


default search action
Information Technology and Control, Volume 47
Volume 47, Number 1, 2018
- Ljiljana Brkic, Igor Mekterovic:

A Time-Constrained Algorithm for Integration Testing in a Data Warehouse Environment. 5-25 - Behrooz Rezaie

, Hossein Ghasemi
, Zahra Rahmani Cherati
:
Terminal Sliding Mode Controller Tuned Using Evolutionary Algorithms for Finite-Time Robust Tracking Control in a Class of Nonholonomic Systems. 26-44 - Ugur Erkin Kocamaz

, Alper Göksu, Yilmaz Uyaroglu
, Harun Taskin:
Controlling Hyperchaotic Finance System with Combining Passive and Feedback Controllers. 45-55 - Yang Lu, Gang Wang, Jiguo Li:

On Security of a Secure Channel Free Public Key Encryption with Conjunctive Field Keyword Search Scheme. 56-62 - Mirjam Sepesy Maucec

, Gregor Donaj:
Morphology In Statistical Machine Translation From English To Highly Inflectional Language. 63-74 - Saritha Murali, V. K. Govindan, Saidalavi Kalady:

A Survey on Shadow Detection Techniques in a Single Image. 75-92 - Nemanja Nedic, Goran Svenda:

A Comparison of DMS Workflows Scheduling Concepts. 93-106 - Eligijus Sakalauskas, Inga Timofejeva

, Aleksejus Mihalkovich, Jonas Muleravicius:
A Simple Off-line E-Cash System with Observers. 107-117 - Mario Emanuel Serrano, Sebastian Alejandro Godoy, Daniel Gandolfo, Vicente A. Mut, Gustavo Scaglia:

Nonlinear Trajectory Tracking Control for Marine Vessels with Additive Uncertainties. 118-130 - Stefan S. Tomic, Zoran Peric, Milan Tancic, Jelena Nikolic:

Backward Adaptive and Quasi-Logarithmic Quantizer for Sub-Band Coding of Audio. 131-139 - Wei Wei, Xunli Fan, Marcin Wozniak

, Houbing Song
, Wei Li, Ye Li, Peiyi Shen:
H∞ Control of Network Control System for Singular Plant. 140-150 - Jelena Zubova, Olga Kurasova, Marius Liutvinavicius:

Dimensionality Reduction Methods: The Comparison Of Speed And Accuracy. 151-160
Volume 47, Number 2, 2018
- Mohammad Ahmadinia, Ali Movaghar, Amir Masoud Rahmani:

Semantic Data Gathering of Physical Entities in Semantic Sensor Networks Using Software Agents. 167-183 - Piotr Artiemjew

:
Boosting Effect of Classifier Based on Simple Granules of Knowledge. 184-196 - Mindaugas Brazenas, Eimutis Valakevicius

:
On Structured Initial Solution Generation for Phase Type Fitting with EM Method. 197-208 - Bojan Denic

, Zoran Peric
, Vladimir Despotovic
, Nikola Vucic
:
Forward Adaptive Laplacian Source Coding Based on Restricted Quantization. 209-219 - Zeinab Ghazi, Ali Doustmohammadi:

Intrusion Detection in Cyber-Physical Systems Based on Petri Net. 220-235 - Albertas Jurgelevicius, Leonidas Sakalauskas:

Big Data Mining Using Public Distributed Computing. 236-248 - Vladimir Kurbalija

, Mirjana Ivanovic
, Zoltan Geler
, Milos Radovanovic
:
Two Faces of the Framework for Analysis and Prediction, Part 1 - Education. 249-261 - Cheng-Chi Lee

, Chun-Ta Li
, Zhi-Wei Chen, Yan-Ming Lai:
A Biometric-Based Authentication and Anonymity Scheme for Digital Rights Management System. 262-274 - Wenfen Liu, Gang Zhou, Jianghong Wei

, Xuexian Hu, Saru Kumari
:
Security Enhanced and Cost-effective User Authentication Scheme for Wireless Sensor Networks. 275-294 - Mohammad Javad Mahmoodabadi, Taha Soleimani, Morteza Andalib Sahnehsaraei:

A Hybrid Optimal Controller Based on the Robust Decoupled Sliding Mode and Adaptive Feedback Linearization. 295-309 - Stefan Radovan Markovic, Mirko Vujosevic

, Dragana D. Makajic-Nikolic
:
An Optimization-Simulation Approach to Chance Constraint Programming. 310-320 - Nina Radojicic, Miroslav Maric, Aleksandar Takaci:

A New Fuzzy Version of the Risk-constrained Cash-in-Transit Vehicle Routing Problem. 321-337 - Marta Wlodarczyk-Sielicka

, Natalia Wawrzyniak
:
Interpolating Bathymetric Big Data for an Inland Mobile Navigation System. 338-348 - Carsten Wolff

, Mathias Knirr, Klaus-Peter Priebe, Peter Schulz, Jörn Strumberg:
A Layered Software Architecture for a Flexible and Smart Organic Rankine Cycle (ORC) Turbine - Solutions and Case Study. 349-362 - Jui-Di Wu, Yuh-Min Tseng, Sen-Shan Huang:

Leakage-Resilient Certificateless Signature Under Continual Leakage Model. 363-386
Volume 47, Number 3, 2018
- Ammar Boucherit, Laura M. Castro

, Abdallah Khababa, Osman Hasan
:
Towards the Formal Development of Software Based Systems: Access Control System as a Case Study. 393-405 - Xunli Fan, Wei Wei, Marcin Wozniak

, Ye Li:
Low Energy Consumption and Data Redundancy Approach of Wireless Sensor Networks with Bigdata. 406-418 - Giovanni Godena, Stanko Strmcnik:

A New State Machine Behaviour Model for Procedural Control Entities in Industrial Process Control Systems. 419-430 - Azeem Irshad

, Husnain Naqvi, Shehzad Ashraf Chaudhry
, Muhammad Usman, Muhammad Shafiq, Omid Mir
, Ambrina Kanwal:
Cryptanalysis and improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee's Scheme. 431-446 - Mojtaba Kaheni, Mohammad Hadad Zarif, Ali Akbarzadeh Kalat, Mohammad Sami Fadali:

Soft Variable Structure Control of Linear Systems via Desired Pole Paths. 447-456 - Zeynep Hilal Kilimci, Sevinç Ilhan Omurca

:
Extended Feature Spaces Based Classifier Ensembles for Sentiment Analysis of Short Texts. 457-470 - Natasa Kovac

, Tatjana Davidovic
, Zorica Stanimirovic
:
Variable Neighborhood Search Methods for the Dynamic Minimum Cost Hybrid Berth Allocation Problem. 471-488 - Vladimir Kurbalija

, Mirjana Ivanovic
, Zoltan Geler
, Milos Radovanovic
:
Two Faces of the Framework for Analysis and Prediction, Part 2 - Research. 489-502 - Alfonsas Misevicius

, Evelina Staneviciene
:
A New Hybrid Genetic Algorithm for the grey Pattern quadratic Assignment Problem. 503-520 - Sergey G. Mosin

:
Analogue Integrated Circuits Design-for-Testability Flow Oriented onto OBIST Strategy. 521-531 - Ramo Sendelj

, Ivana Ognjanovic
:
Multi-Criteria Decision Making for Optimal Configuration of Business Process Model Families. 532-550 - Xiaobin Xu, Xue Ma, Cheng-Lin Wen, Darong Huang

, Jian-Ning Li:
Self-Tuning Method of PID Parameters Based on Belief Rule Base Inference. 551-563 - Xuhui Bu, Zhongyuan Cui, Lizhi Cui, Wei Qian:

Robust Quantized H∞ ILC Design for Uncertain Systems with Communication Constraints. 564-574 - Xiaodong Yang, Tingchun Ma, Ping Yang, Faying An, Caifen Wang:

Security Analysis of a Revocable and Strongly Unforgeable Identity-Based Signature Scheme. 575-587 - Yumna Zahid, Hina Khurshid, Zulfiqar Ali Memon

:
On Improving Efficiency and Utilization of Last Level Cache in Multicore Systems. 588-607
Volume 47, Number 4, 2018
- Danijela Aleksic, Zoran Peric

:
Analysis and Design of Robust Quasilogarithmic Quantizer for the Purpose of Traffic Optimization. 615-622 - Lina Ceponiene

, Vaidotas Drungilas
, Mantas Jurgelaitis
, Jonas Ceponis:
Method for Reverse Engineering UML Use Case Model for Websites. 623-638 - Ke Gu

, Lihao Yang, Bo Yin:
Location Data Record Privacy Protection based on Differential Privacy Mechanism. 639-654 - Igor V. Kotenko

, Andrey Fedorchenko
, Elena Doynikova
, Andrey Chechulin
:
An Ontology-based Storage of Security Information. 655-667 - Krzysztof Cpalka

, Krystian Lapa, Andrzej Przybyl
:
Genetic Programming Algorithm for Designing of Control Systems. 668-683 - Marek Milosz

, Zainelkhriet Murzabekov
, Kamshat Tussupova
, Saltanat Usubalieva:
Optimisation of Discrete Processes with Bounded Control. 684-690 - Dawid Polap

:
Human-machine interaction in intelligent technologies using the augmented reality. 691-703 - Chang Shu, Lihui Sun, Juanhua Li, Mengmeng Gou

:
Remote sensing image restoration: adaptive reciprocal cell recovery technique. 704-713 - Gandharba Swain:

A data hiding technique by mixing MFPVD and LSB substitution in a pixel. 714-727 - Ana Uspuriene

, Leonidas Sakalauskas, Gediminas Gricius:
Modified L-shaped Decomposition Method with Scenario Aggregation for a Two-Stage Stochastic Programming Problem. 728-738 - Haoping Wang, Rui Gong, Yang Tian, Nikolai D. Christov

:
Piecewise Continuous -Communication Disturbance Observer Design for Networked Visual Servo Control Systems with Sampled and Variable Delayed Output. 739-748

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














