نتایج جستجو برای: network aanalysis

تعداد نتایج: 672094  

2005
Han Liu Rafal Kustra

In this paper we propose to use ICA as a dimension reduction technique for microarray data. All microarray studies present a dimensionality challenge to the researcher: the number of dimensions (genes/spots on the microarray) is many times larger than the number of samples, or arrays. Any subsequent analysis must deal with this dimensionality problem by either reducing the dimension of the data...

Journal: :Journal of the Meteorological Society of Japan. Ser. II 1982

2017
Saurabh Kumar Rawat Suresh Babu

Objective: This study was done to evaluate the changes in vascularised free fibula graft for mandible reconstruction with respect to height of fibula graft and bony union at the ends of graft and osteotomy sites. Methods: A follow up study was conduted with 5 cases of mandibular resection due to aggressive benign tumor and reconstruction with vascularised free fibula flap. Changes in bone heigh...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - پژوهشکده فنی و مهندسی 1393

شبکه های خودرویی موردی (vehicular ad hoc network) نوعی از شبکه های موردی اند که برای ارتباط بی سیم میان خودروها طراحی شده اند. این شبکه ها زیر مجموعه ای شبکه های موردی متحرک (mobile ad hoc network) محسوب می شوند، اما به دلیل وجود مشخصات منحصر به فرد در شبکه های خودرویی مانند تغییر سریع همبندی، تحرک و سرعت بالای خودروها احتمال ایجاد انفصال در آن بسیار بالا است، بنابراین نیاز به طراحی پروتکل های ...

2016
Karl J. Reinhard Richard H. Hevly RICHARD H. HEVLY

Fou r coprolite s were exceveted with Burial S at Ventena Cave . a part ially mummified five-year-old child. Two coprolites were p1Ulular and dark. in cokx and two were fibrous and light in color . The coprolisn are remains of the child 's intestinal contents and were submitted for dietary andparasitological anal ysis. No parasites were found. The fibrous coprolites proved to be remains of high...

2012
M. H Ansari

In this paper, regarding accelerating development of mobile sensor nodes technology and increasing the utilization of them and alsothese networks are faced with security challenges; specially clone nodes attack, our focus is on exploiting optimum criteria of node clone intrusion detection procedures in mobile wireless sensor networks by using theoretical analysis of procedures. Since many of re...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید