| 15150 | Application of intelligent technologies and neural network modeling methods in the development of a hybrid learning environment | 2020 | 0 | 0 | (4) |
| 6212 | APPLICATION OF INTEGRAL TRANSFORMS TO A DESCRIPTION OF THE BROWNIAN MOTION BY A NON-MARKOVIAN RANDOM PROCESS | 2009 | 0 | 0 | (2) |
| 13781 | Application of information technology for the analysis of the rating of university | 2018 | 0 | 0 | (4) |
| 7580 | APPLICATION OF HAAR FUNCTIONS WITH CYCLIC TRANSLATIONS IN THE SEARCH FOR COSMIC STRINGS | 2011 | 0 | 0 | (2) |
| 10553 | APPLICATION OF GPU AND PARALLEL PROGRAMMING ON GRID METHODS | 2015 | 1 | 1 | (2) |
| 2873 | APPLICATION OF EM-ALGORITHM IN THE ANALYSIS OF PARAMETERS OF PLASMA TURBULENT PROCESSES | 2011 | 0 | 0 | (2) |
| 15118 | Application of Conditional-Optimal Filter for Synthesis of Suboptimal Control in the Problem of Optimizing the Output of a Nonlinear Differential Stochastic System | 2020 | 0 | 0 | (1) |
| 16708 | Application of Computer Simulation to the Anonymization of Personal Data: Synthesis-Based Anonymization Model and Algorithm | 2023 | 0 | 0 | (3) |
| 16572 | Application of Computer Simulation to the Anonymization of Personal Data: State-of-the-Art and Key Points | 2023 | 0 | 0 | (3) |
| 3512 | APPLICATION OF BRANCHING PROCESSES TO INVESTIGATE THE MAP/G/1/П QUEUEING SYSTEM WITH RETRIALS | 1999 | 4 | 2 | (2) |
| 5783 | APPLICATION OF BAYESIAN FORMALISM TO IDENTIFICATION OF LOGICAL- AND-PROBABILISTIC MODELS FOR ESTIMATING THE LEVEL OF INFORMATION SECURITY OF MODERN INFORMATION AND COMMUNICATION NETWORKS | 2010 | 0 | 0 | (1) |
| 14526 | Application of Anomaly Detection Methods in the Housing and Utility Infrastructure Data | 2019 | 0 | 0 | (3) |
| 7916 | APPLICATION OF ALGEBRAIC LANGUAGE IN IMAGE ANALYSIS: ILLUSTRATIVE EXAMPLE | 2004 | 1 | 0 | (2) |
| 2273 | APPLICATION DRIVEN MEDIATION MIDDLEWARE GRID-INFRASTRUCTURE OF THE RUSSIAN VIRTUAL OBSERVATORY FOR SCIENTIFIC PROBLEM SOLVING OVER MULTIPLE HETEROGENEOUS DISTRIBUTED INFORMATION RESOURCES | 2009 | 0 | 1 | (8) |
| 5354 | APPLICABLE METHODS TO ANALYZE AND OPTIMIZE SYSTEM PROCESSES | 2007 | 1 | 0 | (2) |
| 14281 | Another argument in favor of the Minkowski form of the momentum of light in matter | 2019 | 0 | 0 | (1) |
| 6756 | ANOMALOUS RECRYSTALLIZATION AND AMORPHIZATION OF ION-IMPLANTED GAAS UNDER PICOSECOND LASER-PULSES | 1986 | 0 | 0 | (2) |
| 4085 | ANOMALOUS DIFFUSION AND FRACTIONAL STABLE DISTRIBUTIONS | 2003 | 0 | 0 | (1) |
| 9195 | ANOMALOUS DIFFUSION AND FRACTIONAL ADVECTION-DIFFUSION EQUATION | 2005 | 0 | 0 | (2) |
| 5885 | ANOMALOUS BIASED DIFFUSION IN A RANDOMLY LAYERED MEDIUM | 2010 | 0 | 0 | (2) |
| 16958 | Anomalies Detection in Social Media News Using Machine Learning Approach | 2023 | 0 | 0 | (3) |
| 7508 | ANNUAL SESSION OF THE GENERAL-MEETING OF THE USSR-ACADEMY-OF-SCIENCES - SPEACHES BY THE PARTICIPANTS | 1987 | 0 | 0 | (2) |
| 14007 | Andrei Yurievich Khrennikov and his Research | 2018 | 0 | 0 | (5) |
| 12246 | ANAPHORIC CONNECTORS OF RUSSIA: BETWEEN SUBORDINATION AND CORRELATION | 2011 | 0 | 1 | (1) |
| 6011 | ANALYZING THE FINITE BUFFER BATCH ARRIVAL QUEUE UNDER MARKOVIAN SERVICE PROCESS: GI(X)/MSP/1/N | 2007 | 0 | 0 | (2) |
| 15197 | Analyzing the Effectiveness of Dynamic Network Slicing Procedure in 5G Network by Queuing and Simulation Models | 2020 | 0 | 0 | (5) |
| 7684 | ANALYZING THE EFFECT OF BOUNDED DISTURBANCES ON PROPERTIES OF ADAPTIVE STABILIZATION SYSTEM | 2008 | 0 | 0 | (1) |
| 5195 | ANALYZING STATE-DEPENDENT ARRIVAL IN GI/BMSP/1/INFINITY QUEUES | 2011 | 0 | 0 | (1) |
| 8995 | ANALYZING SHARING STRATEGIES FOR FINITE BUFFER MEMORY IN A ROUTER AMONG OUTGOING CHANNELS | 2014 | 0 | 0 | (1) |
| 17436 | Analyzing Resource Reallocation Policies for 5G NR Network Slicing Using a Controllable Queuing Model with Signals | 2024 | 0 | 0 | (3) |