default search action
Information Technology and Control, Volume 44
Volume 44, Number 1, 2015
- Chunlin Li, Layuan Li:
An Efficient Scheduling Strategy in Mobile Cloud: Model and Algorithm. 7-19 - Matko Saric, Hrvoje Dujmic, Mladen Russo:
Scene Text Extraction in IHLS Color Space Using Support Vector Machine. 20-29 - Jie Song:
Performance and Energy Optimization on Terasort Algorithm by Task Self-Resizing. 30-40 - Nasour Bagheri, Fatemeh Baghernejhad, Masoumeh Safkhani:
On the Designing of EPC C1 G2 Authentication protocol using AKARI-1 and AKARI-2 PRNGs. 41-53 - Aurimas Rapecka, Gintautas Dzemyda:
A new Recommendation Model for the User Clustering-Based Recommendation System. 54-63 - Kuo-Hui Yeh:
An Efficient Resource Allocation Framework for Cloud Federations. 64-76 - Edmundas Kazimieras Zavadskas, Shankar Chakraborty, Orchi Bhattacharyya, Jurgita Antucheviciene:
Application of WASPAS Method as an Optimization Tool in Non-traditional Machining Processes. 77-88 - Andrea Monteriù:
Nonlinear Decentralized Model Predictive Control for Unmanned Vehicles Moving in Formation. 89-97 - Muhammet Ali Nur Oz, Ibrahim Sener, Ozgur Turay Kaymakci, Ilker Üstoglu, Galip Cansever:
Topology Based Automatic Formal Model Generation for Point Automation Systems. 98-111 - Rimantas Baranauskas, Audrone Janaviciute, Raimundas Jasinevicius, Vaidas Jukavicius, Egidijus Kazanavicius, Vytautas Petrauskas, Arunas Vrubliauskas:
On Multi Agent Systems Intellectics. 112-124 - Summaries. 125-128
Volume 44, Number 2, 2015
- Giovanni Godena, Tomaz Lukman, Marjan Hericko, Stanko Strmcnik:
The Experience of Implementing Model-Driven Engineering Tools in the Process Control Domain. 135-147 - Igoris Belovas:
Parallel Computing for Mixed-Stable Modelling of Large Data Sets. 148-154 - Irena Markievicz, Jurgita Kapociute-Dzikiene, Minija Tamosiunaite, Daiva Vitkute-Adzgauskiene:
Action Classification in Action Ontology Building Using Robot-Specific Texts. 155-164 - Yulei Zhang, Yongjie Zhang, Yahong Li, Caifen Wang:
Strong Designated Verifier Signature Scheme Resisting Replay Attack. 165-171 - Ugur Erkin Kocamaz, Alper Göksu, Harun Taskin, Yilmaz Uyaroglu:
Synchronization of Chaos in Nonlinear Finance System by means of Sliding Mode and Passive Control Methods: A Comparative Study. 172-181 - Robert Piotrowski, Adam Skiba:
Nonlinear fuzzy Control System for dissolved oxygen with aeration System in sequencing batch reactor. 182-195 - Fushan Wei, Jianfeng Ma, Aijun Ge, Guangsong Li, Chuangui Ma:
A Provably Secure Three-Party Password Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems. 195-206 - Kuo-Hui Yeh:
An Anonymous and Lightweight Authentication Scheme for Mobile Devices. 206-215 - Remigijus Leipus, Yang Yang, Lina Dindiene:
On the max-sum equivalence in presence of negative dependence and heavy tails. 215-221 - Andrius Dmuchovskis, Raimundas Jasinevicius, Vaidas Jukavicius, Egidijus Kazanavicius, Laura Kizauskiene, Agnius Liutkevicius:
Solution of the Augmenting Sequence of Linear Programming Problems as a Tool for the Intellectual Home Environment's Self-Training. 221-233 - Sigita Degutiene:
Summaries. 234-236
Volume 44, Number 3, 2015
- Branislav Rehák:
Large-Scale Systems Control Design via LMI Optimization. 247-253 - Arnas Kaceniauskas, Ruslan Pacevic, Migle Staskuniene, Dmitrij Sesok, Dainius Rusakevicius, Audrius Aidietis, Giedrius Davidavicius:
Private Cloud Infrastructure for Applications of Mechanical and Medical Engineering. 254-261 - Jun Su, Markiyan Nakonechnyi, Orest Ivakhiv, Anatoliy Sachenko:
Developing the Automatic Control System Based on Neural Controller. 262-270 - Ali Durdu, Yilmaz Uyaroglu, Ahmet Turan Özcerit:
A Novel Chaotic System for Secure Communication Applications. 271-278 - Dan Komosny, Miroslav Voznák, Kathiravelu Ganeshan, Hira Sathu:
Estimation of Internet Node Location by Latency Measurements - The Underestimation Problem. 279-286 - Mildreth I. Alcaraz-Mejia, Raul Campos-Rodriguez, Ernesto López-Mellado, Antonio Ramírez-Treviño:
Partial Reconfiguration of Control Systems using Petri Nets Structural Redundancy. 287-301 - Lei Pan, Jiong Shen, Chengyu Cao:
A Collaborated Multi-controller Strategy by Using L1 Adaptive Augmentation Control for Power-generation Systems with Uncertainties. 302-314 - Khalid A. Darabkh, Iyad F. Jafar, Raed T. Al-Zubi, Mohammed Hawa:
A New Image Steganographic Approach for Secure Communication Based on LSB Replacement Method. 315-328 - Prosanta Gope, Tzonelih Hwang:
Security Weaknesses on a Delegation-Based Authentication Protocol for PCSs. 329-333 - Agne Paulauskaite-Taraseviciene, Vaidas Jukavicius, Nerijus Morkevicius, Raimundas Jasinevicius, Vytautas Petrauskas, Vygintas Kazanavicius:
Statistical Evaluation of Four Technologies used for Intelectualization of Smart Home Environment. 334-344 - Sigita Degutiene:
Summaries. 345
Volume 44, Number 4, 2015
- Adel Tellili, Nouceyba Abdelkrim, Amina Challouf, Mohamed Naceur Abdelkrim:
Reconfigurable Control of Two-Time Scale Systems in Presence of Additive Faults. 357-366 - Andrius Grigutis, Agneska Korvel, Jonas Siaulys:
Ruin Probabilities of a Discrete-time Multi-risk Model. 367-379 - Yunmei Fang, Zhuli Yuan, Juntao Fei:
Adaptive Fuzzy Backstepping Control of MEMS Gyroscope Using Dynamic Sliding Mode Approach. 380-386 - Mohammad Heydari, Seyed Mohammad Sajad Sadough, Shehzad Ashraf Chaudhry, Mohammad Sabzinejad Farash, Mohammad Reza Aref:
An Improved Authentication Scheme for Electronic Payment Systems in Global Mobility Networks. 387-403 - Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
A Three-Party Password-based Authenticated Key Exchange Protocol for Wireless Communications. 404-409 - Tzu-Hung Lin, Cheng-Yu Yeh, Shaw-Hwa Hwang:
Efficient statistics-based algebraic codebook search algorithms derived from RCM for an ACELP speech coder. 410-419 - Domen Zupancic, Mitja Lustrek, Matjaz Gams:
Trade-off between Energy Consumption and Comfort Experience in Smart Buildings. 420-432 - Krzysztof Cpalka, Krystian Lapa, Andrzej Przybyl:
A new approach to design of control systems using genetic programming. 433-442 - Rolandas Gircys, Agnius Liutkevicius, Arunas Vrubliauskas, Egidijus Kazanavicius:
Blood Pressure Estimation Accoording to Photoplethysmographic Signal Steepness. 443-450 - Algimantas Venckauskas, Vacius Jusas, Kestutis Paulikas, Jevgenijus Toldinas:
Investigation of Artifacts Left by BitTorrent Client on the Local Computer Operating under Windows 8.1. 451-461
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.