


default search action
Information Technology and Control, Volume 43
Volume 43, Number 1, 2014
- Jian Zhang:

Synchronization of Nonlinear Continuous-time Systems by Sampled-data Output Feedback Control. 7-13 - Vytautas Stuikys, Kristina Bespalova, Renata Burbaite:

Refactoring of Heterogeneous Meta-Program into k-stage Meta-Program. 14-27 - Uros Kac, Franc Novak:

Practical Considerations in Oscillation Based Test of SC Biquad Filters. 28-36 - Pavel Stefanovic

, Olga Kurasova
:
Creation of Text Document Matrices and Visualization by Self-Organizing Map. 37-46 - Egidijus Vaskevicius, Ausra Vidugiriene

, Vytautas Kaminskas:
Identification of Human Response to Virtual 3D Face Stimuli. 47-56 - Hang Tu, Han Shen, Debiao He, Jianhua Chen:

Security Analysis and Improvements of a Three-Party Password-Based Key Exchange Protocol. 57-63
- Stasys Kazlauskas:

Preface. 64 - Alex Muscar, Costin Badica

:
Monadic Foundations for Promises in Jason. 65-72 - Katarzyna Wasielewska, Maria Ganzha, Marcin Paprzycki

, Pawel Szmeja, Michal Drozdowicz
, Ivan Lirkov
, Costin Badica
:
Applying Saaty's Multicriterial Decision Making Approach in Grid Resource Management. 73-87 - Dejan Mitrovic, Mirjana Ivanovic

, Zoltan Geler
:
Agent-Based Distributed Computing for Dynamic Networks. 88-97 - Gabriel Iuhasz

, Viorel Negru
, Daniela Zaharie
:
Neuroevolution Based Multi-Agent System with Ontology Based Template Creation for Micromanagement in Real-Time Strategy Games. 98-109
Volume 43, Number 2, 2014
- Loreta Savulioniene

, Leonidas Sakalauskas:
A Stochastic Algorithm of Frequent Set Search for Mining Association Rules. 121-132 - Henrikas Pranevicius, Mindaugas Pranevicius, Osvaldas Pranevicius, Mindaugas Snipas, Nerijus Paulauskas, Feliksas F. Bukauskas:

Continuous Time Markov Chain Models of Voltage Gating of Gap Junction Channels. 133-142 - Mohammad Sabzinejad Farash

, Mahmoud Ahmadian-Attari:
An Enhanced and Secure Three-Party Password-based Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems. 143-150 - Wen-Chung Kuo, Hong-Ji Wei, Jiin-Chiou Cheng:

Enhanced Secure Authentication Scheme with Anonymity for Roaming in Mobility Networks. 151-156 - P. Teppa-Garran

, G. Garcia:
ADRC Tuning Employing the LQR Approach for Decoupling Uncertain MIMO Systems. 157-165 - Ugur Erkin Kocamaz

, Yilmaz Uyaroglu
:
Non-Identical Synchronization, Anti-Synchronization and Control of Single-Machine Infinite-Bus Power System via Active Control. 166-174 - Yueying Wang

, Pingfang Zhou, Quanbao Wang, Dengping Duan:
Reliable Robust Sampled-Data H∞ Output Tracking Control with Application to Flight Control. 175-182 - C.-P. Chu, C.-Y. Yeh, S.-H. Hwang:

An Efficient Search Strategy for ACELP Algebraic Codebook by Means of Reduced Candidate Mechanism and Iteration-Free Pulse Replacement. 183-187 - Azita Azarfar

, H. T. Shandiz, Masoud Shafiee
:
Adaptive Control for Nonlinear Singular Systems. 188-198 - Namita Tiwari

, Sahadeo Padhye
, Debiao He:
Provably Secure Proxy Multi-Signature Scheme Based on ECC. 199-204
Volume 43, Number 3, 2014
- Majid Abdolrazzagh-Nezhad

, Salwani Abdullah:
A Robust Intelligent Construction Procedure for Job-Shop Scheduling. 217-229 - Rok Zontar, Ivan Rozman, Vili Podgorelec

:
Mapping Ontologies to Objects using a Transformation based on Description Logics. 230-243 - Raed T. Al-Zubi, Khalid A. Darabkh

, Yaser Jararweh
:
A Powerful Yet Efficient Iris Recognition Based on Local Binary Quantization. 244-251 - Han-Yu Lin:

Group-Oriented Data Access Structure Using Threshold-CAE Scheme and Its Extension. 252-263 - Ying-Hao Hung, Tung-Tso Tsai, Yuh-Min Tseng, Sen-Shan Huang:

Strongly Secure Revocable ID-based Signature without Random Oracles. 264-276 - Min-Shiang Hwang, Shih-Ting Hsu, Cheng-Chi Lee

:
A New Public Key Encryption with Conjunctive Field Keyword Search Scheme. 277-288 - Jaroslav Karpovic, Gintare Krisciuniene, Linas Ablonskis, Lina Nemuraite:

The Comprehensive Mapping of Semantics of Business Vocabulary and Business Rules (SBVR) to OWL 2 Ontologies. 289-302 - Hui Cao, Yanbin Zhang, Lixin Jia, Gangquan Si:

A Fuzzy Sequential Pattern Mining Algorithm Based on Independent Pruning Strategy for Parameters Optimization of Ball Mill Pulverizing System. 303-314 - Wojciech P. Hunek, Piotr Dzierwa

:
New Results in Generalized Minimum Variance Control of Computer Networks. 315-320 - Jurgita Kapociute-Dzikiene, Algis Krupavicius

:
Predicting Party Group from the Lithuanian Parliamentary Speeches. 321-332 - Summaries. 333-338

Volume 43, Number 4, 2014
- Vicente Alarcón Aquino

, Juan Manuel Ramírez-Cortés
, Pilar Gómez-Gil
, Oleg Starostenko, Y. Garcia-Gonzalez:
Network Intrusion Detection Using Self-Recurrent Wavelet Neural Network with Multidimensional Radial Wavelons. 347-358 - J. Apolinar Muñoz Rodríguez:

Improving the Modeling of the Plantar Surface via Bezier Networks and Laser Projection. 359-370 - Safdar Zaman, Wolfgang Slany:

Smartphone-Based Online and Offline Speech Recognition System for ROS-Based Robots. 371-380 - Chien-Lung Hsu, Yu-Hao Chuang, Pei-Ling Tsai, Atif Alamri, Sk. Md. Mizanur Rahman

:
Design of Pairing-Based Proxy Signcryption System Model for Online Proxy Auctions. 381-389 - Yuanyuan Zhang, Jianhua Chen, Baojun Huang, Cong Peng:

An Efficient Password Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography. 390-401 - Daiva Sveikauskiene, Laimutis Telksnys:

Accuracy of the Parsing of Lithuanian Simple Sentences. 402-413 - Mitja Trampus, Dunja Mladenic

:
Constructing Domain Templates with Concept Hierarchy as Background Knowledge. 414-432 - Metin Turan

, Coskun Sönmez, Murat Can Ganiz
:
The Benchmark of Paragraph and Sentence Extraction Summaries on Outlier Document Filtering Applied Multi-Document Summarizer. 433-439 - Vacius Jusas

, Tomas Neverdauskas:
Stimuli generation framework for testing multiple processes in VHDL. 440-446 - Vytautas Kaminskas, Gediminas Liaucius:

Predictor-based Self-tuning Control of Pressure Plants. 447-454 - Summaries. 455-459


manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














