Мақалалар тізімі

Шығарылым Атауы Файл
Том 52, № 7 (2018) An Efficient Algorithm for Finding the Level of Useful Signals on Interpretation of Magnetic and Eddy Current Defectograms
Kuzmin E., Gorbunov O., Plotnikov P., Tyukin V.
Том 50, № 6 (2016) An image segmentation method using automatic threshold based on improved genetic selecting algorithm
Wang Z., Wang Y., Jiang L., Zhang C., Wang P.
Том 53, № 1 (2019) An Improved Generalized Fuzzy Model Based on Epanechnikov Quadratic Kernel and Its Application to Nonlinear System Identification
Zhang Qinli ., Chen Yu .
Том 53, № 3 (2019) An Improved Intra Block Copy Algorithm Based on Character Segmentation
Zhi Liu ., Zhang M., Dou S., An C.
Том 51, № 8 (2017) An ontological model of the domain of applications for the Internet of Things in analyzing information security
Lavrova D., Vasil’ev Y.
Том 53, № 8 (2019) Analysis of Approaches to Group Authentication in Large-Scale Industrial Systems
Aleksandrova E., Yarmak A., Kalinin M.
Том 52, № 1 (2018) Analysis of Cumulative Distribution Function of the Response Time in Cloud Computing Systems with Dynamic Scaling
Sopin E., Gorbunova A., Gaidamaka Y., Zaripova E.
Том 53, № 7 (2019) Analysis of Influence of Different Relations Types on the Quality of Thesaurus Application to Text Classification Problems
Lagutina N., Lagutina K., Shchitov I., Paramonov I.
Том 50, № 1 (2016) Analysis of quality-of-service metrics in IMS networks
Kulikov N.
Том 51, № 7 (2017) Analysis of Real-Time Applications Feasibility through Simulation
Baranov S., Nikiforov V.
Том 50, № 1 (2016) Analysis of the adaptive neural network router
Mikhailenko V., Solodovnik M.
Том 51, № 8 (2017) Analysis of the constructing principles and methodology for evaluating the security of shoulder-surfing resistant graphic passwords
Yakovlev V., Arkhipov V., Adadurov S.
Том 52, № 8 (2018) Analysis of the Information Security Threats in the Digital Production Networks
Dakhnovich A., Moskvin D., Zegzhda D.
Том 53, № 8 (2019) Analysis of the Security of UEFI BIOS Embedded Software in Modern Intel-Based Computers
Pankov I., Konoplev A., Chernov A.
Том 52, № 7 (2018) Analysis of Typed Inclusion Dependences with Null Values
Zykin V., Zykin S.
Том 51, № 7 (2017) Analytical Solutions for Nonlinear Convection–Diffusion Equations with Nonlinear Sources
Kudryashov N., Sinelshchikov D.
Том 52, № 8 (2018) Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security
Demidov R., Pechenkin A., Zegzhda P., Kalinin M.
Том 53, № 7 (2019) Application of a Genetic Algorithm for Finding Edit Distances between Process Models
Kalenkova A., Kolesnikov D.
Том 53, № 8 (2019) Application of an Artificial Neural Network for Detection of Attacks in VANETs
Malyshev E., Moskvin D., Zegzhda D.
Том 51, № 8 (2017) Application of clustering methods for analyzing the security of Android applications
Pavlenko E., Yarmak A., Moskvin D.
Том 51, № 7 (2017) Application of Colored Petri Nets for Verification of Scenario Control Structures in UCM Notation
Vizovitin N., Nepomniaschy V., Stenenko A.
Том 50, № 3 (2016) Application of computer image processing in office automation system
Zhang M.
Том 51, № 8 (2017) Application of convolutional neural networks for preventing information leakage in open internet resources
Zhukov D., Akimov D., Red’kin O., Los’ V.
Том 53, № 7 (2019) Application of Neural Networks for Recognizing Rail Structural Elements in Magnetic and Eddy Current Defectograms
Kuzmin E., Gorbunov O., Plotnikov P., Tyukin V., Bashkin V.
Том 50, № 7 (2016) Application of numerical optimization methods to molecular docking on graphics processing units
Farkov M., Legalov A.
Нәтижелер 466 - 51/75 << < 1 2 3 4 5 6 7 8 9 10 > >>