Issue |
Title |
File |
Vol 53, No 4 (2019) |
Design of Printed log-Periodic Antennas for Long Range Communication within a Wireless Sensor Network for Sea Water Quality Monitoring |
|
Gragnani G.L., Caviglia D.D., Montecucco C.
|
Vol 52, No 5 (2018) |
Design of Sensor Data Fusion Algorithm for Mobile Robot Navigation Using ANFIS and Its Analysis Across the Membership Functions |
|
Adarsh S., Ramachandran K.I.
|
Vol 53, No 2 (2019) |
Designing a Switching Controller Based on Control Performance Assessment Index and a Fuzzy Supervisor for Perturbed Discrete-Time Systems Subject to Uncertainty |
|
Mohammad Babaie ., Rahmani Z., Rezaie B.
|
Vol 53, No 5 (2019) |
Detecting DDoS Attacks Using Machine Learning Techniques and Contemporary Intrusion Detection Dataset |
|
Naveen Bindra ., Manu Sood .
|
Vol 52, No 8 (2018) |
Detection of Abnormal Traffic in Dynamic Computer Networks with Mobile Consumer Devices |
|
Platonov V.V., Semenov P.O.
|
Vol 51, No 3 (2017) |
Detection of abnormal traffic video images based on high-dimensional fuzzy geometry |
|
Huang L., Li Z., Wang B.
|
Vol 50, No 8 (2016) |
Detection of anomalous behavior in a robot system based on deep learning elements |
|
Utkin L.V., Zaborovskii V.S., Popov S.G.
|
Vol 51, No 8 (2017) |
Detection of encrypted executable files based on entropy analysis to determine the randomness measure of byte sequences |
|
Alekseev I.V., Platonov V.V.
|
Vol 53, No 1 (2019) |
Detection of HMM Synthesized Speech by Wavelet Logarithmic Spectrum |
|
Diqun Yan ., Xiang L., Wang Z., Wang R.
|
Vol 53, No 8 (2019) |
Detection of Information Security Breaches in a Digital Production System Based on the Component Interaction Model |
|
Pavlenko E.Y.
|
Vol 53, No 8 (2019) |
Detection of Security Threats to Modern Websites |
|
Ivanov D.V., Moskvin D.A., Kubrin G.S.
|
Vol 52, No 8 (2018) |
Detection of Threats in Cyberphysical Systems Based on Deep Learning Methods Using Multidimensional Time Series |
|
Kalinin M.O., Lavrova D.S., Yarmak A.V.
|
Vol 53, No 8 (2019) |
Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions |
|
Doynikova E.V., Fedorchenko A.V., Kotenko I.V.
|
Vol 51, No 2 (2017) |
Determining PID controller coefficients for the moving motor of a welder robot using fuzzy logic |
|
Rezaee A.
|
Vol 51, No 3 (2017) |
Development and realization of embedded car networking vehicle terminal software system |
|
Tan F.
|
Vol 51, No 1 (2017) |
Development and research of improved model of multipath adaptive routing in computer networks with load balancing |
|
Koryachko V.P., Perepelkin D.A., Byshov V.S.
|
Vol 52, No 8 (2018) |
Development of a Heuristic Mechanism for Detection of Malware Programs Based on Hidden Markov Models |
|
Kozachok A.V.
|
Vol 50, No 7 (2016) |
Development of an active external network topology module for Floodlight software-defined network controller |
|
Noskov A.A., Nikitinskiy M.A., Alekseev I.V.
|
Vol 50, No 7 (2016) |
Development of an adaptive routing mechanism in software-defined networks |
|
Noskov A.N., Manov I.A.
|
Vol 50, No 8 (2016) |
Development of automated system for identifying abnormal network activity and detecting threats |
|
Nikonov V.V., Los’ V.P., Ross G.V.
|
Vol 50, No 5 (2016) |
Development of FEA-ANN hybrid model for Equivalent Stress prediction of automobile structural member |
|
Patel T.M., Bhatt N.M.
|
Vol 53, No 3 (2019) |
Development of Method of Matched Morphological Filtering of Biomedical Signals and Images |
|
Povoroznyuk A.I., Filatova A., Zakovorotniy A.Y., Shehna K.
|
Vol 51, No 6 (2017) |
Diagnostic Neuro-Fuzzy System and Its Learning in Medical Data Mining Tasks in Conditions of Uncertainty about Numbers of Attributes and Diagnoses |
|
Pliss I., Perova I.
|
Vol 52, No 7 (2018) |
Difference Approximations of a Reaction–Diffusion Equation on Segments |
|
Glyzin S.D.
|
Vol 50, No 7 (2016) |
Diffusion chaos in the reaction–diffusion boundary problem in the dumbbell domain |
|
Glyzin S.D., Shokin P.L.
|
151 - 175 of 466 Items |
<< < 2 3 4 5 6 7 8 9 10 11 > >> |