PDF
-پژوهش های علمی صنعتیhttp://security.irost.org/ebooks/Hacker's Guide.pdf۱۳۹۴/۵/۳۰ -
[19.04.2000 21:14:03] 15.4 Tools für die Analyse von Log-Dateien 15.5 Spezialisierte Protokollierungswerkzeuge 15.6 Zusammenfassung 16 Das Sicherheitsloch 16.1 Das...
PDF
-دانشگاه علامه طباطباییhttps://lpd.atu.ac.ir/uploads/winterschool2019.pdf۱۳۹۷/۱۲/۲۳ -
January 2019 Content and aims Qualitative data are notoriously difficult to analyse: invariably described as "voluminous, unstructured and unwieldy" (Bryman and Burgess...
PDF
Download this PDF filehttp://194.225.220.111/index.php/ijm2c/article/download/.../183۱۳۹۴/۸/۱۴ -
given by ≜ ߩଵ ߩଶ , where ߩ ≜ ߣߤሺ݆ ൌ 1, 2ሻ. To analysed the system contents at the beginning of start slots, i.e., slots at the beginning of which a service of...
PDF
انتشارات خط اول-(pdf)http://khate-aval.com/papers/3-AQM2013.pdf۱۳۹۴/۹/۲۴ -
we provide a brief overview of AQM and its motivation for use. In Section V we discuss the RED algorithm and the various analyses conducted with regard to its performance.
PDF
Download this PDF filehttp://www.acsij.org/acsij/article/download/481/379۱۳۹۵/۱۰/۳ -
The requirement process ensures that the set of the requirements collected is correct, it is completed as it is expected and also it is consistent . While...
PDF
Download this PDF filehttp://www.jallr.com/index.php/JALLR/article/download/.../pdf40...۱۳۹۶/۱/۸ -
An error analysis study also attempts to analyse errors committed by the learners in relation to the target language (Corder, 1971). In English language...
PDF
DownloadFile-دانشگاه صنعتی شریفhttp://sharif.edu/~mbzadeh/Publications/.../ICA2001.pdf۱۳۹۵/۱۰/۳ -
Source separation in convolutive mixtures has been ad- dressed by a few authors [2, 3, 4, 5, 6, 7, 8]. In that case, mixing and separating matrices can be modeled...