61. A first course in fuzzy logic
Author: Nguyen, Hung T.
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Neural networks )Computer science( , Fuzzy logic
Classification :
QA
76
.
87
.
N497
1997
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
62. A first course in fuzzy logic
Author: Nguyen, Hung T.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Neural networks )Computer science(,، Fuzzy logic
Classification :
QA
76
.
87
.
N497
2000
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
63. A first course in fuzzy logic
Author: Nguyen, Hung T.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Textbooks ، Neural networks )Computer science(,Textbooks ، Fuzzy logic
Classification :
QA
76
.
87
.
N497
2006
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
64. A first course in fuzzy logic
Author: Nguyen, Hung T., 4491-
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Neural networks )Computer science(,، Fuzzy logic
Classification :
QA
76
.
87
.
N493F5
2019
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
65. A first course in fuzzy logic
Author: / Hung T. Nguyen, Elbert A. Walker
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Neural networks (Computer science)- Textbooks,Fuzzy logic- Textbooks
Classification :
QA76
.
87
.
N497
2006
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
66. A game- and decision-theoretic approach to resilient interdependent network analysis and design /
Author: Juntao Chen and Quanyan Zhu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Cyberinfrastructure.,Game theory.,Computer networks.,Cyberinfrastructure.,Game theory.
Classification :
QA76
.
9
.
C92
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
67. A geometric approach to the unification of symbolic structures and neural networks
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Neural networks (Computer science) ;
![](/design/images/bookmore.png)
68. A graph-theoretic approach to enterprise network dynamics
Author: Horst Bunke ... ]et al.[
Library: Library of College of Science University of Tehran (Tehran)
Subject: Mathematical models ، Local area networks )Computer networks(,، Local area networks )Computer networks(,Communication systems ، Business enterprises,، Graph theory -- Data processing
Classification :
TK
5105
.
7
.
G735
2007
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
69. A graph-theoretic approach to enterprise network dynamics
Author: \ Horst Bunke ... [et al.]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Local area networks (Computer networks)-- Mathematical models.,Local area networks (Computer networks),Business enterprises-- Communication systems.,Graph theory-- Data processing.,شبکههای محلی -- الگوهای ریاضی
Classification :
TK5105
.
7
.
G735
2007
E-
Book
,
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
70. A graph-theoretic approach to enterprise network dynamics /
Author: Horst Bunke [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Communication systems.,Graph theory-- Data processing.,Local area networks (Computer networks),Local area networks (Computer networks)-- Mathematical models.,Business enterprises-- Communication systems.,COMPUTERS-- Data Transmission Systems-- Broadband.,COMPUTERS-- Data Transmission Systems-- Wireless.,COMPUTERS-- Networking-- Local Area Networks (LANs),Graph theory-- Data processing.,Informatique.,Local area networks (Computer networks),Local area networks (Computer networks)-- Mathematical models.
Classification :
TK5105
.
7
.
G735
2007eb
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
71. A graph-theoretic approach to enterprise network dynamics
Author: Horst Bunke... ]et al.[
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Mathematical models ، Local area networks )Computer networks(,، Local area networks )Computer networks(,Communication systems ، Business enterprises,Data processing ، Graph theory
Classification :
TK
5105
.
7
.
G726
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
72. A graph-theoretic approach to enterprise network dynamics
Author: / Horst Bunke ... [et al.]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Local area networks (Computer networks)--Mathematical models,Local area networks (Computer networks),Business enterprises--Communication systems,Graph theory--Data processing
Classification :
TK
,
5105
.
7
,.
G735
,
2007
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
73. A guide to NetWare 5.0: network administrator
Author: Doering, David.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، NetWare )Computer file(,Management ، Local area networks )Computer networks(,Examinations -- Study guides ، Local area networks )Computer networks(
Classification :
TK
5105
.
7
.
D64
2000
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
74. A guide to computer network securit
Author: / Joseph Migga Kizza
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures
Classification :
TK
,
5105
.
59
,.
K584
,
2009
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
75. A guide to computer network security
Author: Kizza, Joseph Migga
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer networks-- Security measures
Classification :
TK
5105
.
59
.
K59
2009
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
76. A guide to computer network security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ;
![](/design/images/bookmore.png)
77. A guide to designing and implementing local and wide area networks
Author: / Micheal J. Palmer and Bruce Sinclair
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Wide area networks (Computer networks),Local area networks (Computer networks)
Classification :
TK
5105
.
7
.
P277
1999
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
78. A guide to designing and implementing local and wide area networks
Author: Palmer, Michael J.
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Wide area networks )Computer networks(,، Local area networks )Computer networks(
Classification :
TK
5105
.
7
.
P277
1999
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
79. A guide to finding quality information on the Internet: selection and evaluation strategies
Author: Cooke, Alison
Library: Central Library of Agricultural (Tehran)
Subject: $AInternet )Computer network(,$AInformation retrieval,$ALibrary information networks
Classification :
Z
699
.
C66
1999
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
80. A guide to netware for NUIX
Author: / Cathy Gunn
Library: Central library of medical university of Isfahan (Esfahan)
Subject: Netware (computer file),UNIX ( computer file),Local area networks (computer networks)- Management
Classification :
TK5105
.
7
.
G8
1995
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)