ترجمه ی Introduction to Modeling of Complex Systems Using Cellular Automata به همراه فایل word و فایل pdf Chapter 1Introduction to Modeling of Complex SystemsUsing Cellular AutomataAlfons G. Hoekstra, Jiˇ rí Kroc, and Peter M.A. Sloot“The real purpose of scientific method is to make sure Naturehasn’t misled you into thinking you know something you don’tactually know.”Robert M. PirsigZen and the Art of Motorcycle Maintenance, 1 ... دریافت فایل ...
• مقاله با عنوان: Discrete Size Optimization of Truss Structures Using Modified Honey Bee Mating Optimization Algorithm • نویسندگان: Hossein Sadri , Seied Hosein Afzali • محل انتشار: هشتمین کنگره ملی مهندسی عمران - دانشگاه صنعتی نوشیروانی بابل - 17 و 18 اردیبهشت 93 • محور: سازه های فولادی • فرمت فایل: PDF و شامل 8 صفحه به زبان انگلیسی میباشد. چکیــــده: Most structural engineering optimization problems that are used i ...
Title: An Efficient Novel Key management scheme using NchooseK algorithm for Wireless Sensor Networks Author(S) :Harjot Bawa1, Parminder Singh2 and Rakesh Kumar3 Journal/Conference Name: International Journal of Computer Networks & Communications (IJCNC) 4 :Volume Year: 2012 6:Issue Pages: all AbstractIn Wireless Sensor Networks Key Management is a very challenging phenomenon. This paper gives anillustration and demonstration of mathematical model of new key management sc ...
IOSR Journal of Computer Engineering (IOSR-JCE)e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 1, Ver. II (Jan. 2014), PP 75-79 Sara Aliabadi¹, Mehdi Agha Sarram¹ Abstract: Based on mobile nature in MANET, there is no doubt that all routing protocols have some route errors. Usually, routing protocols try to recover a route after a route error has been happened on an exact route to destination. This kind of route recovery could make more packet loss and also more time waste. This ...
Computer Standards & Interfaces 38 (2015) 44–50 0920-5489/© 2014 Elsevier B.V. All rights reserved.Contents lists available at ScienceDirectComputer Standards & Interfaces Scalable risk assessment method for cloud computing using gametheory (CCRAM)Evrim Furuncu, Ibrahim Sogukpinar a b s t r a c t Cloud computing is one of themost popular information processing concepts of today's ITworld. The security of thecloud computing is complicated because each servicemodel uses differen ...
مقاله SPE شماره 70035 ...