![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
International Journal of Applied Mathematics and Computer Science, Volume 32
Volume 32, Number 1, March 2022
- Tadeusz Kaczorek, Andrzej Ruszewski:
Global Stability of Discrete-Time Feedback Nonlinear Systems with Descriptor Positive Linear Parts and Interval State Matrices. 5-10 - Guangyu Liu
, Shangliang Wu, Ling Zhu, Jiajun Wang, Qiang Lv:
Fast and Smooth Trajectory Planning for a Class of Linear Systems Based on Parameter and Constraint Reduction. 11-21 - Shuhan Cao, Hu Shao, Feng Shao:
Sensor Location for Travel Time Estimation Based on the User Equilibrium Principle: Application of Linear Equations. 23-33 - Konstanty Junosza-Szaniawski, Dariusz Nogalski, Pawel Rzazewski:
Exact and Approximation Algorithms for Sensor Placement Against DDoS Attacks. 35-49 - Pawel Majdzik:
A Feasible Schedule for Parallel Assembly Tasks in Flexible Manufacturing Systems. 51-63 - Vieri Benci, Marco Cococcioni
, Lorenzo Fiaschi:
Non-Standard Analysis Revisited: An Easy Axiomatic Presentation Oriented Towards Numerical Applications. 65-80 - M. Sami Zitouni
, Andrzej Sluzek
:
A Data Association Model for Analysis of Crowd Structure. 81-94 - Agnieszka Kaliszewska, Monika Syga:
A Comprehensive Study of Clustering a Class of 2D Shapes. 95-109 - Thiyagarajan Jayaraman, Gowri Shankar Chinnusamy:
Performance Analysis of a Dual Stage Deep Rain Streak Removal Convolution Neural Network Module with a Modified Deep Residual Dense Network. 111-123 - Huan Zheng, Shunfu Jin:
A Multi-Source Fluid Queue Based Stochastic Model of the Probabilistic Offloading Strategy in a MEC System With Multiple Mobile Devices and a Single MEC Server. 125-138 - Ahmed Abdel-Rahim El-Douh, Songfeng Lu, Abdelatif A. Elkouny, Ahmed Saleh Amein
:
Hybrid Cryptography with a One-Time Stamp to Secure Contact Tracing for COVID-19 Infection. 139-146 - Mariusz Szwoch, Rafal Zawislak, Grzegorz Granosik
, Joanna Mik-Wojtczak, Michal Mik
:
Template Chart Detection for Stoma Telediagnosis. 147-160
Volume 32, Number 2, June 2022
- Norbert Kukurowski, Marcin Mrugalski, Marcin Pazera, Marcin Witczak:
Fault-Tolerant Tracking Control for a Non-Linear Twin-Rotor System Under Ellipsoidal Bounding. 171-183 - Zhao Zhang
, Zhong Yang, Shuchang Liu, Shuang Chen, Xiaokai Zhang:
A Multi-Model Based Adaptive Reconfiguration Control Scheme for an Electro-Hydraulic Position Servo System. 185-196 - Khoury Boutrous, Fatiha Nejjari, Vicenç Puig:
Reliability-Aware Zonotopic Tube-Based Model Predictive Control of a Drinking Water Network. 197-211 - Jan Maciej Kóscielny, Michal Bartys, Michal Syfert, Anna Sztyber
:
A Graph Theory-Based Approach to the Description of the Process and the Diagnostic System. 213-227 - Dusan Krokavec, Anna Filasová:
On Some Ways to Implement State-Multiplicative Fault Detection in Discrete-Time Linear Systems. 229-240 - Taouba Rhouma, Jean-Yves Keller, Mohamed Naceur Abdelkrim:
A Kalman Filter with Intermittent Observations and Reconstruction of Data Losses. 241-253 - Krishnan Srinivasarengan, José Ragot, Christophe Aubrun, Didier Maquin:
Parameter Identifiability for Nonlinear LPV Models. 255-269 - Pengyan Liu, Hong-Xu Li:
Global Behavior of a Multi-Group Seir Epidemic Model with Spatial Diffusion in a Heterogeneous Environment. 271-283 - Przemyslaw Grzegorzewski
, Maciej Romaniuk
:
Bootstrap Methods for Epistemic Fuzzy Data. 285-297 - Adam Wawrzenczyk, Jan Mielniczuk:
Revisiting Strategies for Fitting Logistic Regression for Positive and Unlabeled Data. 299-309 - Pawel Teisseyre:
Joint Feature Selection and Classification for Positive Unlabelled Multi-Label Data Using Weighted Penalized Empirical Risk Minimization. 311-322 - Mahmoud Elmezain
, Amer Malki
, Ibrahim Gad
, El-Sayed Atlam:
Hybrid Deep Learning Model-Based Prediction of Images Related to Cyberbullying. 323-334
Volume 32, Number 3, September 2022
- Justyna Patalas-Maliszewska
, Marco Posdzich, Katarzyna Skrzypek:
Modelling Information for the Burnishing Process in a Cyber-Physical Production System. 345-354 - Anna Wachowicz, Jakub Pytlik, Bozena Malysiak-Mrozek, Krzysztof Tokarz, Dariusz Mrozek:
Edge Computing in IoT-Enabled Honeybee Monitoring for the Detection of Varroa Destructor. 355-369 - Jezabel Molina-Gil, Pino Caballero-Gil, Alexis Quesada-Arencibia
, Gabriele Salvatore de Blasio:
Application of Fuzzy Logic in a Secure Beacon-Based Guidance System for Public Transportation. 371-387 - Chao Cheng, Meng Wang, Jiuhe Wang, Junjie Shao, Hongtian Chen:
An SFA-HMM Performance Evaluation Method Using State Difference Optimization for Running Gear Systems in High-Speed Trains. 389-402 - Aniruddha Bhattacharjya
:
A Holistic Study on the Use of Blockchain Technology in CPS and IoT Architectures Maintaining the CIA Triad in Data Communication. 403-413 - Antonio González, Antonio Sala, Leopoldo Armesto:
Decentralized Multi-Agent Formation Control with Pole-Region Placement via Cone-Complementarity Linearization. 415-428 - Beata Jackowska-Zduniak:
Stochastic Models of the Slow/Fast Type of Atrioventricular Nodal Reentrant Tachycardia and Tachycardia with Conduction Aberration. 429-440 - Xiaoyuan Yu, Wei Xie, Jinwei Yu:
A Single Image Deblurring Approach Based on a Fractional Order Dark Channel Prior. 441-454 - Kiran Kumar Patro, Allam Jaya Prakash, Saunak Samantray
, Joanna Plawiak, Ryszard Tadeusiewicz
, Pawel Plawiak
:
A Hybrid Approach of a Deep Learning Technique for Real-Time ECG Beat Detection. 455-465 - Manuel Kindelan, Pedro González-Rodríguez, Diego Álvarez:
RBF Based Quadrature on the Sphere. 467-478 - Alexander Barkalov, Larysa Titarenko, Malgorzata Mazurkiewicz:
Improving the LUT Count for Mealy FSMS with Transformation of Output Collections. 479-494 - Oussama Kebir
, Issam Nouaouri, Lilia Rejeb
, Lamjed Ben Said:
ATiPreTA: AN Analytical Model for Time-Dependent Prediction of Terrorist Attacks. 495-510
Volume 32, Number 4, 2022
- Sisi Xia, Lin Chen, Siya Liu, Haoran Yang:
A new method for decision making problems with redundant and incomplete information based on incomplete soft sets: From crisp to fuzzy. - Bogdan Lipiec, Marcin Mrugalski, Marcin Witczak, Ralf Stetter:
Towards a health-aware fault tolerant control of complex systems: A vehicle fleet case. - Paulin Kantue, Jimoh O. Pedro:
Integrated fault-tolerant control of a quadcopter UAV with incipient actuator faults. - Lan Yu, Jiaming Liu, Zhuo Sun:
A coordinated optimization of rewarded users and employees in relocating station-based shared electric vehicles. - Grzegorz Surówka, Maciej Ogorzalek:
Segmentation of the melanoma lesion and its border. - Felicita Di Giandomenico, Giulio Masetti, Silvano Chiaradonna:
Redundancy-based intrusion tolerance approaches moving from classical fault tolerance methods. - José Ragot, Gilles Mourot, Maya Kallas:
A data driven fault isolation method based on reference faulty situations with application to a nonlinear chemical process. - Zhongshan Liu, Bin Yu, Li Zhang, Wensi Wang:
A hybrid control strategy for a dynamic scheduling problem in transit networks. - Tomasz Nowak, Michal R. Nowicki, Piotr Skrzypczynski:
Vision-based positioning of electric buses for assisted docking to charging stations. - Yijun Zhong, Chongjun Li, Zhong Li, Xiaojuan Duan:
A proximal-based algorithm for piecewise sparse approximation with application to scattered data fitting. - Jakub Wawrzyniak, Maciej Drozdowski, Eric Sanlaville:
A container ship traffic model for simulation studies. - Danijel Ðosic, Dejan N. Milic, Natasa Kontrec, Caslav Stefanovic, Srðan Milosavljevic, Dusan M. Stefanovic:
Analytical performance analysis of the M2M wireless link with an antenna selection system over interference limited dissimilar composite fading environments.
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.