مرور Volume 8, Issue 2 بر اساس موضوع
در حال نمایش موارد 1 - 20 از 21
| موضوع |
|---|
| accuracy [1] |
| Background subtraction [1] |
| Black Hole Attack [1] |
| cold start [1] |
| coverage [1] |
| Cuckoo Search Optimization algorithm [1] |
| Extractive method [1] |
| Intrusion Detection Systems [1] |
| Mobile Ad Hoc Networks [1] |
| multi-view clustering [1] |
| NS-2 Simulation [1] |
| Optimal Control [1] |
| real-time platform [1] |
| Riccati Equation [1] |
| Segway Personal Transporter [1] |
| State Feedback controller [1] |
| styling [1] |
| Text summarization [1] |
| trust-aware recommender system [1] |
| video processing [1] |



