نتایج جستجو برای: access and evaluation
تعداد نتایج: 17019593 فیلتر نتایج به سال:
introruction khawf in(iran)-herat and mazaresharif and shirkhan bandar in (afghanistan)-dushanbe in (tajikistan)_(kirgizstan)-kashghar in(china) project railway network is under construction that it is as a significant corridor for revitalizing silk road corridor in the region .at the present there are three different gauge in the region central asia with 1,520 mm gauge and turkey-islamic repu...
In the new era of wireless, mobile connectivity the possibilities of anything, anytime, anywhere access are becoming a reality. In order to deliver services and content to users in a variety of contexts, content adaptation strategies need to be developed and assessed. In this paper we present an approach to performance evaluation and capacity planning, based on a high-level system description f...
We consider the problem of efficiently finding the top-k answers for join queries over web-accessible databases. Classical algorithms for finding top-k answers use branch-and-bound techniques to avoid computing scores of all candidates in identifying the top-k answers. To be able to apply such techniques, it is critical to efficiently compute (lower and upper) bounds and expected scores of cand...
Aim of Study: Assess quality of diabetes care defined by consensus guidelines of ISPAD in our area; develop appropriate strategies to improve care. Design: Retrospective chart review of all individuals with IDDM diagnosis before spring 1997 followed regularly by us (either outpatient clinic or office). Method: Comparison of number of patients having had: (1) eye exam by ophthalmologist; (2) det...
This paper analyzes the suitability of fuzzy clustering methods for the discovery of relevant document relationships, motivated by the need for enhanced relevancebased navigation of Web-accessible resources. The performance evaluation of a modified Fuzzy c-Means algorithm is carried out, and a comparison with a traditional hard clustering technique is presented. Clustering precision and recall ...
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید