default search action
Automatic Control and Computer Sciences, Volume 54
Volume 54, Number 1, January 2020
- Konstantin S. Kim, Valery I. Smagin:
Robust Filtering for Discrete Systems with Unknown Inputs and Jump Parameters. 1-9 - Hongying Wang, Shiping Liu:
Position Servo Control Method for Multi-Degree-of-Freedom Pneumatic Manipulators Based on Delayed Feedback. 10-18 - Padideh Rasouli, Ahmad Forouzantabar, Mazda Moattari, Mohammad Azadi:
Disturbance Observer-Based Control of Master and Slave Systems with Input Saturation. 19-29 - Xiangyan Meng, Muyan Liu, Huiqiu Zhou, Jingyi Wu, Fei Xu, Qiufeng Wu:
Fuzzy C-Means on Metric Lattice. 30-38 - Masoud Dashtdar, M. Esmaeilbeig, M. Najafi, M. Esa Nezhad Bushehri:
Fault Location in the Transmission Network Using Artificial Neural Network. 39-51 - M. Niu, Long Yu, Shengwei Tian, Xin Wang, Q. Zhang:
Personal-Bullying Detection Based on Multi-Attention and Cognitive Feature. 52-61 - L. Gandhimathi, G. Murugaboopathi:
A Novel Hybrid Intrusion Detection Using Flow-Based Anomaly Detection and Cross-Layer Features in Wireless Sensor Network. 62-69 - B. J. Eddine, Kh. Boulanouar:
Active Control Design Approach for Roll/Yaw Attitude Satellite Stabilization with Flexible Vibration. 70-79 - Qinli Zhang, Weijie Lu, Ch. Huang, W. Lian, Xiulan Yang:
An Adaptive Vibe Algorithm Based on Dispersion Coefficient and Spatial Consistency Factor. 80-88
Volume 54, Number 2, March 2020
- Dmitry V. Efanov, Valery V. Sapozhnikov, Vladimir V. Sapozhnikov, Dmitrii V. Pivovarov:
The Synthesis Conditions of Completely Self-Testing Embedded-Control Circuits Based on the Boolean Complement Method to the "1-out-of-m" Constant-Weight Code. 89-99 - Zhidan Gu, Qing Li:
Half-Voting Random Forest Algorithm and Its Application in Indoor Pedestrian Navigation. 100-109 - Vladimir V. Dombrovskii, E. A. Andrienko:
The Efficiency of Dynamic Tracking Formulation for Investment Portfolio Selection Problem. 110-116 - Xiaozhuo Wang, Shengwei Tian, Long Yu, Qimeng Yang:
Identification of Local Adverse Drug Reactions in Xinjiang Based on Attention Mechanism and BiLSTM-CNN Hybrid Network. 117-127 - Ehab Safwat, Weiguo Zhang, Ahmed M. Kamel, Mohamed Kassem:
Robustness Analysis of Modified Incremental Nonlinear Dynamic Inversion for Small UAVs. 128-138 - Xia Chen, Wanqin Yang:
Prediction and Analysis of Literature Loan Circulation in University Libraries Based on RBF Neural Network Optimized Model. 139-146 - Guangyou Yang, Chenbo Xi, Xiong Gan, Tuo Zheng:
Energy Efficient Node Deployment Optimization for CTS Based on Cooperative Beamforming in Single-Hop Wireless Sensor Networks. 147-155 - Imene Zerdazi, Mohamed Fezari, Mahdi Ouziala:
Detection of Deception Attacks in Supervisory Control Systems Using Bond Graph. 156-167 - Xiong Zhang, Hong Shangguan, Aiping Ning, Anhong Wang, Jiao Zhang, Sichun Peng:
Pedestrian Detection with EDGE Features of Color Image and HOG on Depth Images. 168-178
Volume 54, Number 3, May 2020
- Yuhang Song, Shengwei Tian, Long Yu:
A Method for Identifying Local Drug Names in Xinjiang Based on BERT-BiLSTM-CRF. 179-190 - Nicholas A. Nechval, Gundars Berzins, Konstantin N. Nechval:
A New Technique of Invariant Statistical Embedding and Averaging Via Pivotal Quantities for Intelligent Constructing Efficient Statistical Decisions under Parametric Uncertainty. 191-206 - Cuifeng Shen, Hanhua Yang:
A New Three-Motor Drive System Using Fuzzy Active Disturbance Rejection Control. 207-215 - Oleg I. Sheluhin, M. A. Kazhemskiy:
Influence of Fractal Dimension on Network Anomalies Binary Classification Quality Using Machine Learning Methods. 216-228 - H. Y. Cai, L. Q. Ran, L. D. Zou, W. Wang:
Heuristic Hybrid Bacterial Foraging Algorithm for the Pose Detection of Backlight Units. 229-237 - Chaimae Ouchicha, Ouafae Ammor, Mohammed Meknassi:
A New Validity Index in Overlapping Clusters for Medical Images. 238-248 - V. S. Mikhaylenko, R. Yu. Kharchenko, V. A. Shcherbinin:
Analysis of the Predicting Neural Network Person Recognition System by Picture Image. 249-258 - Ruitao Peng, Haolin Pang, Haojian Jiang, Yunbo Hu:
Study of Tool Wear Monitoring Using Machine Vision. 259-270 - Vladimir Aristov:
Mathematical Analysis of the Nanosecond Pulse Generator on Two SRD Diodes Used in UWB Radars. 271-278
Volume 54, Number 4, July 2020
- Dmitry V. Efanov, Valery V. Sapozhnikov, Vladimir V. Sapozhnikov:
Organization of a Fully Self-Checking Structure of a Combinational Device Based on Searching for Groups of Symmetrically Independent Outputs. 279-290 - M. Lordwin Cecil Prabhaker, R. Saravana Ram:
Real-Time Task Schedulers for a High-Performance Multi-Core System. 291-301 - Shuqiang Guo, Yaoyao Zhang, Yu Liu:
A Water-Level Measurement Method Using Sparse Representation. 302-312 - Sergei Subbotin:
Neural Network Model Synthesis Based on a Regression Tree. 313-322 - Zhao Meng, Shengwei Tian, Long Yu:
Regional Bullying Text Recognition Based on Two-Branch Parallel Neural Networks. 323-334 - Ali Soltani Sharif Abadi, Pooyan Alinaghi Hosseinabadi, N. B. Soin, Saad Mekhilef:
Chattering-Free Adaptive Finite-Time Sliding Mode Control for Trajectory Tracking of MEMS Gyroscope. 335-345 - Mohamed A. El-Khoreby, S. A. R. Abu-Bakar, Musa Mohd Mokji, Syaril Nizam Omar:
Vehicle Detection and Counting Using Adaptive Background Model Based on Approximate Median Filter and Triangulation Threshold Techniques. 346-357 - Jay Dave, Avijit Dutta, Parvez Faruki, Vijay Laxmi, Manoj Singh Gaur:
Secure Proof of Ownership Using Merkle Tree for Deduplicated Storage. 358-370 - Hua Li:
Application of Image Recognition Based on Grey Relational Analysis. 371-377
Volume 54, Number 5, September 2020
- Slava Yordanova, Milen Slavov, B. Gueorguiev:
Optimisation of Parallel Distributed Compensation for Real Time Control of Level in Carbonisation Column. 379-390 - Keming Kang, Shengwei Tian, Long Yu:
Drug Adverse Reaction Discovery Based on Attention Mechanism and Fusion of Emotional Information. 391-402 - Alexander M. Andronov, Iakov M. Dalinger:
Poisson Flows with Alternating Intensity and Their Application. 403-411 - Jiabao Tao, Dunyao Zhu, Chuan Sun, Duanfeng Chu, Yulin Ma, Haibo Li, Yicheng Li, Tingxuan Xu:
A Novel Method of SOC Estimation for Electric Vehicle Based on Adaptive Particle Filter. 412-422 - Alexey Nikolaevich Shniperov, Aleksandra Vladimirovna Prokofieva:
Steganalysis Method of Static JPEG Images Based on Artificial Immune System. 423-431 - Zhongyang Wang, Di Tan, Guangcheng Ge, Shuaishuai Liu:
Optimal Trajectory Planning and Control for Automatic Lane Change of in Wheel Motor Driving Vehicles on Snow and Ice Roads. 432-445 - El-Habib Bensikaddour, Youcef Bentoutou:
Satellite Image Encryption Based on AES and Discretised Chaotic Maps. 446-455 - Hao Li, Haiyan Kang:
Research on User Behavior Prediction and Profiling Method Based on Trajectory Information. 456-465 - V. A. Bespal'ko, I. Burak, A. S. Rybakov:
Testing Pulse Timing Devices Using Arbitrary Function Generators. 466-473
Volume 54, Number 6, November 2020
- Meenu Sreedharan, Ahmed M. Khedr, Magdi El Bannany:
A Multi-Layer Perceptron Approach to Financial Distress Prediction with Genetic Algorithm. 475-482 - Jiameng Wang, Yunfei Yin, Xiyu Deng:
A Parallel Data Mining Approach Based on Segmentation and Pruning Optimization. 483-492 - Rim Gasmi, Makhlouf Aliouat:
A Weight Based Clustering Algorithm for Internet of Vehicles. 493-500 - Chuanwei Zhang, Rongbo Zhang, Rui Wang, Bo Chang, Jian Ma:
Design of Torque Distribution Strategy for Four-Wheel-Independent-Drive Electric Vehicle. 501-512 - Maryam Mohseni, Amin Ramezani, Mehdi Siahi:
Fault Estimation Based on an Adaptive Observer for a Class of Uncertain Nonlinear Descriptor Systems. 513-528 - Michal Peták, Helena Brozová, Milan Houska:
Modelling of Knowledge via Fuzzy Knowledge Unit in a Case of the ERP Systems Upgrade. 529-540 - Yun-Xiang Guo, Xuan-An Song, Rui-Qing Zhang, Hui Li:
Research on Underwater Acoustic Communication System Based on OFDM-OAM. 541-548 - Oleg I. Sheluhin, Denis V. Kostin, Mikhail G. Gorodnichev:
Multiclass Classification of Anomalous States of Computer Systems by Means of Intellectual Analysis of System Journals. 549-559 - Junlong Cheng, Shengwei Tian, Long Yu, Hongfeng You:
Multi-Attention Mechanism Medical Image Segmentation Combined with Word Embedding Technology. 560-571
Volume 54, Number 7, December 2020
- Yury V. Kosolapov:
On Detecting Code Reuse Attacks. 573-583 - Vladimir M. Deundyak, Anna A. Taranenko:
A Key Distribution System Based on Hadamard Designs. 584-593 - Dmitriy Mikhailovich Murin, Vladimir N. Knyazev:
Using Useful Tasks for Proof-of-Work for Blockchain Systems. 594-600 - Mikhail V. Nevskii, Alexei Yu. Ukhalov:
Linear Interpolation on a Euclidean Ball in ℝn. 601-614 - Roman R. Iarullin:
eT-Reducibility of Sets. 615-618 - Petr Dmitrievich Borisov, Yury V. Kosolapov:
On the Automatic Analysis of the Practical Resistance of Obfuscating Transformations. 619-629 - Nina Yu. Kutsak, Vladislav V. Podymov:
Formal Verification of Three-Valued Digital Waveforms. 630-644 - Alexandra Igorevna Kononova, Larisa G. Gagarina:
Dynamic Model of Growing File-Sharing P2P Network. 645-651 - Nikolay A. Anikin, Alexander Y. Muskatin, Mikhail Borisovich Kuzminsky, Alexandr I. Rusakov:
GRID System Based on European EGI Standards for Large-Scale Calculations by the Original Accelerated Method of Quantum Chemistry. 652-654 - Sergey D. Glyzin, Andrei Yu. Kolesov, Nikolai Kh. Rozov:
A New Approach to Gene Network Modeling. 655-684 - Natalya Sergeevna Medvedeva, Alexander Valeryevich Smirnov:
NP-Completeness and One Polynomial Subclass of the Two-Step Graph Colouring Problem. 685-696 - Nadezhda S. Lagutina, Ksenia V. Lagutina, Elena I. Boychuk, Inna A. Vorontsova, Ilya V. Paramonov:
Automated Rhythmic Device Search in Literary Texts Applied to Comparing Original and Translated Texts as Exemplified by English to Russian Translations. 697-711 - Mikhail V. Nevskii:
Geometric Estimates in Interpolation on an n-Dimensional Ball. 712-718 - Igor S. Anureev:
Operational Semantics of Annotated Reflex Programs. 719-727 - Dmitry A. Kondratyev, Alexey V. Promsky:
The Complex Approach of the C-lightVer System to the Automated Error Localization in C-Programs. 728-739 - Natalya Olegovna Garanina, Igor S. Anureev, Olesya I. Borovikova, Vladimir E. Zyubin:
Methods for Domain Specialization of Verification-Oriented Process Ontologies. 740-751 - Evgeniy P. Kubyshkin, Vladimir A. Kulikov:
Analysis of Occurrence Conditions for Spatially Inhomogeneous Structures of Light Waves in Optical Information Transmission Systems. 752-757 - Sergey Nikolayevich Chukanov:
The Comparison of Diffeomorphic Images based on the Construction of Persistent Homology. 758-771
Volume 54, Number 8, December 2020
- Sergey Victorovich Belim, Nadezda F. Bogachenko:
Hierarchical Scheme for Secret Separation Based on Computable Access Labels. 773-778 - A. P. Baranov, P. A. Baranov:
Probability of a Checksum Error in a Message with Possible Distortion. 779-785 - Vasiliy M. Krundyshev:
Ensuring Cybersecurity of Digital Production Using Modern Neural Network Methods. 786-792 - E. Yu. Pavlenko, K. V. Kudinov:
Ensuring Cyber Resilience of Large-Scale Network Infrastructure Using the Ant Algorithm. 793-802 - Elena B. Aleksandrova, Anna A. Shtyrkina, A. V. Yarmak:
Isogeny-Based Cryptographic Access Control. 803-812 - Elizaveta Zaitseva, Daria S. Lavrova:
Self-Regulation of the Network Infrastructure of Cyberphysical Systems on the Basis of the Genome Assembly Problem. 813-821 - E. Yu. Pavlenko, M. D. Stepanov:
Countering Cyberattacks against Intelligent Bioinspired Systems Based on FANET. 822-828 - A. A. Poltavtsev, A. R. Khabarov, A. O. Selyankin:
Inference Attacks and Information Security in Databases. 829-833 - T. D. Ovasapyan, P. V. Knyazev, Dmitry A. Moskvin:
Application of Taint Analysis to Study the Safety of Software of the Internet of Things Devices Based on the ARM Architecture. 834-840 - Andrei D. Dakhnovich, Dmitry A. Moskvin, Denis V. Ivanov:
A Technique for Safely Transforming the Infrastructure of Industrial Control Systems to the Industrial Internet of Things. 841-849 - Alexey G. Busygin, Artem S. Konoplev:
Blockchain Based System Model for Assessment of Security against Threats Caused by Uneven Distribution of Computational Power. 850-853 - Mikhail A. Eremeev, I. I. Zakharchuk:
A Procedure for Improving Information System Audit Quality by Enhancing Cyberthreat Simulation in Practice. 854-859 - Sergey Victorovich Belim, Svetlana Yuryevna Belim:
A General Scheme for the Pre-Distribution of Keys. 860-863 - Peter D. Zegzhda, V. G. Anisimov, P. V. Sem'yanov, A. F. Suprun, E. G. Anisimov, T. N. Saurenko, V. P. Los':
Approach to the Evaluation of the Efficiency of Information Security in Control Systems. 864-870 - Daria S. Lavrova, N. N. Eliseev:
Detection of Network Attacks Using the Tsetlin Machine. 871-878 - Valery I. Korzhik, D. C. Nguyen, Kseniia Akhrameeva:
An Approach to Assessing Information Security Effectiveness in Control Systems. 879-887 - Elena B. Aleksandrova, I. Sh. Rekhviashvili, A. V. Yarmak:
Lattice-Based Ring Signature with Linking-Based Revocation for Industrial Internet of Things. 888-895 - I. A. Sikarev, V. V. Sakharov, A. V. Garanin:
On Improving the Reliability and Information Security of Information Transmission Systems in Communication Channels of an Unmanned Vessel. 896-899 - Vasiliy M. Krundyshev:
Identification of Cyber Threats in Networks of Industrial Internet of Things Based on Neural Network Methods Using Memory. 900-906 - E. A. Popova, V. V. Platonov:
Reduction of the Number of Analyzed Parameters in Network Attack Detection Systems. 907-914 - K. V. Vasil'eva, E. Yu. Pavlenko, P. V. Sem'yanov:
Analysis of Safety Methods for a New Generation of Automobiles. 915-921 - I. V. Alekseev, Peter D. Zegzhda:
Specification-Based Classification of Network Protocol Vulnerabilities. 922-929 - Peter D. Zegzhda, V. G. Anisimov, A. F. Suprun, E. G. Anisimov, T. N. Saurenko, V. P. Los':
A Model of Optimal Complexification of Measures Providing Information Security. 930-936 - Daria S. Lavrova, R. S. Solovei:
Ensuring the Information Security of Wireless Dynamic Networks Based on the Game-Theoretic Approach. 937-943 - I. T. Latypov, Mikhail A. Eremeev:
Multilevel Model of Computer Attack Based on Attributive Metagraphs. 944-948 - E. N. Shkorkina, Elena B. Aleksandrova:
Securing Post-Quantum Resistance for Quantum-Protected Communication Systems. 949-951 - I. V. Alekseev:
Detection of Distributed Denial of Service Attacks in Large-Scale Networks Based on Methods of Mathematical Statistics and Artificial Intelligence. 952-957 - Anatoliy P. Nyrkov, Sergei S. Sokolov, O. M. Alimov, Sergei G. Chernyi, V. A. Dorovskoi:
Optimal Identification for Objects in Problems on Recognition by Unmanned Underwater Vehicles. 958-963 - I. A. Sikarev, G. B. Chistyakov, A. V. Garanin, Dmitry A. Moskvin:
Algorithms for Enhancing Information Security in the Processing of Navigation Data of Unmanned Vessels of the Technical Fleet of the Inland Waterways of the Russian Federation. 964-967 - Maria A. Poltavtseva, Peter D. Zegzhda:
Building an Adaptive System for Collecting and Preparing Data for Security Monitoring. 968-976 - Daria S. Lavrova, Anna A. Shtyrkina:
The Analysis of Artificial Neural Network Structure Recovery Possibilities Based on the Theory of Graphs. 977-982 - A. D. Fatin, E. Yu. Pavlenko, Maria A. Poltavtseva:
A Survey of Mathematical Methods for Security Analysis of Cyberphysical Systems. 983-987 - Nikolai A. Grusho, Alexander A. Grusho, Elena E. Timonina:
Localizing Failures with Metadata. 988-992 - Maxim O. Kalinin, Vasiliy M. Krundyshev, B. G. Sinyapkin:
Development of the Intrusion Detection System for the Internet of Things Based on a Sequence Alignment Algorithm. 993-1000 - Mikhail E. Sukhoparov, Viktor V. Semenov, Kseniya I. Salakhutdinova, Ilya S. Lebedev:
Identification of Anomalies in the Operation of Telecommunication Devices Based on Local Signal Spectra. 1001-1006 - M. L. Glukharev, M. F. Solomatova:
Access Differentiation in Object-Oriented Databases Based on the Extended Object-Oriented Harrison-Ruzzo-Ullman Model. 1007-1012
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.