


default search action
Information Technology and Control, Volume 45
Volume 45, Number 1, 2016
- Grazina Korvel
, Virginija Simonyte, Vytautas Slivinskas:
A Phoneme Harmonic Generator. 7-12 - Caixue Zhou:
Identity Based Generalized Proxy Signcryption Scheme. 13-26 - Algirdas Sukys, Linas Ablonskis, Lina Nemuraite, Bronius Paradauskas:
A Grammar for ADVANCED SBVR Editor. 27-41 - Robert Piotrowski, Karol Blaszkiewicz, Kazimierz Duzinkiewicz
:
Analysis the Parameters of the Adaptive Controller for Quality Control of Dissolved Oxygen Concentration. 42-51 - Darko Brodic
, Zoran N. Milivojevic:
Text Line Segmentation with the Parametric Water Flow Algorithm. 52-61 - Fushan Wei, Jianfeng Ma, Qi Jiang
, Jian Shen, Chuangui Ma:
Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks. 62-70 - Han-Yu Lin:
Secure Certificateless Two-Party Key Agreement with Short Message. 71-76 - Dan Komosny, Miroslav Voznák
, Sergey Bezzateev, Kathiravelu Ganeshan:
The Use of European Internet Communication Properties for IP Geolocation. 77-85 - Daniel Ceferino Gandolfo
, Lucio Rafael Salinas
, Alexandre Santos Brandão
, Juan Marcos Toibero:
Path Following for Unmanned Helicopter: An Approach on Energy Autonomy Improvement. 86-98 - Jonas Ceponis, Algimantas Venckauskas
, Lina Ceponiene, Andrius Zonys:
Extending Rule Set for Static Code Analysis in .NET Platform. 99-108 - Summaries. 109-113
Volume 45, Number 2, 2016
- Jack Fernando Bravo-Torres
, Yolanda Blanco-Fernández
, Martín López Nores, José Juan Pazos-Arias, Manuel Ramos Cabrer, Alberto Gil-Solla
:
Proactive Discovery and Management of Ride-Sharing Opportunities in Smart Vehicular Ad-Hoc Networks. 121-135 - Lei Chen:
A novel clustering algorithm for large-scale text collection and its incremental version. 136-147 - Mindaugas Gvardinskas, Minija Tamosiunaite:
Approximation of unbiased convex classification error rate estimator. 148-155 - Bahia Yahya-Zoubir, Latifa Hamami, Llies Saadaoui, Rafik Ouared:
Automatic 3D Mesh-Based Centerline Extraction from a Tubular Geometry Form. 156-163 - Dejan Mitrovic, Mirjana Ivanovic
, Milan Vidakovic, Zoran Budimac
:
Siebog: An Enterprise-Scale Multiagent Middleware. 164-174 - Juri Belikov
, Ülle Kotta
, Aleksei Tepljakov
:
Algebraic Approach for Analysis and Control of a Water Tank System. 175-183 - Rafal Brociek
, Damian Slota
:
Application and comparison of intelligent algorithms to solve the fractional heat conduction inverse problem. 184-194 - Jaroslav Karpovic, Linas Ablonskis, Lina Nemuraite, Bronius Paradauskas:
Experimental investigation of transformations from SBVR business vocabularies and business rules to owl 2 ontologies. 195-207 - Wen-Chung Kuo, Chi-Sheng Lin, Chen-Tsun Chuang, Ming-Chih Kao:
Simultaneous and Anonymous Mobile Network Authentication Scheme Based on Chaotic Maps. 208-213 - Gintare Vaideliene, Jonas Valantinas, Petras Razanskas:
On the Use of Discrete Wavelets in Implementing Defect Detection System for. 214-222
Volume 45, Number 3, 2016
- Narjes Khalifa, Rania Linda Filali, Mohamed Benrejeb:
A Fast Selective Image Encryption Using Discrete Wavelet Transform And Chaotic Systems Synchronization. 235-242 - Ying-Hao Hung, Sen-Shan Huang, Yuh-Min Tseng:
A Short Certificate-based Signature Scheme with Provable Security. 243-253 - Aleksas Riskus, Armantas Ostreika
, Antanas Lenkevicius, Vytautas Buksnaitis:
A simple centerline extraction approach for 2D polygons. 254-260 - Luka Filipovic, Bozo Krstajic:
Combined load balancing algorithm in distributed computing environment. 261-266 - Yiwei Yuan, Hui Cao, Yanbin Zhang, Qian Xie, Rui Yao:
Outlier Mining Based on Neighbor-Density-Deviation with Minimum Hyper-Sphere. 267-277 - Hong Xiang, Xiaofeng Xia, Haibo Hu, Sheng Wang, Jun Sang, Chunxiao Ye:
Approaches to access control policy comparison and the inter-domain role mapping problem. 278-288 - Cheng-Chi Lee
, Chun-Ta Li
, Chin-Ling Chen, Shih-Ting Chiu:
A Searchable Hierarchical Conditional Proxy Re-encryption Scheme for Cloud Storage Services. 289-299 - Vytautas Jakstys, Virginijus Marcinkevicius
, Povilas Treigys, Jevgenij Tichonov:
Detection of the Road Pothole Contour in Raster Images. 300-307 - Andrius Krisciunas
, Rimantas Barauskas:
Highly convergent finite elements with diagonal mass matrix for short wave pulse propagation simulation. 308-320 - Stefan Miskovic, Zorica Stanimirovic
:
Hybrid metaheuristic method for solving a multi-period emergency service location problem. 321-337
Volume 45, Number 4, 2016
- Shu-Ching Wang, Shun-Sheng Wang, Kuo-Qin Yan:
New Anatomy of Trustworthy Mobile Cloud Computing. 349-357 - Guo-Qiang Zeng
, Haiyang Liu, Di Wu, Li-Min Li, Lie Wu, Yu-Xing Dai
, Kang-Di Lu
:
A Real-coded Extremal Optimization Method with Multi-non-uniform Mutation for the Design of Fractional Order PID Controllers. 358-375 - Lingfei Xiao:
Uncertainty and Disturbance Estimator based Control of Active Suspensions with a Hydraulic Actuator. 376-383 - Xinghe Ma, Xuhui Bu:
A novel iterative learning control design for linear discrete time systems based on a 2D Roesser system. 384-392 - Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
An advanced elliptic curve cryptography based mutual authentication scheme for session initiation protocol. 393-400 - Alireza Ahangarani
, Abbas Dideban
:
Continuous-Time Delay-Petri Nets as a new tool to Design State Space Controller. 401-411 - Tairen Sun
:
Trajectory-linearization Based Robust Model Predictive Control for Unmanned Surface Vessels with System Constraints. 412-418 - Mindaugas Gvardinskas:
Combined classification error rate estimator for the Fisher linear classifier. 419-429 - Vida Drasute, Renata Burbaite, Vytautas Stuikys, Kristina Bespalova, Sigitas Drasutis, Giedrius Ziberkas:
Personal Generative Library of Educational Resources: A Framework, Model and Implementation. 430-442 - Rimantas Butleris
, Egle Mickeviciute, Lina Nemuraite:
Improving BPMN2 Business Process Model to SBVR Business Vocabulary and Business Rules Transformation with BPMN2 Event Naming Patterns. 443-451

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.