10851

Публикации
Publications

1538

Автори
Autors

10852

Ключови думи
Keywords

Търсене на публикации
(Publication Search)

Необходимо е да зададете поне 3 символа за всяко поле, което използвате като критерий.
You need to specify at least 3 characters for each field included in the search criteria.

# Автор
Autor
Заглавие
Title
301 CRISTEA,P.D., Use of Intelligent Evolutionary Agents in the Analysis of Genomic Signals (2008)
302 KOUNTCHEV, R. K., TODOROV,V., KOUNTCHEVA,R., Contours Extraction in Grayscale Images of Sign Language Interpreter (2008)
303 KOUNTCHEV, R. K., TODOROV,R., KOUNTCHEVA,R., Adaptive Histogram Modification for Enhancement the Visual Quality of Latent Fingerprints (2008)
304 KOUNTCHEV, R. K., TODOROV,V., KOUNTCHEVA,R., Adaptive preprocessing of scanned documents (2008)
305 SAAD,E.M., HAMDY,A., ABUTALEB,M.M., Reconfigurable Hardware Implementation of a Fast and Efficient Motion Detection Algorithm (2008)
306 MIRCEA,B., Some aspects regarding the cooperative control problem for flying wing air vehicles (2008)
307 NIKOLOV, E. K., Transfer Function Representation Approach of the LWR Macroscopic Traffic Flow Model Based on the Green Function (2008)
308 Huang,P.-H., The Segment Approach Time Axis Algorithm for Proxy Bidding Application in Online Auction (2008)
309 ARSHAD,N.H., SHAH,S.N., MOHAMED,A., MAMAT,A.M., Database Encryption Using Enhanced Affine Block Cipher Algorithm (2008)
310 MOHAMED,A., ARIFFIN,N.Z., ARSHAD,N.H., LIN,Y.M., MOKHTAR,F.M., Electronic Business Communities Model Using Agent Technology (2008)
311 CATALIN,C., CATRINA,C., Automated dialog systems for Romanian language (2008)
312 SOFONEA,D.F., Some properties from q-Calculus (2008)
313 TURBATU,S., THE FOX’S H-FUNCTION AND UNSTEADY HYDROMAGNETIC BOUNDARY - LAYER IN A ROTATING MEDIUM (2008)
314 CICORTAS,A., IORDAN,V., NAAJI,A., Ontologies for Competence Description in Multi-agent Systems (2008)
315 WANG,Y.-M., TRAORE,S., KERH,T., Using Artificial Neural Networks for Modeling Suspended Sediment Concentration (2008)
316 WANG,Y.-M., TRAORE,S., KERH,T., A Climatic Data Information Model for Computing Crop Yields in Burkina Faso (2008)
317 BAKMAZ,B., BAKMAZ,M., BOJKOVIC,Z., Security Aspects in Wireless Networks (2008)
318 Zubi,Z.S., I-Extended Databases (2008)
319 BOJKOVIC,Z., Some IP Security Issues (2008)
320 LIN,Z., GUANQUN,Q., LI,Z., Clustering Analysis of Motif Significance Profile in Software Networks (2008)
321 QI,X.G., Stability of a star-shaped coupled network of strings and beams (2008)
322 Guinee,R.A., A Novel Correlation Pulse Echo Methodology for Transmission Line Fault Identification and Location using Pseudorandom Binary Sequences (2008)
323 Tsakiris,N., Knowles,G., Enabling Gigabit IP for Intelligent Systems (2008)
324 RACUCIU,C., JULA,N., BALAN,C., ADOMNICAI,C., Aspects of Airborne Continuous Surveillance Systems. Practical Image Encryption Module (2008)
325 BELDJEHEM,M., Toward a Theory of Validation of Hybrid MinMax FuzzyNeuro Systems (2008)
326 Stoynov,P., Application of geographic information systems and stochastic methods in the research of global changes (2008)
327 SKINNER,G., Investigation of Technology-based Entrepreneurship and Issues with ICT Innovation in Australia (2008)
328 ADAM,G.K., GARANI,G., SAMARAS,N., SROVNAL,V., KOZIOREK,J., KASIK,V., KOTZIAN,J., Design and Development of Embedded Control System for a Lime Delivery Machine (2008)
329 PETR,M., JAN,M., System for Measuring and Collecting Data. Results of Measuring on Combined System. (2008)
330 PAVLIKA,V., A numerical algorithm for solving Laplace and Pisson type partial differential equations on a uniform rectangular mesh with Dirichlet and Neumann boundary conditions (2008)
331 Singh,M., Waddell,D., Rahim,M., Business to Employee (B2E) E-Business Model: a Service to Employees or Organisational Management (2008)
332 ZHUANG,X.D., MASTORAKIS,N.E., Region Shrinking and Image Segmentation Based on the Compressing Vector Field (2008)
333 KLIMA,J., A New Mathematical Model Based on Laplace and Modified Z Transform For Investigation of Three-Phase Switched Circuits (2008)
334 KOUNTCHEV, R. K., RUBIN,S., MILANOVA,M., TODOROV,V., KOUNTCHEVA,R., Cognitive Image Representation Based on Spectrum Pyramid Decomposition (2008)
335 Mattsson,T., A REAL-TIME INTRUSION PREVENTION SYSTEM FOR COMMERCIAL ENTERPRISE DATABASES AND FILE SYSTEMS (2008)
336 CIUFUDEAN,C., Optimizing Distributed Systems Using Swarm Intelligence (2008)
337 KRISHNAPILLAI,K., JONES,R., PENG,D., Fatigue based structural design optimization implementing a generalized Frost-Dugdale crack growth law (2008)
338 MALYK,O.P., Short-range Principle in the Theory of the Charge Carrier Scattering in CdHgSe Solid Solution (2008)
339 SMITKOVA.M., JANICEK,F., Simulation and optimization of Westinghouse cycles (2008)
340 Aylward,N., The Synthesis of Biological Molecules in the Universe (2008)
341 WEIWEI,W., QIANG,C., HUI,H., Effects of Management Innovation on Industry Development: the Example of Telecommunication Industry in China (2008)
342 COSTA,E.E., TERRA,L.B., JAMIL,G.L., Mathematical Programming Applied in the Optimal Power Flow Problem DC: Case Studies of Market Needs (2008)
343 Saad,E.M., Awadalla,M.H., Saleh,M.A., Keshk,H., Darwish,R.R., A data gathering algorithm for a mobile sink in largescale sensor networks (2008)
344 MADUREIRA,A., SANTOS,J., PEREIRA,I., Cooperative Intelligent System for Manufacturing Scheduling (2008)
345 ADRIAN,C., CORNELIU,A., MIRCEA,B., The simulation of the adaptive systems using the MIT rule (2008)
346 MIRCEA,B., RADU,P., ADRIAN,C., Some Aspects Regarding the Adaptive Control of a Flying Wing- Micro Air Vehicle with Flexible Wing Tips (2008)
347 YOSHIKAWA,T., TSUKAMOTO,K., HOURAI,Y., FUKUI,K., Parameter Tuning and Evaluation of an Affinity Prediction Using Protein-Protein Docking (2008)
348 DELL’AQUILA,C., DI TRIA,F., LEFONS,E., TANGORRA,F., Business Intelligence Solution for University Management (2008)
349 KAWASAKI,Y., SASAKI,H., YAMAGUCHI,H., YAMAGUCHI,Y., Cognitive Conditions in Text Reading on a Visual Display Terminal by Different Age Groups (2008)
350 Huang,P.H., A Research of the Elliptic Curve Cryptology Applies to the IPv6 Protocol (2008)