نتایج جستجو برای: network aanalysis
تعداد نتایج: 672094 فیلتر نتایج به سال:
In this paper we propose to use ICA as a dimension reduction technique for microarray data. All microarray studies present a dimensionality challenge to the researcher: the number of dimensions (genes/spots on the microarray) is many times larger than the number of samples, or arrays. Any subsequent analysis must deal with this dimensionality problem by either reducing the dimension of the data...
Objective: This study was done to evaluate the changes in vascularised free fibula graft for mandible reconstruction with respect to height of fibula graft and bony union at the ends of graft and osteotomy sites. Methods: A follow up study was conduted with 5 cases of mandibular resection due to aggressive benign tumor and reconstruction with vascularised free fibula flap. Changes in bone heigh...
شبکه های خودرویی موردی (vehicular ad hoc network) نوعی از شبکه های موردی اند که برای ارتباط بی سیم میان خودروها طراحی شده اند. این شبکه ها زیر مجموعه ای شبکه های موردی متحرک (mobile ad hoc network) محسوب می شوند، اما به دلیل وجود مشخصات منحصر به فرد در شبکه های خودرویی مانند تغییر سریع همبندی، تحرک و سرعت بالای خودروها احتمال ایجاد انفصال در آن بسیار بالا است، بنابراین نیاز به طراحی پروتکل های ...
Fou r coprolite s were exceveted with Burial S at Ventena Cave . a part ially mummified five-year-old child. Two coprolites were p1Ulular and dark. in cokx and two were fibrous and light in color . The coprolisn are remains of the child 's intestinal contents and were submitted for dietary andparasitological anal ysis. No parasites were found. The fibrous coprolites proved to be remains of high...
Classification and Aanalysis of clone attack detection procedures in mobile wireless sensor networks
In this paper, regarding accelerating development of mobile sensor nodes technology and increasing the utilization of them and alsothese networks are faced with security challenges; specially clone nodes attack, our focus is on exploiting optimum criteria of node clone intrusion detection procedures in mobile wireless sensor networks by using theoretical analysis of procedures. Since many of re...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید