Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 48 matches
- 2015
- Ahmed Aboudonia, Ramy Rashad, Ayman A. El-Badawy:
Time domain disturbance observer based control of a quadrotor unmanned aerial vehicle. ICAT 2015: 1-6 - Emina Alickovic, Zdenka Babic:
The effect of denoising on classification of ECG signals. ICAT 2015: 1-6 - Zijad Bajramovic, Irfan Turkovic, Samir Avdakovic, Adnan Mujezinovic:
Evaluation of the quality of impulse high voltage measuring system. ICAT 2015: 1-5 - Mirza Batalovic, Mesud Hadzialic, Halid Matoruga, Nejra Batalovic:
Partial discharges measurements as an on-site diagnostic tool during after-laying tests of high voltage extruded cable systems. ICAT 2015: 1-5 - Emir Beganovic, Korana Avdagic:
Modeling of voting expert system prototype in classification of acid-base disorders. ICAT 2015: 1-8 - Julija Lapuh Bele, Samira Mujkic, Darko Bele, Samra Mujacic:
User and mobile-friendly learning management system design. ICAT 2015: 1-6 - Josef Börcsök:
Miniaturized safety systems: A way for future tasks in safety engineering. ICAT 2015: 1-6 - Zoran Cico, Adnan Salihbegovic, Omer Gegic, Jasmin Heljic:
Implementation of enterprise GIS in power distribution utilities. ICAT 2015: 1-6 - Alessandro Costalunga, Aurelio Piazzi:
Inverse feedforward control with output polynomial smoothing. ICAT 2015: 1-6 - Kemal A. Delic, Jeff A. Riley:
SLA : Smart log analytics. ICAT 2015: 1-3 - Miha Drole, Petar Vracar, Ante Panjkota, Ivo Stancic, Josip Music, Igor Kononenko, Matjaz Kukar:
Learning from depth sensor data using inductive logic programming. ICAT 2015: 1-6 - Teo Eterovic, Enio Kaljic, Dzenana Donko, Adnan Salihbegovic, Samir Ribic:
An Internet of Things visual domain specific modeling language based on UML. ICAT 2015: 1-5 - Lejla Begic Fazlic, Aja Avdagic:
Prediction of lung nicotine concentration based on novel GA-ANFIS system approach. ICAT 2015: 1-6 - Omar Gorgis, Leonhard M. Reindl:
Fail-safe protection Circuit for industrial safety applications. ICAT 2015: 1-5 - Imen Gueddi, Othman Nasri, Kamel BenOthman, Philippe Dague:
VPCA-based fault diagnosis of spacecraft reaction wheels. ICAT 2015: 1-6 - Lejla Gurbeta, Almir Badnjevic, Emir Zunic, Nejra Pinjo, Fahira Ljumic:
Software package for tracking status of inspection dates and reports of medical devices in healthcare institutions of Bosnia and Herzegovina. ICAT 2015: 1-5 - Kanita Karaduzovic Hadziabdic, Jasminka Hasic Telalovic, Rafal Mantiuk:
Evaluation of noise suppression and luminance reconstruction in high dynamic range image deghosting methods. ICAT 2015: 1-5 - Suada Hadzovic:
Review of Green ICT related policies in Bosnia and Herzegovina. ICAT 2015: 1-4 - Kemal Hajdarevic, Vahidin Dzaltur:
Internal penetration testing of Bring Your Own Device (BYOD) for preventing vulnerabilities exploitation. ICAT 2015: 1-6 - Migdat I. Hodzic, Tarik Namas:
Spatial analysis of target signatures. ICAT 2015: 1-7 - Hamidreza Houshiar, Andreas Nüchter:
3D point cloud compression using conventional image compression for efficient data transmission. ICAT 2015: 1-8 - Miroslav Hudec:
Storing and analysing fuzzy data from surveys by relational databases and fuzzy logic approaches. ICAT 2015: 1-6 - Jacek Kabzinski, Marcin Jastrzebski:
Fuzzy modeling of complex, multi-source, dynamic friction. ICAT 2015: 1-6 - Bakir Karahodza, Dzenana Donko:
Feature enhanced time-aware recommender system. ICAT 2015: 1-6 - Zeynep Kaya, Erol Seke:
A numerically controlled oscillator based on De Moivre's identity and linear approximation: A ROMless NCO. ICAT 2015: 1-4 - Ahmet Kirli:
Design and application of an active suspension system on a 6 DOF half vehicle model. ICAT 2015: 1-6 - Jamal Krini, Josef Börcsök:
Contribution to reducing the critical faults in critical Software Systems. ICAT 2015: 1-7 - Ossmane Krini, Jamal Krini, Abderrahim Krini, Josef Börcsök:
New contribution to the analysis of stochastic processes for critical systems to increase reliability. ICAT 2015: 1-7 - Abderrahim Krini, Jamal Krini, Ossmane Krini, Josef Börcsök:
Investigation of a reliability prevention model for remanufactured systems in automotive. ICAT 2015: 1-7 - Sebastian Kula:
Implementation of the open-software models of switched reluctance motor on model-in-the-loop platform. ICAT 2015: 1-6
skipping 18 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-03 12:51 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint