نتایج جستجو برای: dependent with classic approach
تعداد نتایج: 9892299 فیلتر نتایج به سال:
bekenstein and hawking by introducing temperature and every black hole has entropy and using the first law of thermodynamic for black holes showed that this entropy changes with the event horizon surface. bekenstein and hawking entropy equation is valid for the black holes obeying einstein general relativity theory. however, from one side einstein relativity in some cases fails to explain expe...
review. However, peer review has limitations in evaluating research papers. In this paper, Scienstein and the new idea of " collaborative document evaluation " are presented. Scienstein is a project to evaluate scientific papers collaboratively based on ratings, links, annotations and classifications by the scientific community using the internet. In this paper, critical success factors of coll...
Every year the Swedish Institute for Computer Science (SICS) holds the Trading Agent Competition (TAC). Although the specifications of the competition vary from year to year, the classic game is continually maintained. In this paper, I present a search-based approach to playing the TAC Classic game. I will show the background of the game and present the rules of TAC classic, review the state of...
The separated electromagnetic responses RL(q, ω) and RT (q, ω) for inclusive electron scattering off nuclei are studied within a functional scheme.
Nowadays, by successful application of on time production concept in other concepts like production management and storage, the need to complete the processing of jobs in their delivery time is considered a key issue in industrial environments. Unrelated parallel machines scheduling is a general mood of classic problems of parallel machines. In some of the applications of unrelated parallel mac...
due to extraordinary large amount of information and daily sharp increasing claimant for ui benefits and because of serious constraint of financial barriers, the importance of handling fraud detection in order to discover, control and predict fraudulent claims is inevitable. we use the most appropriate data mining methodology, methods, techniques and tools to extract knowledge or insights from ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید