• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Science (General) Journas Latest Articles

Computer Science (General) Research Articles

The hphp-adaptive FEM based on continuous Sobolev embeddings: Isotropic refinements
Fulltext Access 15 Pages 2014
Flow in open C-shaped cavities: How far does the change in boundaries affect nanofluid?
Fulltext Access 15 Pages 2014
A 4D-sequencing approach for air traffic management
Fulltext Access 15 Pages 2014
Enhanced multi-Hoffmann heuristic for efficiently solving real-world assembly line balancing problems in automotive industry
Fulltext Access 15 Pages 2014
Approximation analysis of multi-class closed queueing maintenance networks with a parts inventory system and two-phase Coxian time distributions
Fulltext Access 15 Pages 2014
A Stackelberg hub arc location model for a competitive environment
Fulltext Access 15 Pages 2014
Recovery-to-optimality: A new two-stage approach to robustness with an application to aperiodic timetabling
Fulltext Access 15 Pages 2014
Benchmark tests based on the Couette viscometer—II: Thermo-elasto-plastic solid behaviour in small and large strains
Fulltext Access 15 Pages 2014
An efficient hybrid BEM–RBIE method for solving conjugate heat transfer problems
Fulltext Access 15 Pages 2014
Minmax robustness for multi-objective optimization problems
Fulltext Access 15 Pages 2014
DD-pullback attractor for a non-autonomous wave equation with additive noise on unbounded domains
Fulltext Access 15 Pages 2014
A solution of the parabolized Navier–Stokes stability model in discrete space by two-directional differential quadrature and application to swirl intense flows
Fulltext Access 15 Pages 2014
Anisotropic finite element approximation for a coupled continuum pipe-flow/Darcy model in Karst aquifers
Fulltext Access 15 Pages 2014
A gas-kinetic model for 2D transcritical shallow water flows propagating over dry bed
Fulltext Access 15 Pages 2014
Minimizing quadratic functions with semidefinite Hessian subject to bound constraints
Fulltext Access 15 Pages 2014
A DQEM for transverse vibration analysis of multiple cracked non-uniform Timoshenko beams with general boundary conditions
Fulltext Access 15 Pages 2014
On the expedited melting of phase change material (PCM) through dispersion of nanoparticles in the thermal storage unit
Fulltext Access 15 Pages 2014
On a two-grid finite element scheme combined with Crank–Nicolson method for the equations of motion arising in the Kelvin–Voigt model
Fulltext Access 15 Pages 2014
Measuring the Reputation in User-generated-content Systems Based on Health Information
Fulltext Access 15 Pages 2014
Application of Richardson extrapolation for multi-dimensional advection equations
Fulltext Access 15 Pages 2014
Low-rank approximations for computing observation impact in 4D-Var data assimilation
Fulltext Access 15 Pages 2014
A model-based method for computation of correlation dimension, Lyapunov exponents and synchronization from depth-EEG signals
Fulltext Access 15 Pages 2014
Maxsim2-Real-time interactive simulations for computer-assisted teaching of pharmacokinetics and pharmacodynamics
Fulltext Access 15 Pages 2014
Bilevel direct search method for leader-follower problems and application in health insurance
Fulltext Access 15 Pages 2014
Enhancing the performance of biogeography-based optimization using polyphyletic migration operator and orthogonal learning
Fulltext Access 15 Pages 2014
An interoperable and self-adaptive approach for SLA-based service virtualization in heterogeneous Cloud environments
Fulltext Access 15 Pages 2014
HP-DAEMON: High Performance Distributed Adaptive Energy-efficient Matrix-multiplicatiON
Fulltext Access 15 Pages 2014
Pattern analysis of a modified Leslie–Gower predator–prey model with Crowley–Martin functional response and diffusion
Fulltext Access 15 Pages 2014
Heuristic for a Real-life Truck and Trailer Routing Problem
Fulltext Access 15 Pages 2014
Context-aware adaptive and personalized mobile learning delivery supported by UoLmP
Fulltext Access 15 Pages 2014
arTenTen: Arabic Corpus and Word Sketches
Fulltext Access 15 Pages 2014
Strategic analysis of manufacturer-supplier partnerships: An ANP model for collaborative CO2 reduction management
Fulltext Access 15 Pages 2014
Sustainable SC through the complete reprocessing of end-of-life products by manufacturers: A traditional versus social responsibility company perspective
Fulltext Access 15 Pages 2014
Evaluation of cycle-count policies for supply chains with inventory inaccuracy and implications on RFID investments
Fulltext Access 15 Pages 2014
The relationship between exploration and exploitation strategies, manufacturing flexibility and organizational learning: An empirical comparison between Non-ISO and ISO certified firms
Fulltext Access 15 Pages 2014
Modified leakage-based transmit filter designs for multi-user MIMO systems
Fulltext Access 15 Pages 2014
Spectral and energy efficiency analysis of uplink heterogeneous networks with small-cells on edge
Fulltext Access 15 Pages 2014
A generalizable knowledge framework for semantic indoor mapping based on Markov logic networks and data driven MCMC
Fulltext Access 15 Pages 2014
COSHH: A classification and optimization based scheduler for heterogeneous Hadoop systems
Fulltext Access 15 Pages 2014
Automatic multiple sclerosis lesion detection in brain MRI by FLAIR thresholding
Fulltext Access 15 Pages 2014
A discrete Helmholtz decomposition with Morley finite element functions and the optimality of adaptive finite element schemes
Fulltext Access 15 Pages 2014
An optimization based domain decomposition method for PDEs with random inputs
Fulltext Access 15 Pages 2014
Gquest: Modeling patient questionnaires and administering them through a mobile platform application
Fulltext Access 15 Pages 2014
mNAFSA: A novel approach for optimization in dynamic environments with global changes
Fulltext Access 16 Pages 2014
QRB, QFS, and the Probabilistic Powerdomain
Fulltext Access 16 Pages 2014
Selecting green suppliers based on GSCM practices: Using fuzzy TOPSIS applied to a Brazilian electronics company
Fulltext Access 16 Pages 2014
MatchC: A Matching Logic Reachability Verifier Using the K Framework
Fulltext Access 16 Pages 2014
Vector LIDA
Fulltext Access 16 Pages 2014
Rewriting Semantics and Analysis of Concurrency Features for a C-like Language
Fulltext Access 16 Pages 2014
Parsing K definitions
Fulltext Access 16 Pages 2014
Towards a K Semantics for OCL
Fulltext Access 16 Pages 2014
Theoretical predictions and experimental validations on machining the Nimonic C-263 super alloy
Fulltext Access 16 Pages 2014
An artificial bee colony algorithm for image contrast enhancement
Fulltext Access 16 Pages 2014
Adaptive filtering of EEG/ERP through noise cancellers using an improved PSO algorithm
Fulltext Access 16 Pages 2014
A Duality Between Ω-categories and Algebraic Ω-categories
Fulltext Access 16 Pages 2014
Applicative Bisimilarities for Call-by-Name and Call-by-Value λμ-Calculus
Fulltext Access 16 Pages 2014
The implementation of IEEE 802.16m protocol module for ns-3 simulator
Fulltext Access 16 Pages 2014
An accurate model for simulating energetic behavior of PV grid connected inverters
Fulltext Access 16 Pages 2014
New trends in parallel and distributed simulation: From many-cores to Cloud Computing
Fulltext Access 16 Pages 2014
BiOSS: A system for biomedical ontology selection
Fulltext Access 16 Pages 2014
Non-deterministic Semantics in Polynomial Format
Fulltext Access 16 Pages 2014
Canonicity of Weak ω-groupoid Laws Using Parametricity Theory
Fulltext Access 16 Pages 2014
Stabilized explicit Runge-Kutta methods for multi-asset American options
Fulltext Access 16 Pages 2014
Spin-polarized transport in ferromagnetic multilayers: An unconditionally convergent FEM integrator
Fulltext Access 16 Pages 2014
Breast density classification to reduce false positives in CADe systems
Fulltext Access 16 Pages 2014
PPFSCADA: Privacy preserving framework for SCADA data publishing
Fulltext Access 16 Pages 2014
Anonymisation of personal data – A missed opportunity for the European Commission
Fulltext Access 16 Pages 2014
Russian PNR system: Data protection issues and global prospects
Fulltext Access 16 Pages 2014
Path-relinking Tabu search for the multi-objective flexible job shop scheduling problem
Fulltext Access 16 Pages 2014
Viscoelastic model based force control for soft tissue interaction and its application in physiological motion compensation
Fulltext Access 16 Pages 2014
Classification of normal and epileptic seizure EEG signals using wavelet transform, phase-space reconstruction, and Euclidean distance
Fulltext Access 16 Pages 2014
Identification of temporal variations in mental workload using locally-linear-embedding-based EEG feature reduction and support-vector-machine-based clustering and classification techniques
Fulltext Access 16 Pages 2014
Price–bandwidth dynamics for WSPs in heterogeneous wireless networks
Fulltext Access 16 Pages 2014
An adaptive multiphase approach for large unconditional and conditional p-median problems
Fulltext Access 16 Pages 2014
Efficient numerical solution of discrete multi-component Cahn–Hilliard systems
Fulltext Access 16 Pages 2014
Uniformly convergent additive finite difference schemes for singularly perturbed parabolic reaction–diffusion systems
Fulltext Access 16 Pages 2014
Backward induction algorithm for a class of closed-loop Stackelberg games
Fulltext Access 16 Pages 2014
Generalized solution sets of the interval generalized Sylvester matrix equation ∑i=1pAiXi+∑j=1qYjBj=C and some approaches for inner and outer estimations
Fulltext Access 17 Pages 2014
MARL-Ped: A multi-agent reinforcement learning based framework to simulate pedestrian groups
Fulltext Access 17 Pages 2014
Simulation analysis on patient visit efficiency of a typical VA primary care clinic with complex characteristics
Fulltext Access 17 Pages 2014
Dynamic spectrum access in LTE-advanced networks
Fulltext Access 17 Pages 2014
Analysis of the discontinuous Petrov–Galerkin method with optimal test functions for the Reissner–Mindlin plate bending model
Fulltext Access 17 Pages 2014
Population-based metaheuristics for continuous boundary-constrained dynamic multi-objective optimisation problems
Fulltext Access 17 Pages 2014
On a Graph Approach to Modal Logics
Fulltext Access 17 Pages 2014
An Approach to Generating Test Data for EFSM Paths Considering Condition Coverage
Fulltext Access 17 Pages 2014
Semantic-based QoS management in cloud systems: Current status and future challenges
Fulltext Access 17 Pages 2014
J-Calc: A Typed Lambda Calculus for Intuitionistic Justification Logic
Fulltext Access 17 Pages 2014
Parallel stochastic methods for PDE based grid generation
Fulltext Access 17 Pages 2014
Classification with cluster-based Bayesian multi-nets using Ant Colony Optimisation
Fulltext Access 17 Pages 2014
Flowshop scheduling with a general exponential learning effect
Fulltext Access 17 Pages 2014
On the machining induced residual stresses in IN718 nickel-based alloy: Experiments and predictions with finite element simulation
Fulltext Access 17 Pages 2014
Un-identical federate replication structure for improving performance of HLA-based simulations
Fulltext Access 17 Pages 2014
Analysis of a multi-server queueing model with MAP arrivals of regular customers and phase type arrivals of special customers
Fulltext Access 17 Pages 2014
Network aware performance evaluation of prefetching techniques in CMPs
Fulltext Access 17 Pages 2014
Telecommunications regulation: Creating order & opportunity in UK digital terrestrial television Whitespace
Fulltext Access 17 Pages 2014
The rule of law online: Treating data like the sale of goods: Lessons for the internet from OECD and CISG and sacking Google as the regulator
Fulltext Access 17 Pages 2014
MAC level Throughput comparison: 802.11ac vs. 802.11n
Fulltext Access 17 Pages 2014
4CaaSt marketplace: An advanced business environment for trading cloud services
Fulltext Access 17 Pages 2014
Terahertz band: Next frontier for wireless communications
Fulltext Access 17 Pages 2014
From porn to cybersecurity passing by copyright: How mass surveillance technologies are gaining legitimacy … The case of deep packet inspection technologies
Fulltext Access 17 Pages 2014
<< < 218 219 220 221 222 > >>
Related Topics
Genetic algorithm Articles
6327 Papers
Computer simulation Articles
3034 Papers
Productivity Articles
2777 Papers
Fuzzy logic Articles
2743 Papers
synchronization Articles
2257 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Automation Articles
1810 Papers
Cluster Articles
1655 Papers
Virtual reality Articles
1583 Papers
Robotics Articles
1524 Papers
Cloud computing Articles
1472 Papers
Fault detection Articles
1414 Papers
Social networks Articles
1409 Papers
survival analysis Articles
1353 Papers
CAM Articles
1272 Papers
Computer simulations Articles
1253 Papers
Computer vision Articles
1193 Papers
Privacy Articles
1165 Papers
Polymorphisms Articles
1155 Papers
Simulations Articles
1129 Papers
Information retrieval Articles
955 Papers
Scale-up Articles
840 Papers
Social network analysis Articles
712 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
ICT Articles
638 Papers
Multimedia Articles
618 Papers
Semantic web Articles
592 Papers
Computer-mediated communication Articles
569 Papers
Process simulation Articles
531 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
New Scientist Journal
Electronic Notes in Theoretical Computer Science Journal
Future Generation Computer Systems Journal
Physical Communication Journal
Applied Computing and Informatics Journal
Computer Law & Security Review Journal
Computer Methods and Programs in Biomedicine Journal
Computer Science Review Journal
Computers & Mathematics with Applications Journal
Computers & Operations Research Journal
Egyptian Informatics Journal Journal
Engineering Journal
Engineering Science and Technology, an International Journal Journal
European Journal of Operational Research Journal
Informatics in Medicine Unlocked Journal
Journal of the Egyptian Mathematical Society Journal
Journal of King Saud University - Computer and Information Sciences Journal
Karbala International Journal of Modern Science Journal
Operations Research Perspectives Journal
Procedia Computer Science Journal
Procedia Technology Journal
Simulation Modelling Practice and Theory Journal
Sustainable Computing: Informatics and Systems Journal
Swarm and Evolutionary Computation Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities