Abstract is missing.
- Electrical complex of combined power supply on the base of renewables and hybrid correction deviceBoris N. Abramovich, Yuriy A. Sychev, Veronika B. Prokhorova. 3-9 [doi]
- An application of microservices architecture pattern to create a modular computer numerical control systemMaxim Ya. Afanasev, Yuri V. Fedosov, Anastasiya A. Krylova, Sergey A. Shorokhov. 10-19 [doi]
- Synthesis of neurocontroller for multirotor unmanned aerial vehicle based on neuroemulatorSergey Andropov, Alexei Guirik, Mikhail Budko, Marina Budko. 20-25 [doi]
- Network anomaly detection using artificial neural networksSergey Andropov, Alexei Guirik, Mikhail Budko, Marina Budko. 26-31 [doi]
- Syntax description synthesis using gradient boosted treesArseny Astashkin, Kirill Chuvilin. 32-39 [doi]
- Influence of different feature selection approaches on the performance of emotion recognition methods based on SVMDaniil Belkov, Konstantin Purtov, Vladimir S. Kublanov. 40-45 [doi]
- The choice between delta and shift operators for low-precision data representationDenis N. Butusov, Timur I. Karimov, Dmitry I. Kaplun, Artur I. Karimov, Yennun Huang, Szu-Chuang Li. 46-52 [doi]
- Analytical attack modeling and security assessment based on the common vulnerability scoring systemElena Doynikova, Andrey Chechulin, Igor V. Kotenko. 53-61 [doi]
- A concept of continuous user authentication based on behavioral biometricsAleksandr Eremin, Konstantin Kogos, Alina Filina. 62-68 [doi]
- Soft quantization of the production's knowledgebases for multi-agent systemsSvetlana Fomicheva. 69-76 [doi]
- On color-to-gray transformation for distributing color digital imagesValery N. Gorbachev, Elena M. Kaynarova, Ivan K. Metelev, Elena S. Yakovleva. 77-82 [doi]
- Communication network for remote monitoring of wind turbine based on infrared cameraShahid Hussain, Young-Chon Kim. 83-90 [doi]
- Generating long-term trading system rules using a genetic algorithm based on analyzing historical dataDmitry Iskrich, Dmitry Grigoriev. 91-97 [doi]
- Open services provider for supply chainsAnton Ivaschenko, Pavel Sitnikov, Michael Andreev, Oleg Surnin. 98-104 [doi]
- Software platform for development of multimodular robotic systems with asynchronous multithreaded controlArseniy Ivin, Daniil Mikhalchenko. 105-111 [doi]
- Algorithms for ECG analysis in mobile cardiac monitoring systemAlexander Kalinichenko, Svetlana Motorina, Alexey Uskov. 112-117 [doi]
- Anomaly detection in wireless sensor network of the "smart home" systemAnton Kanev, Aleksandr Nasteka, Catherine Bessonova, Denis Nevmerzhitsky, Aleksei Silaev, Aleksandr Efremov, Kseniia Nikiforova. 118-124 [doi]
- An expert system for mitigation actionsIlkka Karanta, Mika Rautila. 125-130 [doi]
- Topic model visualization with IPythonSergey Karpovich, Alexander V. Smirnov, Nikolay Teslya, Andrei Grigorev. 131-137 [doi]
- Adaptive Q-Routing with random echo and route memoryMaksim Kavalerov, Yuliya Shilova, Yuliya Likhacheva. 138-145 [doi]
- The method of analysis pseudo-phase portrait in the problem of recognition of biomedical signalsKarina Khachatryan, Lyudmila Manilo, Aleksei Anisimov. 146-153 [doi]
- Data security evaluation for mobile android devicesIgor Khokhlov, Leon Reznik. 154-160 [doi]
- Data security and quality evaluation framework: Implementation empirical study on android devicesIgor Khokhlov, Leon Reznik, Ashish Kumar, Ankan Mookherjee, Rohan Dalvi. 161-168 [doi]
- iPatient in medical information systems and future of internet of healthOlga Kolesnichenko, Gennady Smorodin, Andrey Mazelis, Alexander Nikolaev, Lev Mazelis, Alexander Martynov, Valeriy Pulit, Sergey Balandin, Yuriy Kolesnichenko. 169-180 [doi]
- Detection of stegosystems using block ciphers for encryption of the embedded messagesValery I. Korzhik, Ivan Fedyanin, Nguyen Duy Cuong. 181-186 [doi]
- The model of the attack implementation on wireless sensor networksVictoria M. Korzhuk, Irina E. Krivtsova, Ilya Shilov. 187-194 [doi]
- Reduction of the feature space for the detection of attacks of wireles sensor networksVictoria M. Korzhuk, Ilya Shilov, Julia Torshenko. 195-201 [doi]
- Identification of executable files on the basis of statistical criteriaIrina E. Krivtsova, Ilya S. Lebedev, Kseniya I. Salakhutdinova. 202-208 [doi]
- Navigation infrastructure for people with disabilitiesKirill A. Kulakov, Yulia V. Zavyalova, Irina M. Shabalina. 209-215 [doi]
- Analysis of the state of information security on the basis of surious emission electronic componentsIlya Lebedev, Nurzhan Bazhayev, Mikhail E. Sukhoparov, Vadim Petrov, Andrey V. Gurtov. 216-221 [doi]
- Method of person identification based on biometric characteristics of touch screen gesturesKirill Lefyer, Anton Spivak. 222-227 [doi]
- Personalized configuration of immaterial productsTatiana Levashova, Michael Pashkin. 228-235 [doi]
- SCA as mobile security threatAlla Levina, Pavel Borisenko, Roman Mostovoy. 236-241 [doi]
- The method of implementation of the numerical IT-Security metrics in management systemsIlya Livshitz, Pavel Lontsikh, Sergey Eliseev. 242-247 [doi]
- The optimization method of the integrated management system security auditIlya Livshitz, Pavel Lontsikh, Sergey Eliseev. 248-253 [doi]
- Heat flux sensor based on ferroelectricGennadij Lukyanov, Ilya Kovalskiy, Sergei Makarov, Thomas Seeger. 254-259 [doi]
- On design of secure E-Services for public authority in the russian federationAnton Makarov, Andrey Shabunin. 260-267 [doi]
- A study of different web-crawler behaviourAlexander Menshchikov, Antonina Komarova, Yurij Gatchin, Anatoly Korobeynikov, Nina Tishukova. 268-274 [doi]
- M3-Driven smart space creation using a DD-WRT-Based deviceSergey Mikhailov, Alexey Kashevnik. 275-283 [doi]
- Deniable encryption protocols based on probabilistic public-key encryptionNikolay A. Moldovyan, Andrey Nikolaevich Berezin, Anatoly Kornienko, Alexander A. Moldovyan. 284-289 [doi]
- Symmetric encryption for error correctionNikolai Moldovyan, Alla Levina, Sergey Taranov. 290-295 [doi]
- TRIK studio: Technical introductionDmitry Mordvinov, Yurii Litvinov, Timofey Bryksin. 296-308 [doi]
- On internet of things educationDmitry Namiot, Manfred Sneps-Sneppe Ventspils, Yousef Ibrahim Daradkeh. 309-315 [doi]
- Fuzzy model for analysing implicit factor influenceDmitry M. Nazarov, Dmitry A. Azarov, Yakov P. Silin, Svetlana V. Begicheva, Gennady N. Smorodin. 316-321 [doi]
- Analysis of E-mail communication activities for detecting patterns of pathological behaviourMichael Negnevitsky, Mark Jyn-Huey Lim, Jacky Hartnett. 322-327 [doi]
- Studies of the human breathingRoman Neronov, Gennadiy Lukyanov, Anna Rassadina, Aleksey Voronin, Aleksey Malyshev, Thomas Seeger. 328-338 [doi]
- Comparison of image quality assessment methods for multi-focused image fusionAndrey Noskov, Andrey Priorov. 339-344 [doi]
- Automated image analysis in multispectral system for cervical cancer diagnosticNatalia A. Obukhova, Alexandr A. Motyko, Uk Kang, Soo-Jin Bae, Dae-Sic Lee. 345-351 [doi]
- Testing of the hypothesis in the research of computer incidents on the basis of the analysis of attributes and their valuesIgor Pantiukhin, Igor A. Zikratov, Anna Sizykh, Addy Christian Crosby Nii. 352-357 [doi]
- Mobile edge computing applications for connectivity managementEvelina Pencheva, Ivaylo Atanasov. 358-364 [doi]
- Mobile edge computing services for dynamic quality of service controlEvelina Pencheva, Ivaylo Atanasov. 365-370 [doi]
- Continuous execution of system dynamics models on input data streamIvan Perl, Alexey Mulyukin, Tatyana Kossovich. 371-376 [doi]
- Isometric-Based method for hardware automated diagnostic of functional status of central nervous systemNikolay Safiannikov, Olga Bureneva, Zoya Aleksanyan. 377-384 [doi]
- Demonstration of a signal enhanced fast Raman sensor for human breath analysisSebastian Schluter, Thomas Seeger, Gennadij Lukyanov. 385-390 [doi]
- Spectral efficiency of uplink SCMA system with CSI estimationAlexander B. Sergienko, Vyacheslav P. Klimentyev. 391-397 [doi]
- Computer-Aided design system for on-board SpaceWire networks simulation and designYuriy Sheynin, Valentin Olenev, Irina Lavrovskaya, Ilya Korobkov, Sergey Kochura, Vadim Shkolniy, Dmitry Dymov. 398-405 [doi]
- Improving the design of arterial blood pressure monitorAlyona Skorobogatova, Anastasiya Sutyagina, Aleksei Anisimov. 406-412 [doi]
- Context-Oriented knowledge management for decision support in business socio-cyber-physical networks: Conceptual and methodical foundationsAlexander V. Smirnov, Kurt Sandkuhl. 413-419 [doi]
- Cellular neural network as a non-linear filter of impulse noiseElena Solovyeva. 420-426 [doi]
- Competence management systems in organisations: A literature reviewViktoriia Stepanenko, Alexey Kashevnik. 427-433 [doi]
- Wavelet analysis of compressed biomedical signalsAndrey B. Stepanov. 434-440 [doi]
- Visual development environment for OpenVXAlexey Syschikov, Boris Sedov, Konstantin Nedovodeev, Sergey Pakharev. 441-447 [doi]
- A systematic review of proactive driver support systems and underlying technologiesAndrei Taramov, Nikolai Shilov. 448-459 [doi]
- Prosthesis control system of the upper limbDaniil Tomashevich, Yulia Bobrova. 451-465 [doi]
- Localising unsafe software resource usage with typed code modelLavrentii Tsvetkov, Anton Spivak. 466-471 [doi]
- Method and tools for automated end-to-end testing of applications for sailfish OSAndrey Vasilyev, Ilya Paramonov, Sergey Averkiev. 471-477 [doi]
- Modeling people behavior in emergency situationsIlya I. Viksnin, Ruslan Gataullin, Alexandr Muradov, Ivan Danilov, Nikita Tursukov, Alexey Chechet. 478-483 [doi]
- Approaches to communication organization within cyber-physical systemsIlya I. Viksnin, Nikita D. Schcepin, Roman O. Patrikeev, Andrei A. Shlykov, Igor I. Komarov. 484-490 [doi]
- Distributed OAIS-Based digital preservation system with HDFS technologyNikita Voinov, Pavel Drobintsev, Vsevolod Kotlyarov, Igor Nikiforov. 491-497 [doi]
- Influence of features discretization on accuracy of random forest classifier for web user identificationAlisa A. Vorobeva. 498-504 [doi]
- Source code quality classification based on software metricsPetr Vytovtov, Evgeny Markov. 505-511 [doi]
- Dynamic routing and spectrum allocation to minimize fragmentation in elastic optical networksYadi Xu, Young-Chon Kim. 512-518 [doi]
- The method for increasing of EEG signal sample entropy stability and its application for human state monitoringYuliya Zhivolupova, Oleg Tcvetkov. 519-525 [doi]
- Formalization of the feature space for detection of attacks on wireless sensor networksIgor A. Zikratov, Victoria M. Korzhuk, Ilya Shilov, Alexey Gvozdev. 526-533 [doi]
- Ensuring data integrity using blockchain technologyIgor Zikratov, Alexander Kuzmin, Vladislav Akimenko, Viktor Niculichev, Lucas Yalansky. 534-539 [doi]