نتایج جستجو برای: network aanalysis

تعداد نتایج: 672094  

Journal: :journal of sciences, islamic republic of iran 2010
p panahi

ad hoc networks are multi-hop wireless networks without a pre-installed infrastructure. such networks are widely used in military applications and in emergency situations as they permit the establishment of a communication network at very short notice with a very low cost. video is very sensitive for packet loss and wireless ad-hoc networks are error prone due to node mobility and weak links. h...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده مدیریت و اقتصاد 1394

در این پژوهش یک مدل sbm شبکه ای معرفی شد که در آن کارآیی کل سیستم برابر میانگین موزون کارآیی های بخش ها است. مزیت عمده مدل پیشنهادی، توانایی آن در ارائه معیارهای مناسب تر کارآیی، محاسبه وزن تمام بخش ها توسط مدل و ارزیابی هم زمان متغیرهای میانجی به عنوان ورودی و هم خروجی می باشد. بنابراین ضمن استفاده از رویکرد مدیریت مبتنی بر نتایج (rbm) برای باز شدن جعبه سیاه و سطح بندی نتایج، مدل جامع اندازه گ...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده هنر 1391

پارک ها و فضاهای سبز شهری عناصر جدایی ناپذیر شهرهای امروزی هستند زیرا از طرفی ریه های تنفسی شهر به حساب آمده و در تلطیف هوا نقش موثری دارند و از طرفی دیگر باعت افزایش جذابیت فضاهای سبز شهری شده و آن را تبدیل به مکانی برای تجدید قوای روحی کرده و بنیه گردشگری شهر را تقویت می بخشد. امرزوه پژوهشگران شهری به دلیل خصایص مذکور فضاهای شهر، این عامل را به عنوان یکی از معیارهای توسعه پایدار شهری تلقی نمو...

Journal: :تحقیقات بازاریابی نوین 0
adeleh asemi ali alibeigi abubakar munir asefeh asemi

regulations of use of social networks, as one of the key components in these networks, serve an important role in controlling the flow of traffic. the study of the harmonization of these terms and regulations can be a significant step to avoid congestion and (users’) rejection in the network. harmonization of traffic control regulations (tcr) among social networks is one of the best solutions...

Journal: :molecular biology research communications 2015
sholeh ghorbani mojtaba tahmoorespur ali masoudi-nejad mohammad reza nasiri yazdan asgari

understanding cattle metabolism and its relationship with milk products is important in bovine breeding. a systemic view could lead to consequences that will result in a better understanding of existing concepts. topological indices and quantitative characterizations mostly result from the application of graph theory on biological data. in the present work, the enzyme network involved in cattle...

Hassan Sabzehali Majid Sarvi,

Current network modeling practices usually assess the network performance at specified time interval, i.e. every 5 or 10 years time horizon. Furthermore, they are usually based on partially predictable data, which are being generated through various stochastic procedures. In this research, a new quantitative based methodology which combines combinatorial optimization modeling and transportation...

Journal: :مهندسی صنایع 0
محمدجعفر تارخ دانشیار دانشکده صنایع - دانشگاه خواجه نصیرالدین توسی مهسا اسمعیلی گوکه دانشجوی کارشناسی ارشد it- دانشکده صنایع دانشگاه خواجه نصیرالدین توسی شهره ترابی دانشجوی کارشناسی ارشد مهندسی صنایع – دانشگاه پیام نور تهران

the environmental rules of reverse logistic networks have caused important economic growth in the past decades. to integrate forward logistic networks with reverse logistics networks a helpful method is to design both networks simultaneously. considering more retrieval choices in modeling reverse logistic systems can be very critical. this article contains a mixed integer linear programming mod...

Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...

As mobile data traffic increases, and the number of services provided by the mobile network increases, service load flows as well, which requires changing in the principles, models, and strategies for media transmission streams serving to guarantee the given nature of giving a wide scope of services in Flexible and cost-effective. Right now, the fundamental question remains what number of netwo...

Elnaz Bigdeli Manouchehr Zaker Maryam Rahmaninia

Network environments always can be invaded by intruder agents. In networks where nodes are performing some computations, intruder agents might contaminate some nodes. Therefore, problem of decontaminating a network infected by intruder agents is one of the major problems in these networks. In this paper, we present a distributed asynchronous local algorithm for decontaminating a network. In mos...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید