzzy Subfield and Its Characterizations
844
Intuitionistic fuzzy subgroups and its characterizations
845
Intuitionistic Fuzzy Sublattice Group
846
Intuitionistic Fuzzy Theory Based P2P Trust Model
847
Intuitionistic fuzzy topology space based on fuzzy rough sets
848
Intuitionistic fuzzy translation invariant spaces
849
Intuitionistic fuzzy-valued fuzzy measures
850
Intuitionistic linear logic and partial correctness
851
Intuitionistic Truth-Knowledge Symmetric Bilattices for Uncertainty in Intel1igent systems
852
Intuitionistic type-2 fuzzy set approach to image thresholding
853
Intuitionistic weight generation approach from intuitionistic preference relations
854
Intuitionistic, 2-way adaptive fuzzy control
855
Intuitive analogue circuit design
856
Intuitive analogue circuit design: less maths more thumbs!
857
Intuitive analysis of space-time focusing with double-ABCD calculation
858
Intuitive and adaptive mixed reality system to support nomadic maintenance collaborative activities
859
Intuitive and direct teaching system of multi-fingered hand-arm robot for grasping task
860
Intuitive and flexible user interface for creating whole body motions of biped humanoid robots
861
Intuitive and inexpensive method to evaluate flip chip bonding parameters of micro bump with wafer-level underfill material using glass substrate
862
Intuitive and interactive modification of large finite element models
863
Intuitive and model-based on-line programming of industrial robots: A modular on-line programming environment
864
Intuitive and model-based on-line programming of industrial robots: New input devices
865
Intuitive annotation of user-viewed objects for wearable AR systems
866
Intuitive Appliance Control System Based on a High-Accuracy Indoor Positioning System
867
Intuitive appliance control system with ID acquisition
868
Intuitive Approach In Biometric Recognition According to Hand Geometry and Palmprint
869
Intuitive approach to knowledge integration
870
Intuitive bimanual telemanipulation under communication restrictions by immersive 3D visualization and motion tracking
871
Intuitive classical approach of intensity noise in linear, phase-insensitive optical amplifiers
872
Intuitive Clustering of Biological Data
873
Intuitive Command of Manipulators in Micro-scale Tasks
874
Intuitive Content Management System
875
Intuitive content rendering by intelligently organizing browser tabs for enhanced user experience and better screen space utilization Smart Tabs - A new invention for intelligently organizing the browser tabs
876
Intuitive control engineering for mechatronic components in distributed automation systems based on the reference model of IEC 61499
877
Intuitive control for robotic rehabilitation devices by human-machine interface with EMG and EEG signals
878
Intuitive control for the mobile Service Robot InBOT using haptic interaction
879
Intuitive control of a multi-robot-system by means of projective virtual reality
880
Intuitive control of a planar bipedal walking robot
881
Intuitive control of three fingers robotic Gripper with a Data hand glove
882
Intuitive crowd behavior in dense urban environments using local laws
883
Intuitive Curve Drawing Based Folktale Generator
884
Intuitive Data Editing Examples
885
Intuitive decision-making modeling for self-driving vehicles
886
Intuitive decision-making using hyper similarity matching
887
Intuitive design of complex real-time control systems
888
Intuitive design of PTAT and CTAT circuits for MOSFET based temperature sensor using Inversion Coefficient based approach
889
Intuitive door entry system using PAN
890
Intuitive ECO synthesis for high performance circuits
891
Intuitive event modeling for personalized behavior monitoring
892
Intuitive explanation for low roundoff noise in normal realizations of narrow-band digital filters
893
Intuitive exposure and risk perception of RF EMF: Case studies Serbia and Montenegro
894
Intuitive fuzzy c-means algorithm
895
Intuitive Fuzzy C-Means Algorithm for MRI Segmentation
896
Intuitive Gestural Interfaces / Adaptive Environments and Mobile Devices / Apps.: Playing Music and the Musical Work as a Role Model for Personalized Gestural Interaction in Social Environments.
897
Intuitive gesture based user identification system
898
Intuitive gesture set on touch screen for ad-hoc file sharing among multiple mobile devices
899
Intuitive graphical interface for network simulator 2 supporting trainings in computer networks
900
Intuitive Haptic Control Surface for Mobile Robot Motion Control
901
Intuitive human governance of autonomic pervasive computing environments
902
Intuitive human interaction with an arm robot for severely handicapped people - A One Click Approach
903
Intuitive human robot interaction based on unintentional synchrony: A psycho-experimental study
904
Intuitive human skill reconstruction for compliance control
905
Intuitive IC Electronics
906
Intuitive IC electronics, a sophisticated primer for engineers and technicians
907
Intuitive Implication Logic System
908
Intuitive industrial robot programming through incremental multimodal language and augmented reality
909
Intuitive Information Table Graph and Its Solution on Web
910
Intuitive interaction and expressive cinematography in video games
911
Intuitive Interaction with Encrypted Query Execution in DataStorm
912
Intuitive interaction with multiple displays using orientation-sensor-enabled smartphones
913
Intuitive Interactive Human-Character Posing with Millions of Example Poses
914
Intuitive interface for a quicker electromagnetic motor design
915
Intuitive interface through active 3D gaze tracking
916
Intuitive Learning and Artificial Intuition Networks
917
Intuitive Leg Assist Device 2
918
Intuitive Mapping of UML 2 Activity Diagrams into Fundamental Modeling Concept Petri Net Diagrams and Colored Petri Nets
919
Intuitive micromanipulation with haptic audio feedback
920
Intuitive mobile image browsing on a hexagonal lattice
921
Intuitive Mobile User Interaction in Smart Spaces via NFC-Enhanced Devices
922
Intuitive motion classification from EMG for the 3-D arm motions coordinated by multiple DoFs
923
Intuitive multimodal interaction and predictable behavior for the museum tour guide robot Robotinho
924
Intuitive multimodal interaction for service robots
925
Intuitive muscle-gesture based robot navigation control using wearable gesture armband
926
Intuitive operability evaluation of robotic surgery using brain activity measurement to identify hand-eye coordination
927
Intuitive operability evaluation of surgical robot using brain activity measurement to determine immersive reality
928
Intuitive operation of a wheelchair mounted robotic arm for the upper limb disabled: The mouth-only approach
929
Intuitive ordering to alleviate volatility in supply chain
930
Intuitive peg-in-hole assembly strategy with a compliant manipulator
931
Intuitive real-times platform for audio signal processing and musical instrument response emulation
932
Intuitive representation of gain schedulers to facilitate their design and tuning
933
Intuitive robot navigation using wireless EMG and acceleration sensors on human arm
934
Intuitive robot programming based on operators´ implicit knowledge
935
Intuitive robot tasks with augmented reality and virtual obstacles
936
Intuitive robot tool path teaching using laser and camera in Augmented Reality environment
937
Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling
938
Intuitive Service Discovery in RFID-enhanced networks
939
Intuitive simulation method based on associative memory
940
Intuitive skill-level programming of industrial handling tasks on a mobile manipulator
941
Intuitive sound perception in Media Technician and Web Designer courses
942
Intuitive Tactile Zooming for Graphics Accessed by Individuals Who are Blind and Visually Impaired
943
Intuitive task programming of stud welding robots for ship construction
944
Intuitive teaching and surveillance for production assistants
945
Intuitive teleoperation by micro dome system
946
Intuitive teleoperation of active catheters for endovascular surgery
947
Intuitive teleoperation of nonholonomic mobile robot with a manipulator based on virtual reality and WiFi
948
Intuitive Topic Discovery by Incorporating Word-Pair´s Connection Into LDA
949
Intuitive Transform Processing
950
Intuitive vibro-tactile feedback for human body movement guidance
951
Intuitive virtual grasping for non haptic environments
952
Intuitive visual teleoperation for UGVs using free-look augmented reality displays
953
Intuitive Visualization and Objective Metric Evaluation for Software Programming Based Advanced Image Segmentation
954
Intuitive visualization of vehicle distance, velocity and risk potential in rear-view camera applications
955
Intuitive wireless control of a robotic arm for people living with an upper body disability
956
Intuitive, Online, Simultaneous, and Proportional Myoelectric Control Over Two Degrees-of-Freedom in Upper Limb Amputees
957
Intuitiveness facilitates Rehabilitation: Clinical results
958
In-tunnel mobile communications deployment of an heterogeneous WLAN-WiMAX wireless network
959
In-tunnel traffic flow measuring system using ITV cameras
960
In-tunnel transmission characteristics of VICS radio beacon
961
In-Tunnel Vehicular Radio Channel Characterization
962
IntuPaint: Bridging the gap between physical and digital painting
963
INU fault diagnosis based on genetic wavelet neural network
964
iNuC: An Intelligent Mobile Nursing Cart
965
Inuence of technical-economic energy context for the management of wind farms and storage systems in a constrained network
966
Inuishi memorial lecture
967
INUM+: A leaner, more accurate and more efficient fast what-if optimizer
968
Inundation discriminated using sun glint
969
Inundation mapping using time series sattelite images
970
INV - Invited papers
971
In-vacuum resonant tunneling in the nanopentode
972
In-vacuum undulators at ESRF
973
Invader GT-5 with super compounded motor in 100 mpg diesel electric hybrid
974
Invading the fortress: how to besiege reinforced information bunkers
975
INVAID: an intelligent navigational AID far the world wide web
976
INVAID-integration of computer vision techniques for automatic incident detection
977
Invalid face images verifying for face recognition with partial occlusion
978
Invalid Pointer Dereferences Detection for CPS Software Based on Extended Pointer Structures
979
Invalid state identification for sequential circuit test generation
980
Invalidating Idealized BGP Security Proposals and Countermeasures
981
Invalidating Policies using Structural Information
982
Invalidation Clues for Database Scalability Services
983
Invalidation Control for Scheduling of Data Broadcasting in Mobile Computing Environments
984
Invalidation of dynamic network models
985
Invalidation of Mailing List Address to Block Spam Mails
986
Invalidation Report Scalability of Cache Access Mechanisms in Future Multiple-Cell Wireless Internet
987
Invalidation risk evaluation for prestressed cable bolt based on matter-element analysis
988
Invalidation techniques for assessing linear perturbation models of nonlinear systems
989
Invaluable, Practical, Proven [advertisement]
990
Invar and Elinvar amorphous alloys
991
Invar characteristics of amorphous (Fe,Co and Ni)-Zr alloys
992
Invar MEMS milliactuator for hard disk drive application
993
Invar properties of the interstitial carbides of Nd2Fe 17
994
Invar-36 Micro Hemispherical Shell Resonators
995
Invar-a new approach to EDA benchmark generation
996
InvArch: A hardware eficient architecture for Matrix Inversion
997
Invariability of intense beam emittance in nonlinear focusing channel
998
Invariance algorithms for nondestructive evaluation
999
Invariance analysis and application of the zoomed-and-shrunk image singular value vector
1000
Invariance and discrimination properties of the optical associative loop
بازگشت