Browse Title Index

Issue Title File
Vol 51, No 4 (2017) Robust CHARM: an efficient data hosting scheme for cloud data storage system
Thangapandiyan M., Rubesh Anand P.M.
Vol 50, No 3 (2016) Robust control design for uncertain objects with time delay on the state
Rustamov G.A.
Vol 51, No 5 (2017) Robust H2-PSS design based on LQG control optimized by genetic algorithms
Ghouraf D.E., Naceri A.
Vol 53, No 6 (2019) Robust Nonsingular Fast Terminal Sliding Mode Control in Trajectory Tracking for a Rigid Robotic Arm
Jouila A., Essounbouli N., Nouri K., Hamzaoui A.
Vol 53, No 7 (2019) Russian-Language Thesauri: Automatic Construction and Application for Natural Language Processing Tasks
Lagutina N.S., Lagutina K.V., Adrianov A.S., Paramonov I.V.
Vol 51, No 2 (2017) SABC-SBC: a hybrid ontology based image and webpage retrieval for datasets
Deepa C.
Vol 53, No 2 (2019) Sampling and Estimating the Waveform of Analog Signals Based on Precision Event Timing
Rybakov A.S.
Vol 51, No 3 (2017) Scene-specific pedestrian detection based on transfer learning and saliency detection for video surveillance
Xing W., Bai P., Zhang S., Bao P.
Vol 52, No 8 (2018) Security Analysis Based on Controlling Dependences of Network Traffic Parameters by Wavelet Transformation
Lavrova D.S., Alekseev I.V., Shtyrkina A.A.
Vol 53, No 1 (2019) Security Evaluation of a Brute-force Attack on a Cipher Using a Statistical Criterion for Plaintext
Babash A.V., Sizov V.A., Mikryukov A.A.
Vol 51, No 8 (2017) Security evaluation of a wireless ad-hoc network with dynamic topology
Kalinin M.O., Minin A.A.
Vol 53, No 8 (2019) Security Infrastructure of FANET Based on Secret Sharing and Authenticated Encryption
Shenets N.N.
Vol 52, No 8 (2018) Security of a Key System of a Fiscal Feature
Gorbatov V.S., Zhukov I.Y., Murashov O.N.
Vol 53, No 4 (2019) Security Protection of System Sharing Data with Improved CP-ABE Encryption Algorithm under Cloud Computing Environment
Shumin Xue ., Chengjuan Ren .
Vol 52, No 8 (2018) Security Provision in Wireless Sensor Networks on the Basis of the Trust Model
Ovasapyan T.D., Ivanov D.V.
Vol 53, No 5 (2019) Self-optimization of Handover Control Parameters for Mobility Management in 4G/5G Heterogeneous Networks
Abdulraqeb A., Mardeni R., Yusoff A.M., Ibraheem S., Saddam A.
Vol 52, No 7 (2018) Semantic Security Tools in Software-Defined Networks
Antoshina E.J., Chalyy D.J.
Vol 52, No 7 (2018) Semantics-Driven Migration of Java Programs: A Practical Application
Aleksyuk A.O., Itsykson V.M.
Vol 53, No 4 (2019) Sensor Fault Isolation in a Liquid Flow Process Using Kalman Filter
Nanditha Nair ., Santhosh K.V.
Vol 52, No 6 (2018) Separation of Reverberant Speech Based on Computational Auditory Scene Analysis
Hongyan L., Meng C., Yue W.
Vol 50, No 4 (2016) Services recommended trust algorithm based on cloud model attributes weighted clustering
Yu Z., Wang J., Zhang H., Niu K.
Vol 51, No 1 (2017) Shortwave spatial spectrum direction finding and positioning system based on software communication architecture
He Y., Zhang N.
Vol 51, No 8 (2017) Siamese neural network for intelligent information security control in multi-robot systems
Utkin L.V., Zaborovsky V.S., Popov S.G.
Vol 50, No 1 (2016) Solution of the problem of identifying structures of discrete stochastic objects based on the minimum posterior error criterion of distribution densities
Kucherenko P.A., Sokolov S.V.
Vol 52, No 7 (2018) Spatially Inhomogeneous Periodic Solutions in a Distributed Hutchinson’s Equation
Glyzin D.S., Kaschenko S.A., Polstyanov A.S.
376 - 400 of 466 Items << < 11 12 13 14 15 16 17 18 19 > >>