Authors
|
Title
|
Pages
|
Abramovich B., Sychev Y., Prokhorova V.
|
Electrical Complex of Combined
Power Supply on the Base of Renewables and Hybrid Correction Device
|
3
|
Afanasev M., Fedosov Y., Krylova A., Shorokhov S.
|
An Application of Microservices Architecture Pattern to Create a Modular
Computer Numerical Control System
|
10
|
Andropov
S., Guirik A., Budko Mikh, Budko Mar.
|
Synthesis
of Neurocontroller for Multirotor
Unmanned Aerial Vehicle Based on Neuroemulator
|
20
|
Andropov
S., Guirik A., Budko Mikh., Budko Mar.
|
Network Anomaly Detection
using Artificial Neural Networks
|
26
|
Astashkin A., Chuvilin K.
|
Syntax Description Synthesis
Using Gradient Boosted Trees
|
32
|
Belkov D., Purtov K., Kublanov V.
|
Influence of Different
Feature Selection Approaches on the Performance of Emotion Recognition
Methods Based on SVM
|
40
|
Butusov D., Karimov T., Kaplun D., Karimov A., Huang A., Li S.
|
The Choice between Delta and
Shift Operators for Low-Precision Data Representation
|
46
|
Doynikova E., Chechulin A., Kotenko
I.
|
Analytical Attack Modeling and
Security Assessment based on the Common Vulnerability Scoring System
|
53
|
Eremin A., Kogos K., Filina A.
|
A Concept of Continuous User
Authentication Based on Behavioral Biometrics
|
62
|
Fomicheva S.
|
Soft Quantization of the
Production’s Knowledgebases for Multi-agent Systems
|
69
|
Gorbachev V., Kaynarova
E., Metelev I., Yakovleva
E.
|
On Color-to-Gray Transformation for Distributing Color
Digital Images
|
77
|
Hussain S., Kim Y.
|
Communication
Network for Remote Monitoring of Wind Turbine based on Infrared Camera
|
83
|
Iskrich D., Grigoriev D.
|
Generating
Long-Term Trading System Rules Using a Genetic Algorithm Based on Analyzing
Historical Data
|
91
|
Ivaschenko A., Sitnikov P., Andreev M., Surnin O.
|
Open Services Provider for
Supply Chains
|
98
|
Ivin A., Mikhalchenko D.
|
Software Platform for
Development of Multimodular Robotic Systems with
Asynchronous Multithreaded Control
|
105
|
Kalinichenko A., Motorina
S., Uskov A.
|
Algorithms for ECG Analysis
in Mobile Cardiac Monitoring System
|
112
|
Kanev A., Nasteka A., Bessonova C., Nevmerzhitsky D., Silaev A., Efremov A., Nikiforova
K.
|
Anomaly Detection in
Wireless Sensor Network of the “Smart Home” System
|
118
|
Karanta I., Rautila M.
|
An Expert System for
Mitigation Actions
|
125
|
Karpovich S., Smirnov A., Teslya N., Grigorev A.
|
Topic Model Visualization
with IPython
|
131
|
Kavalerov M., Shilova Y., Likhacheva Y.
|
Adaptive Q-routing with
Random Echo and Route Memory
|
138
|
Khachatryan K., Manilo
L., Anisimov A.
|
The Method of Analysis
Pseudo-phase Portrait in the Problem of Recognition of Biomedical Signals
|
146
|
Khokhlov I., Reznik L.
|
Data Security Evaluation for
Mobile Android Devices
|
154
|
Khokhlov
I., Reznik L., Ashish Kumar, Mookherjee
A., Dalvi R.
|
Data Security and Quality Evaluation Framework:
Implementation Empirical Study on Android Devices
|
161
|
Kolesnichenko O., Smorodin
G., Mazelis A., Nikolaev
A., Mazelis L., Martynov
A., Pulit V., Balandin S., Kolesnichenko Y.
|
iPatient in Medical Information Systems and future of Internet
of Health
|
169
|
Korzhik V., Fedyanin I., Cuong N.
|
Detection of Stegosystems Using Block Ciphers for Encryption of the
Embedded Messages
|
181
|
Korzhuk V., Krivtsova I., Shilov
I.
|
The Model of the Attack Implementation
on Wireless Sensor Networks
|
187
|
Korzhuk V., Shilov I., Torshenko J.
|
Reduction of the Feature Space for the Detection of
Attacks of Wireles Sensor Networks
|
195
|
Krivtsova I., Lebedev I., Salakhutdinova K.
|
Identification of Executable
Files on the basis of Statistical Criteria
|
202
|
Kulakov K., Zavyalova Y., Shabalina I.
|
Navigation Infrastructure for People with Disabilities
|
209
|
Lebedev I., Bazhayev N., Sukhoparov M., Petrov V., Gurtov A.
|
Analysis of the State of
Information Security on the Basis of Surious
Emission Electronic Components
|
216
|
Lefyer K., Spivak A.
|
Method of Person
Identification Based on Biometric Characteristics of Touch Screen Gestures
|
222
|
Levashova T., Pashkin M.
|
Personalized Configuration of Immaterial Products
|
228
|
Levina A., Borisenko P., Mostovoy R.
|
SCA as Mobile Security Threat
|
236
|
Livshitz I., Lontsikh P., Eliseev S.
|
The Method of Implementation
of the Numerical IT-Security Metrics in Management Systems
|
242
|
Livshitz I., Lontsikh P., Eliseev S.
|
The Optimization Method of
the Integrated Management System Security Audit
|
248
|
Lukyanov G., KovalskiyI., Makarov S.,
Seeger T.
|
Heat Flux Sensor Based on
Ferroelectric
|
254
|
Makarov A., Shabunin
A.
|
On Design of Secure
E-Services for Public Authority in the Russian Federation
|
260
|
Menshchikov A., Komarova A., Gatchin Y., Korobeynikov A., Tishukova N.
|
A Study of Different
Web-Crawler Behaviour
|
268
|
Mikhailov S., Kashevnik A.
|
M3-Driven Smart Space Creation Using a DD-WRT-Based
Device
|
275
|
Moldovyan N., Berezin A., Kornienko A., Moldovyan A.
|
Deniable Encryption
Protocols Based on Probabilistic Public-Key Encryption
|
284
|
Moldovyan N., Levina A., Taranov S.
|
Symmetric Encyption for Error
Correction
|
290
|
Mordvinov D., Litvinov Y., Bryksin T.
|
TRIK Studio: Technical
Introduction
|
296
|
Namiot D., Sneps-Sneppe M., Daradkeh Y.
|
On Internet of Things
Education
|
309
|
Nazarov D., Azarov D., Silin Y., Begicheva S., Smorodin G.
|
Fuzzy Model for Analysing Implicit Factor Influence
|
316
|
Negnevitsky M., Lim M., Hartnett J.
|
Analysis of E-mail
Communication Activities for Detecting Patterns of Pathological Behaviour
|
322
|
Neronov
R., Lukyanov G., Rassadina
A., Voronin A., Malyshev
A., Seeger T.
|
Studies of the Human
Breathing
|
328
|
Noskov A., Priorov A.
|
Comparison of Image Quality Assessment Methods for
Multi-focused Image Fusion
|
339
|
Obukhova N., Motyko A., Kang U., Bae S., Lee D.
|
Automated Image Analysis in
Multispectral System for Cervical Cancer Diagnostic
|
345
|
Pantiukhin I., Zikratov I., Sizykh A., Сhristian A.
|
Testing of the Hypothesis in
the Research of Computer Incidents on the Basis of the Analysis of Attributes
and Their Values
|
352
|
Pencheva E., Atanasov I.
|
Mobile Edge Computing Applications
for Connectivity Management
|
358
|
Pencheva E., Atanasov I.
|
Mobile Edge Computing
Services for Dynamic Quality of Service Control
|
365
|
Perl I., Mulyukin
A., Kossovich T.
|
Continuous
Execution of System Dynamics Models on Input Data Stream
|
371
|
Safiannikov N., Bureneva
O., Aleksanyan Z.
|
Isometric-based Method for
Hardware Automated Diagnostic of Functional Status of Central Nervous System
|
377
|
Schlüter S., Seeger T., Lukyanov G.
|
Demonstration of a Signal
Enhanced Fast Raman Sensor for Human Breath Analysis
|
385
|
Sergienko A., Klimentyev V.
|
Spectral Efficiency of
Uplink SCMA System with CSI Estimation
|
391
|
Sheynin Y., Olenev V., Lavrovskaya I., Korobkov I., Kochura S., Shkolniy V., Dymov D.
|
Computer-Aided Design System
for On-board SpaceWire Networks Simulation and
Design
|
398
|
Skorobogatova A., Sutyagina A., Anisimov A.
|
Improving the Design of
Arterial Blood Pressure Monitor
|
406
|
Smirnov
A., Sandkuhl K.
|
Context-Oriented Knowledge
Management for Decision Support in Business Socio-Cyber-Physical Networks:
Conceptual and Methodical Foundations
|
413
|
Solovyeva E.
|
Cellular Neural Network as a
Non-linear Filter of Impulse Noise
|
420
|
Stepanenko V., Kashevnik A.
|
Competence
Management Systems in Organisations: a Literature
Review
|
427
|
Stepanov A.
|
Wavelet Analysis of
Compressed Biomedical Signals
|
434
|
Syschikov A., Sedov B., Nedovodeev K., Pakharev S.
|
Visual Development
Environment for OpenVX
|
441
|
Taramov A., Shilov N.
|
A Systematic Review of
Proactive Driver Support Systems and Underlying Technologies
|
448
|
Tomashevich D., Bobrova Y.
|
Prosthesis Control System of the Upper Limb
|
460
|
Tsvetkov L., Spivak A.
|
Localising Unsafe Software Resource Usage with Typed Code Model
|
466
|
Vasilyev A., Paramonov I., Averkiev S.
|
Method and Tools for
Automated End-to-end Testing of Applications for Sailfish OS
|
472
|
Viksnin I., Gataullin R., Muradov A., Danilov I., Tursukov N., Chechet A.
|
Modeling People Behavior in Emergency Situations
|
478
|
Viksnin I., Schcepin N., Patrikeev R., Shlykov A., Komarov I.
|
Approaches To Communication
Organization Within Cyber-Physical Systems
|
484
|
Voinov N., Drobintsev P., Kotlyarov V., Nikiforov I.
|
Distributed OAIS-based
Digital Preservation System with HDFS Technology
|
491
|
Vorobeva A.
|
Influence of Features
Discretization on Accuracy of Random Forest Classifier for Web User
Identification
|
498
|
Vytovtov P., Markov E.
|
Source Code Quality
Classification Based On Software Metrics
|
505
|
Xu Y., Kim Y.
|
Dynamic Routing and Spectrum
Allocation to Minimize Fragmentation in Elastic Optical Networks
|
512
|
Zhivolupova Y., Tcvetkov
O.
|
The Method for Increasing of
EEG Signal Sample Entropy Stability and its Application for Human State Monitoring
|
519
|
Zikratov I., Korzhuk V., Shilov I., Gvozdev A.
|
Formalization of the Feature
Space for Detection of Attacks on Wireless Sensor Networks
|
526
|
Zikratov I., Kuzmin A., Akimenko V., Niculichev V., Yalansky L.
|
Ensuring Data Integrity
Using Blockchain Technology
|
534
|