| Шығарылым |
Атауы |
Файл |
| Том 52, № 7 (2018) |
An Efficient Algorithm for Finding the Level of Useful Signals on Interpretation of Magnetic and Eddy Current Defectograms |
|
|
Kuzmin E., Gorbunov O., Plotnikov P., Tyukin V.
|
| Том 50, № 6 (2016) |
An image segmentation method using automatic threshold based on improved genetic selecting algorithm |
|
|
Wang Z., Wang Y., Jiang L., Zhang C., Wang P.
|
| Том 53, № 1 (2019) |
An Improved Generalized Fuzzy Model Based on Epanechnikov Quadratic Kernel and Its Application to Nonlinear System Identification |
|
|
Zhang Qinli ., Chen Yu .
|
| Том 53, № 3 (2019) |
An Improved Intra Block Copy Algorithm Based on Character Segmentation |
|
|
Zhi Liu ., Zhang M., Dou S., An C.
|
| Том 51, № 8 (2017) |
An ontological model of the domain of applications for the Internet of Things in analyzing information security |
|
|
Lavrova D., Vasil’ev Y.
|
| Том 53, № 8 (2019) |
Analysis of Approaches to Group Authentication in Large-Scale Industrial Systems |
|
|
Aleksandrova E., Yarmak A., Kalinin M.
|
| Том 52, № 1 (2018) |
Analysis of Cumulative Distribution Function of the Response Time in Cloud Computing Systems with Dynamic Scaling |
|
|
Sopin E., Gorbunova A., Gaidamaka Y., Zaripova E.
|
| Том 53, № 7 (2019) |
Analysis of Influence of Different Relations Types on the Quality of Thesaurus Application to Text Classification Problems |
|
|
Lagutina N., Lagutina K., Shchitov I., Paramonov I.
|
| Том 50, № 1 (2016) |
Analysis of quality-of-service metrics in IMS networks |
|
|
Kulikov N.
|
| Том 51, № 7 (2017) |
Analysis of Real-Time Applications Feasibility through Simulation |
|
|
Baranov S., Nikiforov V.
|
| Том 50, № 1 (2016) |
Analysis of the adaptive neural network router |
|
|
Mikhailenko V., Solodovnik M.
|
| Том 51, № 8 (2017) |
Analysis of the constructing principles and methodology for evaluating the security of shoulder-surfing resistant graphic passwords |
|
|
Yakovlev V., Arkhipov V., Adadurov S.
|
| Том 52, № 8 (2018) |
Analysis of the Information Security Threats in the Digital Production Networks |
|
|
Dakhnovich A., Moskvin D., Zegzhda D.
|
| Том 53, № 8 (2019) |
Analysis of the Security of UEFI BIOS Embedded Software in Modern Intel-Based Computers |
|
|
Pankov I., Konoplev A., Chernov A.
|
| Том 52, № 7 (2018) |
Analysis of Typed Inclusion Dependences with Null Values |
|
|
Zykin V., Zykin S.
|
| Том 51, № 7 (2017) |
Analytical Solutions for Nonlinear Convection–Diffusion Equations with Nonlinear Sources |
|
|
Kudryashov N., Sinelshchikov D.
|
| Том 52, № 8 (2018) |
Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security |
|
|
Demidov R., Pechenkin A., Zegzhda P., Kalinin M.
|
| Том 53, № 7 (2019) |
Application of a Genetic Algorithm for Finding Edit Distances between Process Models |
|
|
Kalenkova A., Kolesnikov D.
|
| Том 53, № 8 (2019) |
Application of an Artificial Neural Network for Detection of Attacks in VANETs |
|
|
Malyshev E., Moskvin D., Zegzhda D.
|
| Том 51, № 8 (2017) |
Application of clustering methods for analyzing the security of Android applications |
|
|
Pavlenko E., Yarmak A., Moskvin D.
|
| Том 51, № 7 (2017) |
Application of Colored Petri Nets for Verification of Scenario Control Structures in UCM Notation |
|
|
Vizovitin N., Nepomniaschy V., Stenenko A.
|
| Том 50, № 3 (2016) |
Application of computer image processing in office automation system |
|
|
Zhang M.
|
| Том 51, № 8 (2017) |
Application of convolutional neural networks for preventing information leakage in open internet resources |
|
|
Zhukov D., Akimov D., Red’kin O., Los’ V.
|
| Том 53, № 7 (2019) |
Application of Neural Networks for Recognizing Rail Structural Elements in Magnetic and Eddy Current Defectograms |
|
|
Kuzmin E., Gorbunov O., Plotnikov P., Tyukin V., Bashkin V.
|
| Том 50, № 7 (2016) |
Application of numerical optimization methods to molecular docking on graphics processing units |
|
|
Farkov M., Legalov A.
|
| Нәтижелер 466 - 51/75 |
<< < 1 2 3 4 5 6 7 8 9 10 > >> |