Issue |
Title |
File |
Vol 51, No 4 (2017) |
Robust CHARM: an efficient data hosting scheme for cloud data storage system |
|
Thangapandiyan M., Rubesh Anand P.M.
|
Vol 50, No 3 (2016) |
Robust control design for uncertain objects with time delay on the state |
|
Rustamov G.A.
|
Vol 51, No 5 (2017) |
Robust H2-PSS design based on LQG control optimized by genetic algorithms |
|
Ghouraf D.E., Naceri A.
|
Vol 53, No 6 (2019) |
Robust Nonsingular Fast Terminal Sliding Mode Control in Trajectory Tracking for a Rigid Robotic Arm |
|
Jouila A., Essounbouli N., Nouri K., Hamzaoui A.
|
Vol 53, No 7 (2019) |
Russian-Language Thesauri: Automatic Construction and Application for Natural Language Processing Tasks |
|
Lagutina N.S., Lagutina K.V., Adrianov A.S., Paramonov I.V.
|
Vol 51, No 2 (2017) |
SABC-SBC: a hybrid ontology based image and webpage retrieval for datasets |
|
Deepa C.
|
Vol 53, No 2 (2019) |
Sampling and Estimating the Waveform of Analog Signals Based on Precision Event Timing |
|
Rybakov A.S.
|
Vol 51, No 3 (2017) |
Scene-specific pedestrian detection based on transfer learning and saliency detection for video surveillance |
|
Xing W., Bai P., Zhang S., Bao P.
|
Vol 52, No 8 (2018) |
Security Analysis Based on Controlling Dependences of Network Traffic Parameters by Wavelet Transformation |
|
Lavrova D.S., Alekseev I.V., Shtyrkina A.A.
|
Vol 53, No 1 (2019) |
Security Evaluation of a Brute-force Attack on a Cipher Using a Statistical Criterion for Plaintext |
|
Babash A.V., Sizov V.A., Mikryukov A.A.
|
Vol 51, No 8 (2017) |
Security evaluation of a wireless ad-hoc network with dynamic topology |
|
Kalinin M.O., Minin A.A.
|
Vol 53, No 8 (2019) |
Security Infrastructure of FANET Based on Secret Sharing and Authenticated Encryption |
|
Shenets N.N.
|
Vol 52, No 8 (2018) |
Security of a Key System of a Fiscal Feature |
|
Gorbatov V.S., Zhukov I.Y., Murashov O.N.
|
Vol 53, No 4 (2019) |
Security Protection of System Sharing Data with Improved CP-ABE Encryption Algorithm under Cloud Computing Environment |
|
Shumin Xue ., Chengjuan Ren .
|
Vol 52, No 8 (2018) |
Security Provision in Wireless Sensor Networks on the Basis of the Trust Model |
|
Ovasapyan T.D., Ivanov D.V.
|
Vol 53, No 5 (2019) |
Self-optimization of Handover Control Parameters for Mobility Management in 4G/5G Heterogeneous Networks |
|
Abdulraqeb A., Mardeni R., Yusoff A.M., Ibraheem S., Saddam A.
|
Vol 52, No 7 (2018) |
Semantic Security Tools in Software-Defined Networks |
|
Antoshina E.J., Chalyy D.J.
|
Vol 52, No 7 (2018) |
Semantics-Driven Migration of Java Programs: A Practical Application |
|
Aleksyuk A.O., Itsykson V.M.
|
Vol 53, No 4 (2019) |
Sensor Fault Isolation in a Liquid Flow Process Using Kalman Filter |
|
Nanditha Nair ., Santhosh K.V.
|
Vol 52, No 6 (2018) |
Separation of Reverberant Speech Based on Computational Auditory Scene Analysis |
|
Hongyan L., Meng C., Yue W.
|
Vol 50, No 4 (2016) |
Services recommended trust algorithm based on cloud model attributes weighted clustering |
|
Yu Z., Wang J., Zhang H., Niu K.
|
Vol 51, No 1 (2017) |
Shortwave spatial spectrum direction finding and positioning system based on software communication architecture |
|
He Y., Zhang N.
|
Vol 51, No 8 (2017) |
Siamese neural network for intelligent information security control in multi-robot systems |
|
Utkin L.V., Zaborovsky V.S., Popov S.G.
|
Vol 50, No 1 (2016) |
Solution of the problem of identifying structures of discrete stochastic objects based on the minimum posterior error criterion of distribution densities |
|
Kucherenko P.A., Sokolov S.V.
|
Vol 52, No 7 (2018) |
Spatially Inhomogeneous Periodic Solutions in a Distributed Hutchinson’s Equation |
|
Glyzin D.S., Kaschenko S.A., Polstyanov A.S.
|
376 - 400 of 466 Items |
<< < 11 12 13 14 15 16 17 18 19 > >> |