Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Contact
Current
Archives
Search
Search
Register
Login
Search
Search
Home
>
Archives
>
Vol. 43 No. 2 (2014)
Vol. 43 No. 2 (2014)
Published:
2014-06-19
Articles
A Stochastic Algorithm of Frequent Set Search for Mining Association Rules
L. Savulionienė, L. Sakalauskas
121-132
Continuous Time Markov Chain Models of Voltage Gating of Gap Junction Channels
H. Pranevicius, M. Pranevicius, O. Pranevicius, M. Snipas, N. Paulauskas, F. Bukauskas
133-142
PDF
An Enhanced and Secure Three-Party Password-based Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems
M. S. Farash, M. A. Attari
143-150
PDF
Enhanced Secure Authentication Scheme with Anonymity for Roaming in Mobility Networks
W. -C. Kuo, H. -J. Wei, J. -C. Cheng
151-156
PDF
ADRC Tuning Employing the LQR Approach for Decoupling Uncertain MIMO Systems
P. Teppa-Garran, G. Garcia
157-165
PDF
Non-Identical Synchronization, Anti-Synchronization and Control of Single-Machine Infinite-Bus Power System via Active Control
U. E. Kocamaz, Y. Uyaroğlu
166-174
PDF
Reliable Robust Sampled-Data H∞ Output Tracking Control with Application to Flight Control
Y. Wang, P. Zhou, Q. Wang, D. Duan
175-182
PDF
An Efficient Search Strategy for ACELP Algebraic Codebook by Means of Reduced Candidate Mechanism and Iteration-Free Pulse Replacement
C. -P. Chu, C. -Y. Yeh, S. -H Hwang
183-187
PDF
Adaptive Control for Nonlinear Singular Systems
A. Azarfar, H. T. Shandiz, M. Shafiee
188-198
PDF
Provably Secure Proxy Multi-Signature Scheme Based on ECC
N. Tiwari, S. Padhye, D. He
199-204
PDF
SUMMARIES
SUMMARIES
205-208
PDF
Information
For Readers
For Authors
For Librarians