default search action
Automatic Control and Computer Sciences, Volume 55
Volume 55, Number 1, January 2021
- A. Belherazem, Mohamed Chenafa:
Passivity Based Adaptive Control of a Single-Link Flexible Manipulator. 1-14 - Mohamed Sayah, Djillali Guebli, Noureddine Zerhouni, Zeina Al Masry:
Deep LSTM Enhancement for RUL Prediction Using Gaussian Mixture Models. 15-25 - Xin Zhang, Jing Zhang, Wenru Lu, Wenbo Xu:
Research on Fractional Sliding Mode Synchronous Control of Robotic ARMS under Uncertain Disturbance. 26-37 - Arman Mohammadi, Amin Ramezani:
An Analytical Robust Sensor Fault Detection and Fault Tolerant Control in Quadrotor. 38-52 - Na Guo, Caihong Li, Di Wang, Yong Song, Guoming Liu, Tengteng Gao:
Local Path Planning of Mobile Robot Based on Long Short-Term Memory Neural Network. 53-65 - Nicholas A. Nechval, Gundars Berzins, Konstantin N. Nechval, Zhanna Tsaurkubule:
A Novel Unified Computational Approach to Constructing Shortest-Length or Equal Tails Confidence Intervals in Terms of Pivotal Quantities and Quantile Functions. 66-84 - Sergei Parshutin, Arnis Kirshners, Yuri Kornijenko, Vitaly M. Zabiniako, Madara Gasparovica-Asite, Aivars Rozkalns:
Classification with LSTM Networks in User Behaviour Analytics with Unbalanced Environment. 85-91 - Seyed Mohammad Sadegh Hosseinimoghadam, Masoud Dashtdar, M. Esa Nezhad Bushehri, Majid Dashtdar:
Size Optimization of Distributed Generation Resources in Microgrids with Considering Uncertainty Units Based on Scenario Tree. 92-101 - Chunming Wu, Ying Zhang:
MTCNN and FACENET Based Access Control System for Face Detection and Recognition. 102-112
Volume 55, Number 2, March 2021
- Dmitry V. Efanov, Valery V. Sapozhnikov, Vladimir V. Sapozhnikov:
Organization of Testing of Combinational Devices Based on Boolean Complement to Constant-Weight "1-out-of-4" Code with Signal Compression. 113-124 - Mehmet Bozuyla, Abdullah T. Tola:
Designing a Novel Transportation System Using Microscopic Models and Multi-Agent Approach. 125-136 - Prabhat Kumar, Govind P. Gupta, Rakesh Tripathi:
Design of Anomaly-Based Intrusion Detection System Using Fog Computing for IoT Network. 137-147 - Fang Jin, Xingrong Qin, Chunqiang Chen, Yanju Liu:
State Estimation of Networked Control Systems over Digital Communication Channels. 148-154 - Seyed Mohammad Sadegh Hosseinimoghadam, Masoud Dashtdar, Majid Dashtdar:
Improving the Sharing of Reactive Power in an Islanded Microgrid Based on Adaptive Droop Control with Virtual Impedance. 155-166 - Qingyu Zou, Yanlin Li, Xu Yang, Zhenxiong Zhou:
Identification of Key Nodes in Directed Network Based on Overlapping Community Structure. 167-176 - Niklavs Barkovskis, Kaspars Ozols, Atis Elsts:
Survey of Low-Power Wireless Network Technologies for the Internet of Things. 177-194 - Jiming Chen, Liping Chen:
Multi-Dimensional Color Image Recognition and Mining Based on Feature Mining Algorithm. 195-201 - Hao Zhang, Xianggong Hong, Li Zhu:
Detecting Small Objects in Thermal Images Using Single-Shot Detector. 202-211
Volume 55, Number 3, May 2021
- Svetlana V. Budnik, Vladimir N. Shashihin:
Stabilization of Nonlinear Systems with Dynamic Chaos. 213-221 - Guangcheng Ge, Shuaishuai Liu, Jie Xu:
Research on Joint Control of Four-Wheel Steering and Electronic Differential on Account of Pavement Parameter Identification. 222-233 - Boris V. Sokolov, Anton Kolosov:
Blockchain Technology as a Platform for Integrating Corporate Systems. 234-242 - Mengxiong Lu, Zhicheng Xu:
Integrated Handling and Stability Control with AFS and DYC for 4WID-EVs via Dual Sliding Mode Control. 243-252 - Oleg I. Sheluhin, Sergey A. Sekretarev:
Concept Drift Detection in Streaming Classification of Mobile Application Traffic. 253-262 - S. M. Abdul Kalam Azad, K. Srinivasan:
Dynamic Network Scheduler for Customized Aperiodic Communication in Networked Control System. 263-276 - Jun Wang, Ni Wang:
Improving Life Cycle of the Underwater Wireless Sensor Network. 277-286 - Seddik Rabhi, Fouzi Semchedine, Nader Mbarek:
An Improved Method for Distributed Localization in WSNs Based on Fruit Fly Optimization Algorithm. 287-297 - Huaichao Wang, Jianli Ding, Tao Mu, Xinwei Chen:
Indoor Localization Algorithm of Terminal Based on RSS Feature Extension and Spectral Regression Kernel Discriminant Analysis. 298-309
Volume 55, Number 4, July 2021
- Yu Zhang, Jinfang Zeng, Youming Li, Da Chen:
Convolutional Neural Network-Gated Recurrent Unit Neural Network with Feature Fusion for Environmental Sound Classification. 311-318 - Tanusree Chatterjee, Sushmita Ruj, Sipra Das Bit:
Efficient Data Storage and Name Look-Up in Named Data Networking Using Connected Dominating Set and Patricia Trie. 319-333 - Yanming Quan, Lingwei Huang, Lei Ma, Yiming He, Ronghui Wang:
Neural Network-Based Indoor Autonomously-Navigated AGV Motion Trajectory Data Fusion. 334-345 - Liyi Zhang, Mingyue Fu, Teng Fei, Jingyi Liang:
The Artificial Fish Swarm Algorithm Optimized by RNA Computing. 346-357 - Arthur M. Stepchenko:
Land-Use Classification Using Convolutional Neural Networks. 358-367 - Xin Zhang, Wenbo Xu, Wenru Lu:
The Control Strategy of Manipulator Based on Fractional-Order Iterative Learning. 368-376 - Stamatis Mastromichalakis, Spiros Chountasis:
A Moment Based Fractional Fourier Transform Scheme for MR Image Classification. 377-387 - Qinli Zhang, Weijie Lu, Xiulan Yang:
A Novel Low-Rank and Sparse Decomposition Model and Its Application in Moving Objects Detection. 388-395 - Vladimir Aristov, Eduard Lobanovs, Romans Maliks, Maksis Celitans, J. Simanovichs, S. Bondars, R. Gailis:
Ultra-Wideband Pulse Radar Mounted on an Unmanned Aerial Vehicle for the Monitoring of Moving Objects. 396-405
Volume 55, Number 5, September 2021
- B. A. Haseena, K. Srinivasan:
Design and Development of Constrained Next-Generation Controller with and without Event Triggered Mechanism for Single Link Robot Arm. 407-418 - Weiwei Zou, Haiying Dong, Kaiqi Liu, Miaohong Su:
Neural Network Internal Model Control of VSC-MTDC. 419-430 - Qiaoqiao Lou, Zhijin Zhao:
Active Rendezvous Broadcast Algorithm Based on Channel Weight in Cognitive Radio Ad Hoc Networks. 431-443 - D. R. Denslin Brabin, Sriramulu Bojjagani, D. R. Denslin Braja:
A Visible Watermarking Scheme for JPEG Images Based on Modification of Frequency Coefficients. 444-453 - Hongyao Ju, Gaoyun Lv:
Research on a Performance Enhancement Method for Heavy Load Network. 454-468 - Nicholas A. Nechval, Gundars Berzins, Konstantin N. Nechval, Zhanna Tsaurkubule:
Intelligent Constructing Efficient Statistical Decisions via Pivot-Based Elimination of Unknown (Nuisance) Parameters from Underlying Models. 469-489 - Zhong-xun Wang, Kai-yue Sha, Xinglong Gao:
Digital Image Encryption Test System Based on FPGA and Nios II Soft Core. 490-499
Volume 55, Number 6, November 2021
- Noor Cholis Basjaruddin, Didin Saefudin, Nela Andriani:
Hardware Simulation of Camera-Based Adaptive Cruise Control Using Fuzzy Logic Control. 501-509 - Shuaishuai Liu, Di Tan:
Recognition of Driver Type in Complex Driving Environment. 510-521 - Oleg I. Sheluhin, Denis V. Kostin, Mikhail V. Polkovnikov:
Forecasting of Computer Network Anomalous States Based on Sequential Pattern Analysis of "Historical Data". 522-533 - Yingjun Sang, Tingyu Sui, Peng Kang, Zizhen Ding, Xuan Zhao, Yuanyuan Fan:
Study on Load Monitoring and Demand Side Management Strategy of Chemical Enterprise. 534-545 - Saikat Gochhait, Shariq Aziz Butt, Emiro De la Hoz-Franco, Qaisar Shaheen, Jorge Luis Díaz Martinez, Gabriel Piñeres-Espitia, Darwin Mercado-Polo:
A Machine Learning Solution for Bed Occupancy Issue for Smart Healthcare Sector. 546-556 - Chi Zhang, Huanyu Li, Hui Li, Zhi-Yang Lin, Ping Wang:
Distributed MIMO System Design and Channel Capacity Analysis Based on Polar Orbit LEO Constellation. 557-567 - Yair Wiseman:
JPEG Quantization Tables for GPS Maps. 568-576 - Vladimir Aristov, Modris Greitans:
Determination of the Electrophysical Parameters of Dielectric Objects via the Processing of Ultra-Wideband Pulse Radar Signals. 577-587
Volume 55, Number 7, December 2021
- Alexandra Igorevna Kononova, Alexey V. Gorodilov:
Estimation of Distribution of Node-to-Node Path Lengths in the Global Network. 589-600 - Evgeniy A. Timofeev:
On a Segment Partition for Entropy Estimation. 601-606 - Sergey V. Morzhov:
Modern Approaches to Detecting and Classifying Toxic Comments Using Neural Networks. 607-616 - Vladimir V. Vasilchikov:
Parallel Algorithm for Solving the Graph Isomorphism Problem. 617-622 - Adil A. Kassenov, Alexey Anatolievich Magazev, Valeria Fedorovna Tsyrulnik:
Markov Model of Nonmutually Exclusive Cyberthreats and Its Applications for Selecting an Optimal Set of Information Security Tools. 623-635 - Alexander Ivanovich Legalov, Ivan V. Matkovskii, Mariya S. Ushakova, Darya S. Romanova:
Dynamically Changing Parallelism with Asynchronous Sequential Data Flows. 636-646 - Anastasiia N. Gainullina, Anatoly A. Shalyto, Alexey A. Sergushichev:
Method for Joint Clustering in Graph and Correlation Spaces. 647-657 - Mark G. Gonopolskiy, Alevtina B. Glonina:
Research and Development of an Algorithm for Response Time Estimation in Multiprocessor Systems under Interval Uncertainty of Task Execution Times. 658-669 - Vladimir A. Zakharov:
Efficient Equivalence Checking Technique for Some Classes of Finite-State Machines. 670-701 - Valery A. Sokolov:
On the Existence Problem of Finite Bases of Identities in the Algebras of Recursive Functions. 702-711 - E. V. Kuzmin, Oleg E. Gorbunov, Petr O. Plotnikov, Vadim A. Tyukin, Vladimir A. Bashkin:
Application of Convolutional Neural Networks for Recognizing Long Structural Elements of Rails in Eddy Current Defectograms. 712-722 - Sergey D. Glyzin, Sergey A. Kashchenko, Anna O. Tolbey:
Features of the Algorithmic Implementation of Difference Analogs of the Delayed Logistic Equation. 723-730 - Sergey V. Zykin:
Generalization of Derivation Rules for Join Dependencies in Database. 731-737 - Aleksandr S. Tvardovskii, Nina V. Evtushenko:
Deriving Homing Sequences for Finite State Machines with Timed Guards. 738-750 - Evgenii M. Vinarskii, Vladimir A. Zakharov:
On the Modeling of Sequential Reactive Systems by Means of Real Time Automata. 751-762 - Natalia Olegovna Garanina, Igor S. Anureev, Vladimir E. Zyubin, Sergey M. Staroletov, Tatiana V. Liakh, Andrei S. Rozov, Sergei P. Gorlatch:
A Temporal Logic for Programmable Logic Controllers. 763-775 - Anton R. Gnatenko, Vladimir A. Zakharov:
On the Model Checking Problem for Some Extension of CTL. 776-785 - Nikolay V. Shilov, Natalia Olegovna Garanina:
Knowledge-Based Algorithms for BDI Agents. 786-794 - Vladimir M. Deundyak, Denis V. Zagumennov:
On the Properties of Algebraic Geometric Codes as Copy Protection Codes. 795-808 - Anatoliy Y. Poletaev, Elena M. Spiridonova:
Hierarchical Clustering as a Dimension Reduction Technique in the Markowitz Portfolio Optimization Problem. 809-815 - Aleksandr N. Maksimenko:
The Branch-and-Bound Algorithm for the Traveling Salesman Problem is Not a Direct Algorithm. 816-826 - Yury V. Kosolapov:
On the Detection of Exploitation of Vulnerabilities That Leads to the Execution of a Malicious Code. 827-837 - Evgeniy P. Kubyshkin, Vladimir A. Kulikov:
On a Mechanism for the Formation of Spatially Inhomogeneous Structures of Light Waves in Optical Information Transmission Systems. 838-846 - Sergey A. Shershakov:
VTMine for Visio: A Graphical Tool for Modeling in Process Mining. 847-865 - Ksenia V. Lagutina, Alla M. Manakhova:
Automated Search and Analysis of the Stylometric Features That Describe the Style of the Prose of 19th-21st Centuries. 866-876 - Vladimir E. Goryunov:
Features of the Computational Implementation of the Algorithm for Estimating the Lyapunov Exponents of Systems with Delay. 877-884 - Anton O. Bassin, Maxim V. Buzdalov, Anatoly A. Shalyto:
The "One-Fifth Rule" with Rollbacks for Self-Adjustment of the Population Size in the (1 + (λ, λ)) Genetic Algorithm. 885-902
Volume 55, Number 8, December 2021
- T. N. Saurenko, V. G. Anisimov, E. G. Anisimov, V. V. Kasatkin, V. P. Los':
Information Security Incident Forecasting. 903-907 - Maxim O. Kalinin:
Application of Neuro-Fuzzy Inference to Detect Network Scanning. 908-917 - P. A. Baranov:
Comparison of Four Methods of Checking the Integrity of Transmitted Message Blocks. 918-923 - E. P. Belova, Irina V. Mashkina:
Architecture and Operation Algorithm of a Biometric Voice Authentication System. 924-931 - T. D. Ovasapyan, P. V. Knyazev, Dmitry A. Moskvin:
Automated Search for Vulnerabilities in ARM Software Using Dynamic Symbolic Execution. 932-940 - R. A. Antonov, E. V. Karachanskaya, G. V. Khandozhko:
Using Artificial Neural Networks to Estimate the Probability of Information Security Threat Occurrences. 941-948 - A. V. Myasnikov, Artem S. Konoplev, A. F. Suprun, V. G. Anisimov, V. V. Kasatkin, V. P. Los':
Constructing the Model of an Information System for the Automatization of Penetration Testing. 949-955 - Andrei D. Dakhnovich, Dmitry A. Moskvin, Dmitry P. Zegzhda:
Requirements on Providing a Sustainability of Industrial Internet of Things. 956-961 - Mikhail A. Eremeev, V. S. Nefedov, A. S. Ostrovskii, D. A. Semchenkov:
The Use of Beacon Signals to Detect Covert Channels in DNS Traffic. 962-969 - I. E. Gorbachev, A. A. Kriulin, I. T. Latypov:
Methodology of Mediametric Information Analysis with the Use of Machine Learning Algorithms. 970-977 - Alexander A. Grusho, Nikolai A. Grusho, Michael I. Zabezhailo, Elena E. Timonina:
Localization of the Root Cause of the Anomaly. 978-983 - A. A. Poltavtsev, A. R. Khabarov, A. O. Selyankin:
Comparative Analysis of Methods for Protection against Logical Inference. 984-990 - T. D. Ovasapyan, V. D. Danilov, Dmitry A. Moskvin:
Application of Synthetic Data Generation Methods to the Detection of Network Attacks on Internet of Things Devices. 991-998 - V. A. Miklush, I. A. Sikarev, Tatiana M. Tatarnikova:
Organization of Environmental Monitoring of the Port Water Area by Processing an Anti-Interference Signal from a Vessel Traffic Control System. 999-1004 - Maksim V. Gofman, Anatoly Kornienko, M. L. Glukharev:
A Method for Watermark Detection in Digital Audio Signals by Authorized Users. 1005-1019 - Peter D. Zegzhda, V. G. Anisimov, E. G. Anisimov, T. N. Saurenko, V. P. Los':
Operational Efficiency of Computer Networks under Conditions of Malicious Cyber Activity. 1020-1024 - I. I. Marshev, E. V. Zhukovskii, Elena B. Aleksandrova:
Protection against Adversarial Attacks on Malware Detectors Using Machine Learning Algorithms. 1025-1028 - N. N. Shenets, A. S. Petushkov:
New Regular Sliding Window Algorithms for Elliptic Curve Scalar Point Multiplication. 1029-1038 - M. D. Stepanov, E. Yu. Pavlenko, Daria S. Lavrova:
Detecting Network Attacks on Software Configured Networks Using the Isolating Forest Algorithm. 1039-1050 - K. V. Vasil'eva, Daria S. Lavrova:
Detecting Anomalies in Cyber-Physical Systems Using Graph Neural Networks. 1051-1060 - Andrei D. Dakhnovich, Dmitry A. Moskvin, Dmitry P. Zegzhda:
Using Security-through-Obscurity Principle in an Industrial Internet of Things. 1061-1067 - S. A. Ageev, N. S. Ageeva, V. V. Karetnikov, A. A. Privalov, I. A. Sikarev:
Algorithm for Online Detection of Traffic Anomalies in High-Speed Enterprise Multiservice Communication Networks. 1068-1079 - D. A. Kulikov, V. V. Platonov:
Adversarial Attacks on Intrusion Detection Systems Using the LSTM Classifier. 1080-1086 - Elena B. Aleksandrova, A. Yu. Oblogina, E. N. Shkorkina:
Authentication of Control Devices in the Internet of Things with the Architecture of Edge Computing. 1087-1091 - R. A. Ognev, E. V. Zhukovskii, Dmitry P. Zegzhda:
Detection of Malicious Executable Files Based on Clustering of Activities. 1092-1098 - S. I. Smirnov, Mikhail A. Eremeev, I. A. Pribylov:
Approach to Recognition of Malicious Behavior Based on Autoregression Model upon Investigation into Cyberincident. 1099-1103 - T. D. Ovasapyan, V. A. Nikulkin, Dmitry A. Moskvin:
Applying Honeypot Technology with Adaptive Behavior to Internet-of-Things Networks. 1104-1110 - A. D. Fatin, E. Yu. Pavlenko:
Using the Neat-Hypercube Mechanism to Detect Cyber Attacks on IoT Systems. 1111-1114 - Alexander A. Grusho, Nikolai A. Grusho, Michael I. Zabezhailo, Elena E. Timonina:
Use of Contradictions in Data for Finding Implicit Failures in Computer Systems. 1115-1120 - A. V. Kozachok, V. I. Kozachok, A. A. Spirin:
An Encrypted File Detection Algorithm. 1121-1128 - Vladimir N. Kustov, Alexei G. Krasnov:
Discrete Chaotic Transformations of Hidden Messages to Disguise Them as Noise in Steganography Problems. 1129-1135 - Mikhail E. Sukhoparov, Ilya S. Lebedev:
Application of Ensembles of Neural Networks Trained on Unbalanced Samples for Analyzing Statuses of IoT Devices. 1136-1141 - V. I. Doroshenko, A. N. Pivovarov, Yu. G. Ksenofontov:
Improvement of Information Security of Monitoring Channels in Meteor-Burst Communication Networks of the Russian Arctic. 1142-1148 - E. N. Chizhikov, A. A. Gorbunov, A. S. Belov, E. L. Trakhinin, D. V. Stavitskii:
Theoretical Approach for Evaluating the Connectivity of Distributed Systems and Telecommunications for the Digital Economy. 1149-1152 - Maxim V. Shakurskiy:
A Two-Component Steganographic System Based on the Sum of Linear Functions of Two Signals Using a Multiplicative Form of Constraint of Embedded Signals. 1153-1158 - I. A. Sikarev, A. V. Garanin:
Basic Principles of Creating Control Algorithms for a Remotely Piloted Sea Vessel to Improve the Information Security of Noisy Data Transmission Channels. 1159-1164 - Maxim O. Kalinin, Vasiliy M. Krundyshev:
Analysis of a Huge Amount of Network Traffic Based on Quantum Machine Learning. 1165-1174 - Mikhail E. Sukhoparov, Kseniya I. Salakhutdinova, Ilya S. Lebedev:
Software Identification by Standard Machine Learning Tools. 1175-1179 - Evgeny K. Alekseev, Liliya R. Akhmetzyanova, V. D. Nikolaev, Stanislav V. Smyshlyaev, A. I. Bondarenko:
On Cryptographic Properties of the NB-Fi Protocol. 1180-1187 - Sergey A. Dichenko:
An Integrity Control Model for Multidimensional Data Arrays. 1188-1193 - E. V. Zavadskii, D. V. Ivanov:
Implementation of Honeypot Systems Based on the Potential Attack Graph. 1194-1200 - Maria A. Poltavtseva:
Formation of Data Structures in the Problems of Active Security Monitoring. 1201-1208 - V. S. Nefedov, A. A. Kriulin, Mikhail A. Eremeev:
Approach to Recognition of Malicious Servers of TOR Anonymization Network Based on Cluster Analysis. 1209-1214 - O. A. Izotova, Daria S. Lavrova:
Fake Post Detection Using Graph Neural Networks. 1215-1221 - V. V. Gryzunov:
Conceptual Model for Adaptive Control of a Geographic Information System under Conditions of Destabilization. 1222-1227
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.