default search action
Automatic Control and Computer Sciences, Volume 57
Volume 57, Number 1, February 2023
- Tarek Saati, Chadi Albitar, Assef Jafar:
An Improved Path Planning Algorithm for Indoor Mobile Robots in Partially-Known Environments. 1-13 - Xin Sui, Leilei Zhu, Xiaolong Song, Guoyu Sheng, Dan Liu:
The Green Scheduling Architecture for the Virtual Resource Supply. 14-26 - R. Yu. Kharchenko, Vladislav Mykhailenko, Aleksandr V. Kochetkov:
Development of a Neuro-Fuzzy Intelligent Network for Monitoring and Control of Microclimate Systems. 27-36 - Xian Guo, Ying Xue, Tao Feng, Yongbo Jiang, Yan Yan:
Simulation Implementation and Verification of a Security Framework for ICS Based on SPD. 37-47 - Oleg I. Sheluhin, Andrey Osin, D. I. Rakovsky:
New Algorithm for Predicting the States of a Computer Network Using Multivalued Dependencies. 48-60 - Aodong Zhao, Nan Zhang:
Edge Testing of Noisy Image Based on Wavelet Neural Network. 61-69 - S. M. Abdul Kalam Azad, Sasmita Padhy, Sachikanta Dash:
A Case Study on the Multi-Hopping Performance of IoT Network Used for Farm Monitoring. 70-80 - Fuqi Mao, Jing Li, Jian Yang, Zhi Liu, Mengmeng Zhang:
A Grain Boundary Defects Detection Algorithm with Improved Localization Accuracy Based on EfficientDet. 81-92 - Djalel Drici, Yahia Kourd, Mostefa Mohamed Touba, Dimitri Lefebvre:
A New Approach for Remaining Useful Life Estimation Using Deep Learning. 93-102 - Wang Kai, Xiaoxia Wang, Cuicui Chen, Zhai Changhui, Quanliang Li:
Association Reconstruction of Inner Wall of Cylinder Head Based on Hybrid Thermal Field Pattern. 103-114
Volume 57, Number 2, April 2023
- Michael Cecil Lordwin Prabhakar, R. Daisy Merina, Venkatesan Mani:
IoT Based Air Quality Monitoring and Plant Disease Detection for Agriculture. 115-122 - Xin Zhang, Ying Quan:
Fuzzy Sliding Mode Control of Manipulator Based on Disturbance Observer and RBF Neural Network. 123-134 - Ahmed A. Alani, Hayder G. A. Altameemi, Ahmed Abdul Azeez Asmael, Mudhar A. Al-Obaidi:
An Effective Multiclass Human Skin Lesion Diagnosis System Based on Convolutional Neural Networks. 135-142 - Jianlou Lou, Feng Liang, Zhaoyang Qu, Xiangyu Li, Keyu Chen, Bochuan He:
Lane Detection Method under Low-Light Conditions Combining Feature Aggregation and Light Style Transfer. 143-153 - Pavel A. Lyakhov, Diana I. Kalita:
Reliable Kalman Filtering with Conditionally Local Calculations in Wireless Sensor Networks. 154-166 - Baowei Zhang, Jiuxiang Song, Yonghua Wang:
PSO-DE-Based Regional Scheduling Method for Shared Vehicles. 167-176 - Zahia Lalama, Fouzi Semechedine, Samra Boulfekhar:
Node Localization Optimization in WSNS by Using Cat Swarm Optimization Meta-Heuristic. 177-184 - Jiyue Wang, Jintao Liu, Yigui Lu:
A Novel Fusion Strategy and Convolutional Sparse Coding for Robot Multisource Image Fusion. 185-195 - Vladimir Aristov:
Transmission Sensing of Dielectric Objects for Determining the Geometric Shape of the Cross Section and the Detection of Internal Inhomogeneities. 196-202 - El-Habib Bensikaddour, Boualem Nasri, Djamel Eddine Baba Hamed, Ali Kaddouri, Saiah Bekkar Djelloul Saiah:
Azimuth, Elevation, and Doppler Shift Estimation for LEO Satellites Based on an Open Source Python Package. 203-212
Volume 57, Number 3, June 2023
- Mohamad Reza Davoudi, Alireza Yari:
Improving the Feature Section Method Based on Genetic Algorithm to Increase the Efficiency of Detecting Phishing Websites. 213-221 - Chao Ge, Chenlei Chang, Zheng Yao, Chengyuan Liu:
Event-Triggered Exponential Synchronization of Nonfragile Neural Networks. 222-233 - Nicholas A. Nechval, Gundars Berzins, Konstantin N. Nechval:
A Unified Technique for Prediction and Optimization of Future Outcomes under Parametric Uncertainty via Pivotal Quantities and Ancillary Statistics. 234-257 - Nannan Zhao:
Adaptive Peak Environmental Density Clustering Algorithm in Cloud Computing Technology. 258-266 - Mamouni El Mamoun:
An Effective Combination of Convolutional Neural Network and Support Vector Machine Classifier for Arabic Handwritten Recognition. 267-275 - Xin Zhang, Zijun Zhu:
Spatial Adaptive Iterative Learning Control Based High-Speed Train Operation Tracking under External Disturbance. 276-286 - R. Aswanandini, C. Deepa:
Comparison of Advanced Classification Algorithms Based Intrusion Detection from Real-Time Dataset. 287-295 - Baowei Zhang, Xin Li, Jiuxiang Song, Yonghua Wang:
Construction and Analysis of Octane Number Loss Prediction Model. 296-304 - Sara Khalfa, Saliha Harize, Nasreddine Kouadria:
Source Level Protection for HEVC Video Coded in Low Delay Mode for Real-Time Applications. 305-316 - Jiangyi Qin, Kai Wang, Xian-Bin Li, Fei Zhang, Ming Tang:
Design and Implementation of Electromagnetic Spectrum Sensing Load Based on Software Radio. 317-325
Volume 57, Number 4, August 2023
- Xiuzhen Nie, Yingxue Jiao:
Research on Transmission Control of Airborne Communication Data Link System Based on Artificial Fish Swarm Algorithm. 327-336 - Mingyue Qiu, Xueying Zhang:
Determining Accurate Patrol Routes Using Genetic Algorithm and Ant Colony. 337-347 - Bencheng Yu, Zihui Ren, Shoufeng Tang:
A Novel Coal Mine Dust Measurement System and Experimental Analysis. 348-354 - Hanhua Yang:
Research and Implementation of Intelligent Monitoring and Evaluation System for Farm Animals Breeding Environment. 355-363 - Rim Gasmi:
Deep Reinforcement Learning Based Robust Communication for Internet of Vehicles. 364-370 - Jinfang Zeng, Yuxing Liu, Mengjiao Wang, Xin Zhang:
Environmental Sound Classification Based on Attention Feature Fusion and Improved Residual Network. 371-379 - Zhenhui Li, Zhouli He, Feng Huang, Renyuan Jia:
A Bit-Level Three-Dimensional Rectangular Image Encryption Algorithm Using New Chaotic Maps. 380-388 - Aiping Cai:
Adversarial Sample Generation Method Based on Global Convolution Noise Reduction Model. 389-399 - Weiguang Dong, Shengchang Li, Haobo Lu:
Multitarget Detection Algorithm of UHV Line Fitting Infrared Image Based on YOLOv5. 400-412 - Afshan Amin Khan, Roohie Naaz Mir, Najeeb-ud-Din Hakim:
Scheduling Strategies and Future Directions for NoC: A Systematic Literature Review. 413-421
Volume 57, Number 5, October 2023
- Brijesh Patel, Yan Cen Lin, Hao Jian Eugene Tong, Chao-Lung Yang, Ching-Yuan Chang, Po Ting Lin:
Robot Arm Path Planning with Adaptive Obstacle Avoidance for Man-Robot Collaboration. 423-438 - Jurga Subaciute-Zemaitiene, Andrius Dzedzickis, Vytautas Bucinskas, Rokas Bagdonas:
Experimental Evaluation of Microrobot Positioning Accuracy. 439-448 - Anar Abdullayev, Paul Annus, Andrei Krivosei, Margus Metshein, Olev Märtens, Marek Rist:
Improved PWM-Based Sinewave Generation: Example of the Impedance Measurement. 449-458 - Andris Lapins, Janis Arents, Modris Greitans:
Augmenting a Pretrained Object Detection Model with Planar Pose Estimation Capability. 459-468 - Vladimir Aristov:
Remote Complex Resistance Measurement. 469-472 - Nicholas A. Nechval, Gundars Berzins, Konstantin N. Nechval:
New Applications of Computational Intelligence for Constructing Predictive or Optimal Statistical Decisions under Parametric Uncertainty. 473-489 - Aleksander M. Andronov, Diana Santalova Thordarson, Hao Yu:
On an Interrupted Bivariate Renewal Process and Its Applications. 490-503 - Zhouqi Liu, Lei Wang, Jin Huang, Xinping Guo, Tianqi Cheng, Yuwei Wang, Cong Liu, ChunXiang Liu:
An Effective Denoising Method for the Point Cloud of Trees Based on the Hybrid Filtering Scheme. 504-513 - Jing Wang:
A Study of Scoring English Tests Using an Automatic Scoring Model Incorporating Semantics. 514-522 - Xuemei Zhu, Zusong Li, Shirong Li, Xiancun Zhou:
Indoor Localization Method Based on Adaptive Wavelet Threshold Analysis. 523-533 - Viet-Hang Duong, Hung Tuan Nguyen, Masaki Nakagawa, The Bao Pham:
A Novel Approach for Vietnamese Handwritten Text Recognition. 534-541 - Bencheng Yu, Zihui Ren, Shoufeng Tang:
Erratum to: A Novel Coal Mine Dust Measurement System and Experimental Analysis. 542
Volume 57, Number 6, December 2023
- Mingyue Qiu, Xueying Zhang:
Establishment Method of Knowledge Graphs for Public Security Cases. 543-551 - Weiqiang Tang, Chaoyang Lu, Tianpeng Xu, Haiyan Gao:
Improved Sliding Mode Output Control of Mine Filling Slurry Concentration Based on Proportional-Integral Observer. 552-562 - Boualem Nasri, Abderrezak Guessoum, Lotfi Mostefai, El-Habib Bensikaddour, Nabil Hamdadou, Ghoul Abdelhamid, Akram Adnane:
Evaluation of Optimized Inner and Outer Loop Controllers for 4X Flyer under Faulty Actuators. 563-576 - Guo Xiong Tng, Saw Chin Tan, Neoh Kin Lin, Hong Wei Siew:
Flexible Nodes Exclusion and Inclusion Capability Migration Model for Hybrid Software-Defined Network. 577-588 - Anjali Rajak, Rakesh Tripathi:
Classification of Services through Feature Selection and Machine Learning in 5G Networks. 589-599 - Gehad Ismail Sayed, Aboul Ella Hassanein:
Air Pollutants Classification Using Optimized Neural Network Based on War Strategy Optimization Algorithm. 600-607 - Jia Liu:
QAM Modulation Based on Lowest Energy Consumption in Passive CRFID. 608-618 - Bencheng Yu, Zihui Ren, Shoufeng Tang:
Radio-Frequency Energy Harvesting Technology for Future Communication Systems. 619-626 - R. Avudaiammal, Vijayarajan Rajangam, Durai Raji V., Senthil Kumar S.:
Color Models Aware Dynamic Feature Extraction for Forest Fire Detection Using Machine Learning Classifiers. 627-637 - Mengyang Qin:
Study of an Automatic Marking Algorithm for Subjective Questions in College English Exams Based on Deep Learning. 638-645 - Kuljeet Singh, Sourabh Shastri, Sachin Kumar, Vibhakar Mansotra:
BC-Net: Early Diagnostics of Breast Cancer Using Nested Ensemble Technique of Machine Learning. 646-659
Volume 57, Number 7, December 2023
- Sergey E. Mishchenko, Nikolai V. Shatskiy:
An Algorithm of Angular Superresolution Using the Cholesky Decomposition and Its Implementation Based on Parallel Computing Technology. 661-671 - Vladimir V. Vasilchikov:
Recursive-Parallel Algorithm for Solving the Graph-Subgraph Isomorphism Problem. 672-682 - E. V. Kuzmin:
Linear Temporal Logic Specification of Bounded Counter Machines. 683-695 - Igor N. Ryzhenko, Oleg V. Nepomnyaschy, Alexander Ivanovich Legalov, V. V. Shaidurov:
Methods for Changing Parallelism in the Process of High-Level VLSI Synthesis. 696-705 - Leonid Y. Bystrov, E. V. Kuzmin:
The Application of Majority Voting Functions to Estimate the Number of Monotone Self-Dual Boolean Functions. 706-717 - Mikhail V. Nevskii:
On Some Estimate for the Norm of an Interpolation Projector. 718-726 - Maksim A. Kosterin, Ilya V. Paramonov:
Neural Network Sentiment Classification of Russian Sentences into Four Classes. 727-739 - Anatoliy Y. Poletaev, Ilya V. Paramonov:
Recursive Sentiment Detection Algorithm for Russian Sentences. 740-749 - Vladimir G. Gorshkov, Dmitriy Mikhailovich Murin, Olga P. Yakimova:
Research of Models of Topological Relations of Spatial Features. 750-759 - Alexander V. Smirnov:
Two-Step Coloring of Grid Graphs of Different Types. 760-771 - Yury V. Kosolapov, Fedor S. Pevnev, Margarita V. Yagubyants:
On Building Self-Complementary Codes and Their Application in Information Hiding. 772-787 - Sergey V. Zykin:
Testing Dependencies and Inference Rules in Databases. 788-802 - Alexander Ivanovich Legalov, Yegor G. Bugayenko, Nikolay K. Chuykin, Maksim V. Shipitsin, Yaroslav I. Riabtsev, Andrey N. Kamenskiy:
Transformation of C Programming Language Memory Model into Object-Oriented Representation of EO Language. 803-816 - Ksenia V. Lagutina:
Genre Classification of Russian Texts Based on Modern Embeddings and Rhythm. 817-827 - Daniil D. Zafievsky, Nadezhda S. Lagutina, Oksana A. Melnikova, Anatoliy Y. Poletaev:
Text Model for the Automatic Scoring of Business Letter Writing. 828-840 - Alexander V. Smirnov:
The Polynomial Algorithm of Finding the Shortest Path in a Divisible Multiple Graph. 841-853
Volume 57, Number 8, December 2023
- Peter D. Zegzhda, T. N. Saurenko, V. G. Anisimov, E. G. Anisimov:
Assessment of the Effectiveness of an Information Security System. 855-861 - M. V. Shakurskii, O. A. Karaulova, E. S. Kartashevskaya:
Resistance of a Two-Component Steganographic System to Unauthorized Information Extraction. 862-867 - Andrei D. Dakhnovich, D. S. Zagalsky, R. S. Solovey:
Method for Detecting Manipulation Attacks on Recommender Systems with Collaborative Filtering. 868-874 - I. A. Sikarev, T. V. Vekshina, V. A. Bol'shakov, E. M. Korinets:
Current Trends in Methods of the Efficient Automation of Data Processing. 875-880 - Dmitry P. Zegzhda, A. F. Suprun, V. G. Anisimov, A. V. Tebekin, E. G. Anisimov:
Methodological Approach to Construct Models for Predicting Indicators of Properties of Information Security Systems. 881-885 - N. N. Shenets:
Approach for Protecting Mobile Device User's Data Based on Multifactor Authentication, Visual Cryptography, and Steganography. 886-893 - Dmitry A. Moskvin:
Assessing the Security of a Cyber-Physical System Based on an Analysis of Malware Signatures. 894-903 - S. O. Kostin, Elena B. Aleksandrova:
Investigation of the Structure of the Isogeny Graph for Postquantum Cryptography Protocols. 904-913 - P. V. Sem'yanov, S. V. Grezina:
Analysis of Cryptographic Protection of the Bitcoin Core Cryptographic Wallet. 914-921 - Ivan K. Noskov, Sergei V. Bezzateev:
Finding Enumerators for Generalized (L, G)-Code. 922-927 - D. V. Kushnir, S. N. Shemyakin:
Decimation of M Sequences As a Way of Obtaining Primitive Polynomials. 928-932 - R. A. Ognev, Dmitry P. Zegzhda:
Empirical Study of the Stability of a Linear Filter Based on the Neyman-Pearson Criterion to Changes in the Average Values. 933-937 - Mikhail A. Eremeev, I. I. Zakharchuk:
Risk Assessment of Using Open Source Projects: Analysis of the Existing Approaches. 938-946 - G. S. Kubrin, Peter D. Zegzhda:
Searching for Software Vulnerabilities Using an Ensemble of Algorithms for the Analysis of a Graph Representation of the Code. 947-957 - N. A. Gribkov, T. D. Ovasapyan, D. A. Moskvin:
Analysis of Decompiled Program Code Using Abstract Syntax Trees. 958-967 - P. E. Yugai, E. V. Zhukovskii, P. O. Semenov:
Features of Detecting Malicious Installation Files Using Machine Learning Algorithms. 968-974 - Maria A. Poltavtseva, E. A. Rudnitskaya:
Confidentiality of Machine Learning Models. 975-982 - Maxim O. Kalinin, A. F. Suprun, O. D. Ivanova:
Hybrid Method for the Detection of Evasion Attacks Aimed at Machine Learning Systems. 983-988 - V. V. Platonov, N. M. Grigorjeva:
Defense against Adversarial Attacks on Image Recognition Systems Using an Autoencoder. 989-995 - Maxim O. Kalinin, M. D. Soshnev, Artem S. Konoplev:
Protection of Computational Machine Learning Models against Extraction Threat. 996-1004 - Sergei V. Bezzateev, Svetlana Fomicheva, A. F. Suprun:
Improving the Efficiency of Multiagent Information Security Systems by Post-Quantum Cryptography Methods. 1005-1017 - Georgi A. Markov:
Application of a Neocortex Model to Identify Contextual Anomalies in the Industrial Internet of Things Network Traffic. 1018-1024 - Maxim O. Kalinin, E. I. Tkacheva:
A Decentralized Approach to Intrusion Detection in Dynamic Networks of the Internet of Things Based on Multiagent Reinforcement Learning with Interagent Interaction. 1025-1032 - E. M. Orel, Dmitry A. Moskvin, I. A. Anoshkin:
Stability Analysis of the Architecture of Messaging Systems with a Decentralized Node Structure. 1033-1039 - Vasiliy M. Krundyshev, Georgi A. Markov, Maxim O. Kalinin, P. V. Sem'yanov, Alexey G. Busygin:
Cyberattack Detection in the Industrial Internet of Things Based on the Computation Model of Hierarchical Temporal Memory. 1040-1046 - Daria S. Lavrova, O. A. Izotova:
Early Detection of Network Attacks Based on Weight-Insensitive Neural Networks. 1047-1054 - E. Yu. Pavlenko, M. A. Pakhomov:
Graph-Based Self-Regulation for Different Types of Networks with Adaptive Topology. 1055-1062 - Maria A. Poltavtseva, D. V. Ivanov, E. V. Zavadskii:
Framework for Modeling Security Policies of Big Data Processing Systems. 1063-1070 - Mikhail E. Sukhoparov, Ilya S. Lebedev:
Improving the Quality of the Identification of the Information Security State Based on Sample Segmentation. 1071-1075 - Elena B. Aleksandrova, Anna A. Shtyrkina:
Method for the Adaptive Neutralization of Structural Breaches in Cyber-Physical Systems Based on Graph Artificial Neural Networks. 1076-1083 - E. Yu. Pavlenko:
Analysis and Forecasting of States of Industrial Networks with Adaptive Topology Based on Network Motifs. 1084-1095 - Maria A. Poltavtseva:
Data Modeling in Big Data Systems Including Polystore and Heterogeneous Information Processing Components. 1096-1102 - Daria S. Lavrova, V. M. Bogina, Dmitry P. Zegzhda, E. Yu. Pavlenko:
Probabilistic Approach to Estimate the Cyber Resistance of Mobile Networks Based on Their Connectivity. 1103-1115 - A. D. Shilova, Alisa A. Vorobeva:
A Method of Network Access Control for Ensuring Network Infrastructure Security Based on Severing Superfluous Network Connectivity. 1116-1125 - A. I. Almuhamedov, V. S. Kolomoitcev:
Application of Machine Learning Methods to the Problem of Searching for a Region of Interest for Biometric Identification Based on the Pattern of Palm Veins. 1126-1134
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.