


default search action
Information Technology and Control, Volume 44
Volume 44, Number 1, 2015
- Chunlin Li, Layuan Li:

An Efficient Scheduling Strategy in Mobile Cloud: Model and Algorithm. 7-19 - Matko Saric

, Hrvoje Dujmic, Mladen Russo
:
Scene Text Extraction in IHLS Color Space Using Support Vector Machine. 20-29 - Jie Song:

Performance and Energy Optimization on Terasort Algorithm by Task Self-Resizing. 30-40 - Nasour Bagheri

, Fatemeh Baghernejhad, Masoumeh Safkhani
:
On the Designing of EPC C1 G2 Authentication protocol using AKARI-1 and AKARI-2 PRNGs. 41-53 - Aurimas Rapecka, Gintautas Dzemyda:

A new Recommendation Model for the User Clustering-Based Recommendation System. 54-63 - Kuo-Hui Yeh:

An Efficient Resource Allocation Framework for Cloud Federations. 64-76 - Edmundas Kazimieras Zavadskas, Shankar Chakraborty, Orchi Bhattacharyya, Jurgita Antucheviciene

:
Application of WASPAS Method as an Optimization Tool in Non-traditional Machining Processes. 77-88 - Andrea Monteriù

:
Nonlinear Decentralized Model Predictive Control for Unmanned Vehicles Moving in Formation. 89-97 - Muhammet Ali Nur Oz

, Ibrahim Sener, Ozgur Turay Kaymakci
, Ilker Üstoglu
, Galip Cansever:
Topology Based Automatic Formal Model Generation for Point Automation Systems. 98-111 - Rimantas Baranauskas, Audrone Janaviciute, Raimundas Jasinevicius, Vaidas Jukavicius, Egidijus Kazanavicius

, Vytautas Petrauskas, Arunas Vrubliauskas:
On Multi Agent Systems Intellectics. 112-124 - Summaries. 125-128

Volume 44, Number 2, 2015
- Giovanni Godena, Tomaz Lukman, Marjan Hericko, Stanko Strmcnik:

The Experience of Implementing Model-Driven Engineering Tools in the Process Control Domain. 135-147 - Igoris Belovas

:
Parallel Computing for Mixed-Stable Modelling of Large Data Sets. 148-154 - Irena Markievicz

, Jurgita Kapociute-Dzikiene, Minija Tamosiunaite, Daiva Vitkute-Adzgauskiene
:
Action Classification in Action Ontology Building Using Robot-Specific Texts. 155-164 - Yulei Zhang

, Yongjie Zhang, Yahong Li, Caifen Wang:
Strong Designated Verifier Signature Scheme Resisting Replay Attack. 165-171 - Ugur Erkin Kocamaz

, Alper Göksu, Harun Taskin, Yilmaz Uyaroglu
:
Synchronization of Chaos in Nonlinear Finance System by means of Sliding Mode and Passive Control Methods: A Comparative Study. 172-181 - Robert Piotrowski, Adam Skiba:

Nonlinear fuzzy Control System for dissolved oxygen with aeration System in sequencing batch reactor. 182-195 - Fushan Wei, Jianfeng Ma, Aijun Ge, Guangsong Li, Chuangui Ma:

A Provably Secure Three-Party Password Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems. 195-206 - Kuo-Hui Yeh:

An Anonymous and Lightweight Authentication Scheme for Mobile Devices. 206-215 - Remigijus Leipus, Yang Yang, Lina Dindiene:

On the max-sum equivalence in presence of negative dependence and heavy tails. 215-221 - Andrius Dmuchovskis, Raimundas Jasinevicius, Vaidas Jukavicius, Egidijus Kazanavicius

, Laura Kizauskiene
, Agnius Liutkevicius
:
Solution of the Augmenting Sequence of Linear Programming Problems as a Tool for the Intellectual Home Environment's Self-Training. 221-233 - Sigita Degutiene:

Summaries. 234-236
Volume 44, Number 3, 2015
- Branislav Rehák

:
Large-Scale Systems Control Design via LMI Optimization. 247-253 - Arnas Kaceniauskas

, Ruslan Pacevic
, Migle Staskuniene, Dmitrij Sesok
, Dainius Rusakevicius
, Audrius Aidietis, Giedrius Davidavicius:
Private Cloud Infrastructure for Applications of Mechanical and Medical Engineering. 254-261 - Jun Su, Markiyan Nakonechnyi, Orest Ivakhiv

, Anatoliy Sachenko
:
Developing the Automatic Control System Based on Neural Controller. 262-270 - Ali Durdu

, Yilmaz Uyaroglu
, Ahmet Turan Özcerit
:
A Novel Chaotic System for Secure Communication Applications. 271-278 - Dan Komosny, Miroslav Voznák

, Kathiravelu Ganeshan, Hira Sathu:
Estimation of Internet Node Location by Latency Measurements - The Underestimation Problem. 279-286 - Mildreth I. Alcaraz-Mejia

, Raul Campos-Rodriguez, Ernesto López-Mellado, Antonio Ramírez-Treviño
:
Partial Reconfiguration of Control Systems using Petri Nets Structural Redundancy. 287-301 - Lei Pan, Jiong Shen

, Chengyu Cao:
A Collaborated Multi-controller Strategy by Using L1 Adaptive Augmentation Control for Power-generation Systems with Uncertainties. 302-314 - Khalid A. Darabkh

, Iyad F. Jafar, Raed T. Al-Zubi, Mohammed Hawa
:
A New Image Steganographic Approach for Secure Communication Based on LSB Replacement Method. 315-328 - Prosanta Gope, Tzonelih Hwang:

Security Weaknesses on a Delegation-Based Authentication Protocol for PCSs. 329-333 - Agne Paulauskaite-Taraseviciene, Vaidas Jukavicius, Nerijus Morkevicius, Raimundas Jasinevicius, Vytautas Petrauskas, Vygintas Kazanavicius:

Statistical Evaluation of Four Technologies used for Intelectualization of Smart Home Environment. 334-344 - Sigita Degutiene:

Summaries. 345
Volume 44, Number 4, 2015
- Adel Tellili

, Nouceyba Abdelkrim, Amina Challouf, Mohamed Naceur Abdelkrim
:
Reconfigurable Control of Two-Time Scale Systems in Presence of Additive Faults. 357-366 - Andrius Grigutis, Agneska Korvel, Jonas Siaulys:

Ruin Probabilities of a Discrete-time Multi-risk Model. 367-379 - Yunmei Fang, Zhuli Yuan, Juntao Fei:

Adaptive Fuzzy Backstepping Control of MEMS Gyroscope Using Dynamic Sliding Mode Approach. 380-386 - Mohammad Heydari, Seyed Mohammad Sajad Sadough

, Shehzad Ashraf Chaudhry
, Mohammad Sabzinejad Farash
, Mohammad Reza Aref:
An Improved Authentication Scheme for Electronic Payment Systems in Global Mobility Networks. 387-403 - Yanrong Lu, Lixiang Li

, Haipeng Peng, Yixian Yang:
A Three-Party Password-based Authenticated Key Exchange Protocol for Wireless Communications. 404-409 - Tzu-Hung Lin, Cheng-Yu Yeh, Shaw-Hwa Hwang:

Efficient statistics-based algebraic codebook search algorithms derived from RCM for an ACELP speech coder. 410-419 - Domen Zupancic, Mitja Lustrek, Matjaz Gams:

Trade-off between Energy Consumption and Comfort Experience in Smart Buildings. 420-432 - Krzysztof Cpalka

, Krystian Lapa
, Andrzej Przybyl
:
A new approach to design of control systems using genetic programming. 433-442 - Rolandas Gircys, Agnius Liutkevicius

, Arunas Vrubliauskas, Egidijus Kazanavicius
:
Blood Pressure Estimation Accoording to Photoplethysmographic Signal Steepness. 443-450 - Algimantas Venckauskas

, Vacius Jusas
, Kestutis Paulikas, Jevgenijus Toldinas
:
Investigation of Artifacts Left by BitTorrent Client on the Local Computer Operating under Windows 8.1. 451-461

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














