نتایج جستجو برای: Data Access Time
تعداد نتایج: 3990836 فیلتر نتایج به سال:
abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...
tourism , today as one of the ways to make money, create jobs , and social and political interactions is considered. this paper aims to examine the strengths and weaknesses of tourism development in mahmoud abad ( mazandaran ). the research method in this study is " descriptive - analytical " and to collection of data used field methods such as questionnaires and documentation - library. the sa...
the aim of this thesis is an approach for assessing insurer’s solvency for iranian insurance companies. we use of economic data with both time series and cross-sectional variation, thus by using the panel data model will survey the insurer solvency.
In this paper, we concentrate on data allocation methods for multiple wireless broadcast channels to reduce the average data access time. Existing works first sorted data by their access probabilities and allocate the partitions of the sorted data to the multiple wireless channels. They employ the Flat broadcast schedule for each channel to cyclically broadcast all the data items allocated to i...
one of the most important goals for increasing recognition and treatment revenue is transmitting vital data to medical care team, more quickly. nowadays, use of new technologies for transmitting data will deploy more and more daily. in this article, for transmitting electrocardiogram, first we code the signal into a suite of codes, then we will use bluetooth technology to transmit data from off...
0
An open ended list is a well known data structure in Prolog programs. It is frequently used to represent a value changing over time, while this value is referred to from several places in the data structure of the application. A weak point in this technique is that the time complexity is linear in the number of updates to the value represented by the open ended list. In this programming pearl w...
due to extraordinary large amount of information and daily sharp increasing claimant for ui benefits and because of serious constraint of financial barriers, the importance of handling fraud detection in order to discover, control and predict fraudulent claims is inevitable. we use the most appropriate data mining methodology, methods, techniques and tools to extract knowledge or insights from ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید