


default search action
Information Technology and Control, Volume 44
Volume 44, Number 1, 2015
- Chunlin Li, Layuan Li:
An Efficient Scheduling Strategy in Mobile Cloud: Model and Algorithm. 7-19 - Matko Saric
, Hrvoje Dujmic, Mladen Russo
:
Scene Text Extraction in IHLS Color Space Using Support Vector Machine. 20-29 - Jie Song:
Performance and Energy Optimization on Terasort Algorithm by Task Self-Resizing. 30-40 - Nasour Bagheri
, Fatemeh Baghernejhad, Masoumeh Safkhani
:
On the Designing of EPC C1 G2 Authentication protocol using AKARI-1 and AKARI-2 PRNGs. 41-53 - Aurimas Rapecka, Gintautas Dzemyda:
A new Recommendation Model for the User Clustering-Based Recommendation System. 54-63 - Kuo-Hui Yeh:
An Efficient Resource Allocation Framework for Cloud Federations. 64-76 - Edmundas Kazimieras Zavadskas, Shankar Chakraborty, Orchi Bhattacharyya, Jurgita Antucheviciene
:
Application of WASPAS Method as an Optimization Tool in Non-traditional Machining Processes. 77-88 - Andrea Monteriù
:
Nonlinear Decentralized Model Predictive Control for Unmanned Vehicles Moving in Formation. 89-97 - Muhammet Ali Nur Oz
, Ibrahim Sener, Ozgur Turay Kaymakci
, Ilker Üstoglu
, Galip Cansever:
Topology Based Automatic Formal Model Generation for Point Automation Systems. 98-111 - Rimantas Baranauskas, Audrone Janaviciute, Raimundas Jasinevicius, Vaidas Jukavicius, Egidijus Kazanavicius
, Vytautas Petrauskas, Arunas Vrubliauskas:
On Multi Agent Systems Intellectics. 112-124 - Summaries. 125-128
Volume 44, Number 2, 2015
- Giovanni Godena, Tomaz Lukman, Marjan Hericko, Stanko Strmcnik:
The Experience of Implementing Model-Driven Engineering Tools in the Process Control Domain. 135-147 - Igoris Belovas
:
Parallel Computing for Mixed-Stable Modelling of Large Data Sets. 148-154 - Irena Markievicz
, Jurgita Kapociute-Dzikiene, Minija Tamosiunaite, Daiva Vitkute-Adzgauskiene
:
Action Classification in Action Ontology Building Using Robot-Specific Texts. 155-164 - Yulei Zhang
, Yongjie Zhang, Yahong Li, Caifen Wang:
Strong Designated Verifier Signature Scheme Resisting Replay Attack. 165-171 - Ugur Erkin Kocamaz
, Alper Göksu, Harun Taskin, Yilmaz Uyaroglu
:
Synchronization of Chaos in Nonlinear Finance System by means of Sliding Mode and Passive Control Methods: A Comparative Study. 172-181 - Robert Piotrowski, Adam Skiba:
Nonlinear fuzzy Control System for dissolved oxygen with aeration System in sequencing batch reactor. 182-195 - Fushan Wei, Jianfeng Ma, Aijun Ge, Guangsong Li, Chuangui Ma:
A Provably Secure Three-Party Password Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems. 195-206 - Kuo-Hui Yeh:
An Anonymous and Lightweight Authentication Scheme for Mobile Devices. 206-215 - Remigijus Leipus, Yang Yang, Lina Dindiene:
On the max-sum equivalence in presence of negative dependence and heavy tails. 215-221 - Andrius Dmuchovskis, Raimundas Jasinevicius, Vaidas Jukavicius, Egidijus Kazanavicius
, Laura Kizauskiene
, Agnius Liutkevicius
:
Solution of the Augmenting Sequence of Linear Programming Problems as a Tool for the Intellectual Home Environment's Self-Training. 221-233 - Sigita Degutiene:
Summaries. 234-236
Volume 44, Number 3, 2015
- Branislav Rehák
:
Large-Scale Systems Control Design via LMI Optimization. 247-253 - Arnas Kaceniauskas
, Ruslan Pacevic
, Migle Staskuniene, Dmitrij Sesok
, Dainius Rusakevicius
, Audrius Aidietis, Giedrius Davidavicius:
Private Cloud Infrastructure for Applications of Mechanical and Medical Engineering. 254-261 - Jun Su, Markiyan Nakonechnyi, Orest Ivakhiv
, Anatoliy Sachenko
:
Developing the Automatic Control System Based on Neural Controller. 262-270 - Ali Durdu
, Yilmaz Uyaroglu
, Ahmet Turan Özcerit
:
A Novel Chaotic System for Secure Communication Applications. 271-278 - Dan Komosny, Miroslav Voznák
, Kathiravelu Ganeshan, Hira Sathu:
Estimation of Internet Node Location by Latency Measurements - The Underestimation Problem. 279-286 - Mildreth I. Alcaraz-Mejia
, Raul Campos-Rodriguez, Ernesto López-Mellado, Antonio Ramírez-Treviño
:
Partial Reconfiguration of Control Systems using Petri Nets Structural Redundancy. 287-301 - Lei Pan, Jiong Shen
, Chengyu Cao:
A Collaborated Multi-controller Strategy by Using L1 Adaptive Augmentation Control for Power-generation Systems with Uncertainties. 302-314 - Khalid A. Darabkh
, Iyad F. Jafar, Raed T. Al-Zubi, Mohammed Hawa
:
A New Image Steganographic Approach for Secure Communication Based on LSB Replacement Method. 315-328 - Prosanta Gope, Tzonelih Hwang:
Security Weaknesses on a Delegation-Based Authentication Protocol for PCSs. 329-333 - Agne Paulauskaite-Taraseviciene, Vaidas Jukavicius, Nerijus Morkevicius, Raimundas Jasinevicius, Vytautas Petrauskas, Vygintas Kazanavicius:
Statistical Evaluation of Four Technologies used for Intelectualization of Smart Home Environment. 334-344 - Sigita Degutiene:
Summaries. 345
Volume 44, Number 4, 2015
- Adel Tellili
, Nouceyba Abdelkrim, Amina Challouf, Mohamed Naceur Abdelkrim:
Reconfigurable Control of Two-Time Scale Systems in Presence of Additive Faults. 357-366 - Andrius Grigutis, Agneska Korvel, Jonas Siaulys:
Ruin Probabilities of a Discrete-time Multi-risk Model. 367-379 - Yunmei Fang, Zhuli Yuan, Juntao Fei:
Adaptive Fuzzy Backstepping Control of MEMS Gyroscope Using Dynamic Sliding Mode Approach. 380-386 - Mohammad Heydari, Seyed Mohammad Sajad Sadough
, Shehzad Ashraf Chaudhry
, Mohammad Sabzinejad Farash
, Mohammad Reza Aref:
An Improved Authentication Scheme for Electronic Payment Systems in Global Mobility Networks. 387-403 - Yanrong Lu, Lixiang Li
, Haipeng Peng, Yixian Yang:
A Three-Party Password-based Authenticated Key Exchange Protocol for Wireless Communications. 404-409 - Tzu-Hung Lin, Cheng-Yu Yeh, Shaw-Hwa Hwang:
Efficient statistics-based algebraic codebook search algorithms derived from RCM for an ACELP speech coder. 410-419 - Domen Zupancic, Mitja Lustrek, Matjaz Gams:
Trade-off between Energy Consumption and Comfort Experience in Smart Buildings. 420-432 - Krzysztof Cpalka
, Krystian Lapa
, Andrzej Przybyl
:
A new approach to design of control systems using genetic programming. 433-442 - Rolandas Gircys, Agnius Liutkevicius
, Arunas Vrubliauskas, Egidijus Kazanavicius
:
Blood Pressure Estimation Accoording to Photoplethysmographic Signal Steepness. 443-450 - Algimantas Venckauskas
, Vacius Jusas
, Kestutis Paulikas, Jevgenijus Toldinas
:
Investigation of Artifacts Left by BitTorrent Client on the Local Computer Operating under Windows 8.1. 451-461

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.