Issue |
Title |
File |
Vol 50, No 2 (2016) |
Overview of 3D printing technologies for reverse engineering product design |
(Eng)
|
Zhang J., Yu Z.
|
Vol 50, No 2 (2016) |
Research on the security mechanism of cloud computing service model |
(Eng)
|
Zhang Y.
|
Vol 50, No 2 (2016) |
A reservoir radial-basis function neural network in prediction tasks |
(Eng)
|
Tyshchenko O.K.
|
Vol 50, No 2 (2016) |
Backstepping control with speed estimation of PMSM based on MRAS |
(Eng)
|
Liu X., Zhang G., Mei L., Wang D.
|
Vol 50, No 2 (2016) |
Digital watermark and fingerprint in variable rank linear-feedback shift register |
(Eng)
|
Sergeichik V.V., Ivaniuk A.A.
|
Vol 50, No 1 (2016) |
Comparative study for feature selection algorithms in intrusion detection system |
(Eng)
|
Anusha K., Sathiyamoorthy E.
|
Vol 50, No 1 (2016) |
Influence of Bloch inductance on the time resolution of balanced comparators based on small Josephson junctions |
(Eng)
|
Askerzade I.N.
|
Vol 50, No 1 (2016) |
Calculation of flicker noise power |
(Eng)
|
Kolodiy Z.A., Mandziy B.A.
|
Vol 50, No 1 (2016) |
Influence of thermal hysteresis on distortions of zero line at various comparator type equivalent time signal conversion methods |
(Eng)
|
Krumin’sh K., Peterson V., Plotsin’sh V.
|
Vol 50, No 1 (2016) |
Solution of the problem of identifying structures of discrete stochastic objects based on the minimum posterior error criterion of distribution densities |
(Eng)
|
Kucherenko P.A., Sokolov S.V.
|
Vol 50, No 1 (2016) |
Analysis of quality-of-service metrics in IMS networks |
(Eng)
|
Kulikov N.
|
Vol 50, No 1 (2016) |
A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructures |
(Eng)
|
Tesfahun A., Bhaskari D.L.
|
Vol 50, No 1 (2016) |
Analysis of the adaptive neural network router |
(Eng)
|
Mikhailenko V.S., Solodovnik M.S.
|
451 - 463 of 463 Items |
<< < 14 15 16 17 18 19
|