| Issue |
Title |
File |
| Vol 52, No 4 (2018) |
The Effect of Inaccuracy of Digital-to-Analog Conversion on Properties of the Up-and-Down Method for Digital Signal Processing |
|
|
Plocins V.
|
| Vol 51, No 6 (2017) |
The effect of presynaptic inhibition in switching neurostructures |
|
|
Sychev A.N.
|
| Vol 52, No 7 (2018) |
The Impulse-Refractive Mode in a Neural Network with Ring Synaptic Interaction |
|
|
Preobrazhenskaia M.M.
|
| Vol 52, No 7 (2018) |
The Kuramoto–Sivashinsky Equation. A Local Attractor Filled with Unstable Periodic Solutions |
|
|
Kulikov A.N., Kulikov D.A.
|
| Vol 52, No 2 (2018) |
The Nash Equilibrium Point of Dynamic Games Using Evolutionary Algorithms in Linear Dynamics and Quadratic System |
|
|
Rezaee A.
|
| Vol 50, No 7 (2016) |
The problem of finding the maximum multiple flow in the divisible network and its special cases |
|
|
Smirnov A.V.
|
| Vol 52, No 8 (2018) |
The Problem of Innovative Development of Information Security Systems in the Transport Sector |
|
|
Anisimov V.G., Anisimov E.G., Zegzhda P.D., Suprun A.F.
|
| Vol 52, No 4 (2018) |
The Relationship between Transport Wireless Network Throughput and Vehicle Speed |
|
|
Ancans A., Petersons E.
|
| Vol 52, No 7 (2018) |
The Shortest Path Problem for a Multiple Graph |
|
|
Smirnov A.V.
|
| Vol 52, No 7 (2018) |
The Spanning Tree of a Divisible Multiple Graph |
|
|
Smirnov A.V.
|
| Vol 51, No 8 (2017) |
The task of building a trusted computing environment on the Intel hardware platform |
|
|
Chernov A.Y., Konoplev A.S., Reshetov D.V.
|
| Vol 52, No 8 (2018) |
The Use of Adjacency Series for Recognition of Prefractal Graphs in Assessing VANET Cybersecurity |
|
|
Zegzhda P.D., Ivanov D.V., Moskvin D.A., Ivanov A.A.
|
| Vol 51, No 8 (2017) |
The use of an artificial neural network to detect automatically managed accounts in social networks |
|
|
Zegzhda P.D., Malyshev E.V., Pavlenko E.Y.
|
| Vol 50, No 6 (2016) |
The use of asynchronous sigma-delta modulation in analog-signal sampling based on event-timing techniques |
|
|
Rybakov A.S.
|
| Vol 52, No 6 (2018) |
Theoretical Design of Band Pass Filter Utilizing Long Period Fiber Grating Having Cladding Refractive Index Perturbation |
|
|
Shen J., Ji Q., Zhang Y., Ruan X., Cai Z., Li Z.
|
| Vol 52, No 8 (2018) |
Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model |
|
|
Demidov R.A., Zegzhda P.D., Kalinin M.O.
|
| Vol 50, No 8 (2016) |
Token scanning as a new scientific approach in the creation of protected systems: A new generation OS MICROTEK |
|
|
Molyakov A.S.
|
| Vol 50, No 6 (2016) |
Tolerance limits on order statistics in future samples coming from the Pareto distribution |
|
|
Nechval N.A., Nechval K.N., Prisyazhnyuk S.P., Strelchonok V.F.
|
| Vol 53, No 3 (2019) |
Traffic Operation Data Analysis and Information Processing Based on Data Mining |
|
|
Zhihuang Jiang .
|
| Vol 53, No 3 (2019) |
Trellis-Based Postprocessing for Short Delay Measurement Using NDFT |
|
|
Karel Dudáček ., Karel Dudáček .
|
| Vol 50, No 8 (2016) |
Tripartite outsoursing key-agreement protocol on bilinear pairings |
|
|
Aleksandrova E.B., Shkorkina E.N.
|
| Vol 52, No 1 (2018) |
Two-Modulus Codes with Summation of On-Data Bits for Technical Diagnostics of Discrete Systems |
|
|
Efanov D.V., Sapozhnikov V.V., Sapozhnikov V.V.
|
| Vol 51, No 7 (2017) |
Two-Wave Interactions in the Fermi–Pasta–Ulam Model |
|
|
Glyzin S.D., Kashchenko S.A., Tolbey A.O.
|
| Vol 51, No 2 (2017) |
Ultrasonic elastography optimization algorithm based on coded excitation and spatial compounding |
|
|
Zhang Z., Li L., Liu H.
|
| Vol 53, No 8 (2019) |
Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems |
|
|
Zaitseva E.A., Zegzhda D.P., Poltavtseva M.A.
|
| 426 - 450 of 466 Items |
<< < 13 14 15 16 17 18 19 > >> |