نتایج جستجو برای: utd

تعداد نتایج: 214  

2010
Haibin Yang Sunny Li Sun Mike W. Peng

Few scholars would dispute the argument that mergers and acquisitions (M&As) are different in China and the United States, but we know little about how they differ. This article reports one of the first studies that systematically compares and contrasts how M&As differ in these two countries. While prior research on M&As tends to emphasize economic and financial explanations while treating firm...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1378

در آنتن هایی که پلاریزاسیون در جهت موجبر مورد نظر است ، شکاف موازی بر روی دیواره باریک موجبر کاربردهای وسیعی دارد. ولی یکی از معایب این نوع شکاف ، ایجاد پلاریزاسیون متقابل می باشد. شکاف عرضی بر روی دیواره پهن موجبر نیز می تواند پلاریزاسیون در جهت موجبر ایجاد نماید. ولی در آرایه ای از شکافهای عرضی که بر روی موجبر ایجاد می شود، فاصله رزونانس بین شکافها، لبهای بزرگ شده را به وجود می آورد که این فا...

2008
Bhavani M. Thuraisingham

There has been much interest on using data mining for counter-terrorism and cyber security applications. For example, data mining can be used to detect unusual patterns, terrorist activities and fraudulent behavior. In addition data mining can also be sued for intrusion detection and malicious code detection. Our current research is focusing extensively on data mining for security applications ...

Journal: :Wireless Personal Communications 2013
Ali Tajvidy Mohammad Ali Pourmina Mohammad Naser-Moghadasi Afrooz Haghbin

i * Corresponding Author, A. Tajvidy is with the Department of Electrical Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran (e-mail: [email protected]). ii A. Ghorbani is with the Department of Electrical Engineering, Amirkabir University of Technology, Tehran, Iran (e-mail: [email protected]). iii M. Nasermoghaddasi is with the Department of Electrical Engin...

Journal: :Care: jurnal ilmiah ilmu kesehatan 2022

ABSTRACT The UTD PMI is the sole institution appointed by government to perform transfusion activities required provide high-quality services. can be stated as having services, not only based on adequate health technology but also need considered for customer and patient satisfaction. Patient satisfaction evaluate services quality. Health service defined an effort made human resources in a comp...

Journal: :Computer Standards & Interfaces 2012
Gregory S. Lee Bhavani M. Thuraisingham

a r t i c l e i n f o Researchers in telesurgical robotics and security collaborated to develop the Secure ITP, a security enhancement to the Interoperable Telesurgery Protocol (ITP). The ITP defines the structure for communication between telesurgery robots and controllers and has been adopted and tested by fourteen research groups in telesurgical robotics. The Secure ITP uses open source soft...

Journal: :CoRR 2014
Taher S. Mirzahasanloo

To my grandmother To my parents To my sisters, Fatemeh and Zahra and To my brothers, Nasser and Mansour v ACKNOWLEDGMENTS All the years of my PhD studies at The University of Texas at Dallas would not have been such a wonderful and enjoyable experience if it were not for all my amazing friends, colleagues, advisers and family that I have been very fortunate to always have around. I would not ha...

2014
Negar Bazargani John H. L. Hansen Nasser Kehtarnavaz Issa M. S. Panahi Aria Nosratinia

ACKNOWLEDGMENTS I would like to thank everyone who supported and helped me through the progress and completion of this dissertation. I would like to express my appreciation and special thanks to my advisor, Dr. Aria Nosratinia, for his continuous advice, guidance and support throughout my graduate studies at UTD. serving on my supervisory committee, for giving their precious time to read my dis...

2014
Murat Kantarcioglu

The integration of information dispersed among multiple repositories is a crucial step for accurate data analysis in various domains. In support of this goal, it is critical to devise procedures for identifying similar records across distinct data sources. At the same time, to adhere to privacy regulations and policies, such procedures should protect the confidentiality of the individuals to wh...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید