


default search action
Automatic Control and Computer Sciences, Volume 58
Volume 58, Number 1, February 2024
- Alexander M. Andronov, Kristina Mahareva:

Elaborated Analysis of a Nonreplenishable Queue with Erlang Distribution of the Service Time. 1-10 - Yongcun Zhu:

Numerical Analysis of Pneumatic Regenerative Braking System. 11-22 - Hanhua Yang:

Research on Multisensor Data Fusion Model for Monitoring Animal Breeding Environment. 23-32 - Zhoe Comas-Gonzalez

, Johan Mardini, Shariq Aziz Butt, Andres Gabriel Sanchez Comas, Kåre Synnes, Aurelian Joliet, Emiro De la Hoz-Franco
, Diego Molina-Estren, Gabriel Piñeres-Espitia
, Sumera Naz, Daniela Ospino-Balcázar:
Sensors and Machine Learning Algorithms for Location and POSTURE Activity Recognition in Smart Environments. 33-42 - Kexin Ding, Xueliang Zhang, Yurong Nan, Min Zhuang:

Fixed Time Adaptive Fuzzy Control of Nonlinear Systems with Time-Varying State Constraints. 43-57 - Lihui Hu:

Analysis of Employment Information of University Graduates through Data Mining. 58-65 - D. Senthil Kumar, S. S. Arumugam, M. Lordwin Cecil Prabhaker, R. Daisy Merina:

Eamlm: Enhanced Automated Machine Learning Model for IoT Based Water Quality Analysis with Real-Time Dataset. 66-77 - Yijun Mai, Mingjing Li, Yingbo Pei, Hongbing Wu, Zhenyao Su:

Research and Design of an Intelligent Street Lamp Control System Based on NB-IoT. 78-89 - Jing Hou, Meimei Chen, Yihang Guo, Zhangxi Lin, Bin Hong:

Research on GDR Obstacle Detection Method Based on Stereo Vision. 90-100 - Vladimir Aristov:

Monostatic Pulsed Ultrawideband Radar Antenna for Studying Biological Rhythms of the Human Body and Internal Inhomogeneities of Dielectric Objects. 101-108 - Shuangshuang Yu:

Extraction and Analysis of Semantic Features of English Texts under Intelligent Algorithms. 109-115
Volume 58, Number 2, April 2024
- Hakim Bagua

, Belgacem Said Khaldi
, Abdelhamid Iratni
, Ahmed Hafaifa, Ilhami Colak
:
Model-Based Faults Diagnostics of Single Shaft Gas Turbine Using Fuzzy Faults Tolerant Control. 117-130 - Zhuangzhuang Deng, Shihai Yang

, Yun Li
, Xiaojie Gu, Lingzhe Xu, Ruiqiang Liu:
Unanticipated Fault Detection and Isolation of Telescope Drive System Based on Luenberger Observer and Axes Transformation. 131-141 - Mohamed Chafa

, Kamel Messaoudi
, Lamri Louze:
Speed Control of Permanent Magnet Synchronous Motor Using Xilinx System Generator. 142-152 - Jay Dave, Nikumani Choudhury:

Secure and Efficient Traffic Obfuscation Scheme for Deduplicated Cloud Storage. 153-165 - ChunXiang Liu, Yuwei Wang, Lei Wang, Tianqi Cheng, Xinping Guo:

BCNN: An Effective Multifocus Image fusion Method Based on the Hierarchical Bayesian and Convolutional Neural Networks. 166-176 - Seddik Rabhi, Fouzi Semchedine, Nader Mbarek:

Localization in Wireless Sensor Networks by Hybridization between Optimization Algorithms of Particle Swarms and Fruit Flies. 177-184 - Feng Xu, Shuli Jia, Chong Qu, Duo Chen, Liyong Ma:

Diesel Engine Fault Diagnosis Based on Convolutional Autoencoder Using Vibration Signals. 185-194 - Kulvinder Singh

, Sanjeev Dhawan, Deepanshu Mehla:
Performance Evaluation of Machine Learning Models for Multiple Chronic Disease Diagnosis Using Symptom Data. 195-208 - Mingliang Zheng:

Clustering of Image Covariance Matrixes on Lie Group Manifold. 209-215 - Yingwei Gao:

Study on Applications of Reversible Information Hiding Algorithms Based on Discrete Cosine Transform Coefficient and Frequency Band Selection in JPEG Image Encryption. 216-225
Volume 58, Number 3, June 2024
- Feng Guo, Hong Zhang, Hong Yu:

Dynamic Properties and Chaos Control of a High Dimensional Double Rotor Model. 227-236 - M. Abdullah, Lubna Moin, Fayyaz Ahmed, Farhan Khan, Wahab Mohyuddin:

Electric Vehicle Battery Temperature Control Using Fuzzy Logic. 237-251 - Hai Yang, Wenjun Kao, Jinqiang Li, Chunling Liu, JianGuo Bai, ChangDe Wu, Feng Geng:

ResNet Combined with Attention Mechanism for Genomic Deletion Variant Prediction. 252-264 - Sergey V. Sokolov, Daniil V. Marshakov, Irina V. Reshetnikova

:
Robust Estimation of State Parameters of Discrete Nonlinear Stochastic Systems. 265-273 - Tingyang Zhao, Tao Hou, Hongxia Niu:

Research on Detection and Correction of High-Speed Train Idling and Skidding Based on Improved Fuzzy Neural Network. 274-288 - T. Shuprajhaa

, K. Srinivasan, M. Brindha
:
Event Triggered Constrained Regulatory Control of Blood Glucose in Type I Diabetes Mellitus Condition. 289-302 - Baofeng Zhao:

Multisensor Maneuvering Target Fusion Tracking Using Interacting Multiple Model. 303-312 - Fatima Belamri, Samra Boulfekhar, Djamil Aïssani

:
C-QoSRP: Cluster Based QOS-Routing Protocol for VANET in Highway Environment. 313-325 - Wenjin Wang, Miaomiao Lu, Xuanling Dai, Ping Jiang:

Binary Wavelet Transform-Based Financial Text Image Authentication Algorithm. 326-335 - Wei Li, Kai Zhang, Chunpeng Zhang, Qiang Wang, Yi Zhang:

An Adaptive Indicator Optimization Ensemble Empirical Mode Decomposition Method and Its Application on the Denoising of BeiDou B1I Signal. 336-345 - A. Belherazem, R. Salim, Abdelmalek Laidani, Mohamed Chenafa:

Vibration Control of a Two-Link Flexible Manipulator. 346-358
Volume 58, Number 4, August 2024
- Jin Wang, Ruiting Liu, Liming Liu, Xiaoxiang Cheng, Feiyong Chen, Xue Shen:

Fire Risk Monitoring of Tamarix chinensis Forest Based on Infrared Remote Sensing Technology. 359-365 - Shan Li, Diyuan Tan, Binbin Yao, Zhe Wang:

Fall Monitoring System Based on Wearable Device and Improved KNN. 366-378 - Saeid Haidari, Alireza Hosseinpour:

RF Source Localization Method Based on a Single-Anchor and Map Using Reflection in an Improved Particle Filter. 379-391 - Wang Hao, Li Hui, Duanzheng Song, Jintao Zhu:

A Research on Genetic Algorithm-Based Task Scheduling in Cloud-Fog Computing Systems. 392-407 - Jianlou Lou, Xuan Xie, Guang Huo, Zhaoyang Hong, Chuang Yang, Jin Qi:

CSASNet - A Crop Leaf Disease Identification Method Based on Improved ShuffleNetV2. 408-419 - Ahmed Sahnoune

, Sefouane Chellali, Daoud Berkani, Elhadj Zeraoulia:
Secure Turbo Codes Design Using Chaotic Interleaver Based on Generalized 2D Chaotic Map. 420-428 - Lisha Yao

:
Facial Expression Recognition Based on Multiscale Features and Attention Mechanism. 429-440 - Qi Yao, Dayang Jiang:

Improved AOA Algorithm to Optimize Image Entropy for Image Recognition Model. 441-453 - Eugene Zhmakin, Grach Mkrtchian:

Building a Production-Ready Keyword Detection System on a Real-World Audio. 454-458 - Zhipeng Yu, Qiang Wan:

Majorization Resource for Visual Communication Effect of Multiframe Low-Resolution Photograph Sequence. 459-471 - Lei Yan:

Research on Binocular Vision Image Calibration Method Based on Canny Operator. 472-480
Volume 58, Number 5, October 2024
- Lina Yu, Yinjun Zhou, Yao Hu:

Research on Groundwater Level Prediction Method in Karst Areas Based on Improved Attention Mechanism Fusion Time Convolutional Network. 481-490 - Kulvinder Singh

, Sanjeev Dhawan, Nisha Bali:
An Ensemble Learning Hybrid Recommendation System Using Content-Based, Collaborative Filtering, Supervised Learning and Boosting Algorithms. 491-505 - Xiaoxiao Cheng, Jianjun Wang, Jiongyu Wang, Kun Wang, Xudong Li:

Extraction of Features of Regular Surfaces from the Laser Point Clouds for 3D Objects. 506-518 - Walid Fakhet

, Salim El Khediri, Salah Zidi
:
A Novel Arabic Optical Character Recognition Approach Based on Levenshtein Distance. 519-529 - Jiang Xiang Ju, Wang Rui Tong:

Insulator Defect Detection of Lightweight Rotating YOLOv5 Based on Adaptive Feature Fusion. 530-543 - Sofiane Abdelkrim Khalladi, Asmâa Ouessai

, Mokhtar Keche:
Road Traffic Classification from Nighttime Videos Using the Multihead Self-Attention Vision Transformer Model and the SVM. 544-554 - Haiyan Kang

, Congming Zhang, Hongling Jiang:
Advancing Driver Behavior Recognition: An Intelligent Approach Utilizing ResNet. 555-568 - Anju Augustin, Cinu C. Kiliroor:

Airborne Chemical Detection Using IoT and Machine Learning in the Agricultural Area. 569-579 - Yuehua Li, Yueyue Zhang, Jinfeng Wang, Fanfan Zhong, Bin Hu:

Chinese License Plate Recognition Based on OpenCV and LPCR Net. 580-591 - Wenjin Wang, Miaomiao Lu, Xuanling Dai, Ping Jiang:

Financial Digital Images Compression Method Based on Discrete Cosine Transform. 592-601
Volume 58, Number 6, December 2024
- Hassène Gritli

, Sahar Jenhani
, Jyotindra Narayan
:
Motion Control of Manipulator Robots via Two PD-Based Nonlinear Controllers: Design and Comparative Analysis. 603-616 - Hanhua Yang, Chong Chen:

Water Quality Assessment for Fishpond via Multisource Information Fusion. 617-629 - Edwards Ernesto Sánchez-Ramírez, Alberto Jorge Rosales-Silva, Ponciano Jorge Escamilla-Ambrosio, Floriberto Ortiz-Rodríguez, Rogelio Antonio Alfaro-Flores, Jean Marie Vianney Kinani:

Rogust Sensor Fusion Using Federated Kalman Filter and Discrete Generalized-Proportional-Integral Observers. 630-641 - Yilihamu Yaermaimaiti, Yajie Liu, Lingfei Xi, Ruohao Wang:

Helmet Detection Algorithm Based on Improved YOLOv7. 642-655 - Xiaoguang Wei, Qian Zhang:

A Security Scheme for Source-Location Privacy Protection in Wireless Sensor Networks by Selecting Phantom Nodes. 656-662 - Verasis Kour, Parveen Kumar Lehana

:
GMM Based Fault Signature Estimation of Electromechanical Machines for Small and Medium-Sized Enterprises in IoT Environment. 663-678 - Jianlou Lou, Xinyan Chi, Guang Huo, Jin Qi, Zhaoyang Hong, Chuang Yang:

Agri-NER-Net: Glyph Fusion for Chinese Field Crop Diseases and Pests Named Entity Recognition Network. 679-689 - Maha Ben Ayed, Mohamed Sayah, Raouf Ketata, Noureddine Zerhouni:

A Smart LSTM for Industrial Part Conformity: SME Material-Data Based Decision-Making. 690-704 - Benshuang Chen, Liangjing Shao, Xinrong Chen:

Template-Free Neural Representations for Novel View Synthesis of Humans. 705-713 - Vladimir Aristov, Modris Greitans:

Study of a Radar Sensor Transmitter to Optimize a Bipolar Ultrawideband Pulse Used to Excite the Antenna. 714-721 - Arslan A. Rizvi, Talha Ali Khan, Cao Feng, Abdelrahman El-Leathy:

Pyramidal Sun Sensor: A Novel Sun Tracking System Solution for Single Axis Parabolic Trough Collector. 722-734 - Shahid Ali, Bingli Jiao:

Altitude-Based Dynamics Modulation and Power Analysis in LEO Satellites. 735-743 - Fatima Belamri, Samra Boulfekhar, Djamil Aïssani:

Erratum to: Cluster Based QOS-Routing Protocol for VANET in Highway Environment. 744
Volume 58, Number 7, December 2024
- Alexander V. Smirnov

:
The Optimized Algorithm of Finding the Shortest Path in a Multiple Graph. 745-752 - Leonid N. Kazakov

, Evgeniy P. Kubyshkin
, D. E. Paley
:
Construction of the Optimal Information Exchange Scheme of an Adaptive Motion Control System for a Group of Unmanned Aerial Vehicles. 753-761 - Alexander I. Legalov

, Pavel Kosov
:
C Language Extension to Support Procedural-Parametric Polymorphism. 762-778 - Nadezhda S. Lagutina

, Andrey Vasilyev
, Daniil D. Zafievsky
:
Tasks in Named Entity Recognition: Technologies and Tools. 779-796 - Ilya V. Paramonov

, Anatoliy Y. Poletaev
:
Annotation of Text Corpora by Sentiment and Irony in a Project of Citizen Science. 797-807 - Leonid Y. Bystrov

, Egor Vladimirovich Kuzmin
:
Zhegalkin Polynomial of a Multiary Sole Sufficient Operator. 808-826 - Vladimir V. Vasilchikov

:
Recursive-Parallel Algorithm for Solving the Maximum Common Subgraph Problem. 827-835 - Yu. V. Kosolapov

:
On Simplifying Mixed Boolean-Arithmetic Expressions. 836-852 - Sergey D. Glyzin

, E. A. Marushkina
:
Algorithms for Asymptotic and Numerical Modeling of Oscillatory Modes in the Simplest Ring of Generators with Asymmetric Nonlinearity. 853-860 - Sergey V. Zykin

:
Generalization of Typed Inclusion Dependencies with Null Values in Databases. 861-868 - Nadezhda S. Lagutina

, Ksenia V. Lagutina
, Anastasia M. Brederman, Natalia Kasatkina:
Text Classification by CEFR Levels Using Machine Learning Methods and the BERT Language Model. 869-878 - Mikhail V. Nevskii

, Alexei Yu. Ukhalov
:
On a Geometric Approach to the Estimation of Interpolation Projectors. 879-888 - Alexander V. Smirnov

:
The Algorithms for the Eulerian Cycle and Eulerian Trail Problems for a Multiple Graph. 889-903 - E. Yu. Pavlenko

:
Algorithm for Link Prediction in a Self-Regulating Network with Adaptive Topology Based on Graph Theory and Machine Learning. 904-919 - Maxim V. Neyzov

, Egor Vladimirovich Kuzmin
:
LTL-Specification for Development and Verification of Control Programs. 920-945 - Olga P. Yakimova

, Dmitry M. Murin
, Vladimir G. Gorshkov
:
Joint Simplification of Various Types of Spatial Objects While Preserving Topological Relations. 946-956 - Artem V. Ryabinov

, Anton I. Saveliev
, Dmitry A. Anikin
:
Modeling the Effect of External Actions on the Process of Automated Landing of a Quadcopter UAV on a Moving Platform Using Technical Vision. 957-968 - Maria D. Averina, Olga A. Levanova

:
Extracting Named Entities from Russian-Language Documents with Varying Degrees of Structural Clarity. 969-976 - Anatoliy Y. Poletaev

, Ilya V. Paramonov
, Elena I. Boychuk
:
Semantic Rule-Based Sentiment Detection Algorithm for Russian Publicism Sentences. 977-994 - Anna V. Glazkova

, Dmitry Morozov
, Marina S. Vorobeva
, Andrey A. Stupnikov
:
Keyword Generation for Russian-Language Scientific Texts Using the mT5 Model. 995-1002 - Ivan M. Chernenko

, Igor S. Anureev
, Natalya Olegovna Garanina
:
Requirement Patterns in Deductive Verification of poST Programs. 1003-1024 - Natalya Olegovna Garanina

, Sergey M. Staroletov
, Vladimir E. Zyubin
, Igor S. Anureev
:
Model Checking Programs in Process-Oriented IEC 61131-3 Structured Text. 1025-1041 - A. V. Davydov

, Alexander Larionov, Nadezhda V. Nagul
:
On the Application of the Calculus of Positively Constructed Formulas for the Study of Controlled Discrete-Event Systems. 1042-1062 - Sergey V. Zykin

:
Minimal Covering of Generalized Typed Inclusion Dependencies in Databases. 1063-1072 - Maksim A. Kosterin

, Ilya V. Paramonov
:
Application of Deep Neural Networks for Automatic Irony Detection in Russian-Language Texts. 1073-1081 - Alexander V. Smirnov

:
NP-Completeness of the Eulerian Walk Problem for a Multiple Graph. 1082-1091
Volume 58, Number 8, December 2024
- A. F. Suprun, Dmitry P. Zegzhda, V. G. Anisimov, E. D. Anisimov:

Justification of the Rational Composition of the Information Security System. 1093-1099 - O. V. Rybkina:

Construction of Deterministic and Stochastic Mathematical Models of Information System Protection. 1100-1107 - Sergey V. Bezzateev, V. A. Mylnikov, A. R. Starodub:

Model for Ranking the System of Indicators of Node Compromise of Corporate Data Network Nodes. 1108-1113 - Maxim O. Kalinin

, Artem S. Konoplev:
The Concept of Secure Distributed Ledger Technology in the Digital Environment of a Smart City. 1114-1118 - E. Yu. Pavlenko:

Intelligent Synthesis of Cyber-Resilient Network Structures: Methods, Experiments, and Architecture Implementation. 1119-1131 - Vasiliy M. Krundyshev, Georgi A. Markov

, I. Yu. Zhukov:
Mathematical Model of Information Security Event Management Using a Markov Chain in Industrial Systems. 1132-1138 - E. M. Orel, I. A. Anoshkin, Dmitry A. Moskvin:

Threat Model for Decentralized Messaging Systems. 1139-1146 - T. D. Ovasapyan, M. A. Volkovskii, A. S. Makarov:

Detecting Malware Using Deep Neural Networks. 1147-1155 - Vladimir Nikolaevich Ruchkin, Vladimir Fulin, Ekaterina Ruchkina, D. V. Grigorenko:

Cluster Analysis of a Collective of Algorithms of Multicore Neural Network Automata and Robots on Chip. 1156-1163 - D. E. Vil'khovskii:

Steganalytical Module for Detecting Embeddings in Images with a Low Stego Container Filling. 1164-1168 - M. Yu. Fedosenko:

Peculiarities of Solving the Problem of Controlling Information Security Risks in the Development of Protection Methods against Covert (Steganographic) Information Exchange in Public Internet Resources. 1169-1179 - S. G. Fomicheva, O. D. Gayduk:

Intelligent Mechanisms for Extracting Signs of File Modification in Dynamic Virus Analysis. 1180-1191 - Mikhail E. Sukhoparov, Ilya S. Lebedev, Daniil Tikhonov:

Segmenting Input Data to Improve the Quality of Identification of Information Security Events. 1192-1203 - L. Kh. Safiullina, A. R. Kasimova, A. A. Alekseeva:

Analysis of the Reliability of Template Storage When Implementing Modern Biometric Technologies in Information Security Systems. 1204-1211 - O. A. Izotova, Daria S. Lavrova:

Detecting Synthesized Audio Files Using Graph Neural Networks. 1212-1217 - I. A. Sikarev, Tatiana M. Tatarnikova:

Detecting Attacks Using Artificial Neural Networks. 1218-1225 - P. E. Yugai, D. A. Moskvin:

Using Machine Learning Algorithms and Honeypot Systems to Detect Adversarial Attacks on Intrusion Detection Systems. 1226-1233 - Maxim O. Kalinin

, A. A. Muryleva, V. V. Platonov:
Protecting Machine Learning Models from Training Data Set Extraction. 1234-1241 - A. F. Suprun, A. Yu. Garkushev, A. V. Vyvolokina, S. I. Fokina:

Application of Indicator Functions in Models of Detection and Neutralization of Harmful Information Objects. 1242-1249 - N. V. Gololobov:

Formal Statement of the Problem of Morphing Executive Code in Software Operation. 1250-1254 - G. S. Kubrin, Peter D. Zegzhda:

Detecting Defects in Multicomponent Software Using a Set of Universal Graph Representations of the Code. 1255-1262 - E. V. Zavadskii, A. V. Bulat, N. A. Gribkov:

Method of Searching for Clones of the Program Code in Binary Executive Files. 1263-1270 - T. D. Ovasapyan, E. M. Tolgorenko, E. A. Zubkov:

Identification and Verification of Authorship Using Machine and Deep Learning Methods. 1271-1282 - Elena B. Aleksandrova, A. I. Bezborodko, Daria S. Lavrova:

The Use of Generative-Adversarial Networks to Counter Steganalysis. 1283-1288 - M. R. Salikhov:

Model of a Distributed Storage System for Crypto Wallet Private Keys. 1289-1296 - Elena B. Aleksandrova, S. O. Kostin:

On the Method of Masking in the Multiple Signature Protocol Based on Isogenies of Elliptic Curves. 1297-1302 - D. S. Bogdanov, A. S. Logachev, V. O. Mironkin:

Probability-Theoretical Models of Physical Random Number Generators. 1303-1310 - Maria A. Poltavtseva, A. A. Podorov, Elena B. Aleksandrova:

Verification of Access Control in Big Data Systems Using Temporal Logics. 1311-1317 - E. Yu. Pavlenko, M. A. Pakhomov:

Providing Information Security of Vehicular Ad Hoc Networks Using the Early Detection of Malicious Nodes. 1318-1325 - A. A. Kornienko, S. V. Kornienko, N. S. Razzhivin:

Protection Against Unauthorized Access of Mobile Devices When Using the BYOD Concept. 1326-1335 - Maxim O. Kalinin

, Alexey G. Busygin, Artem S. Konoplev, Vasiliy M. Krundyshev:
Application of Distributed Ledger Technology to Ensure the Security of Smart City Information Systems. 1336-1342 - M. A. Pakhomov:

Protection of Ad Hoc Networks against Distributed Network Scanning. 1343-1351 - Maria A. Poltavtseva, V. V. Zaitseva, Denis V. Ivanov:

Assessing the Security of Big Data Systems. 1352-1364 - E. Yu. Pavlenko, N. V. Polosukhin:

Analysis of Data Exchange Systems about Information Security Threats. 1365-1372 - Sergey V. Bezzateev, G. A. Zhemelev, S. G. Fomicheva:

Researching the Performance of AutoML Platforms in Confidential Computing. 1373-1385 - I. A. Goretskii, Daria S. Lavrova:

Intelligent Recommendation System for Countering Network Attacks. 1386-1391 - S. V. Belim, S. A. Gorshkov:

Method of Embedding Hidden Data into a Message Stream with Noise-Immune Encoding. 1392-1395 - F. G. Pashaev, D. I. Zeinalov, G. T. Nadzhafov:

Development of Software and Hardware to Protect Technological Processes from Cyber Threats. 1396-1405 - Sergey V. Bezzateev, M. Yu. Fedosenko:

Analysis of the Problems of Using Steganographic Methods in Implementing Illegal Actions and Their Role in Digital Forensics. 1406-1421 - Ivan R. Fedorov, A. A. Kovalev:

Development of a Method for Ensuring Data Integrity in Edge Computing Networks Based on Blockchain Technology. 1422-1428 - A. F. Suprun, A. Yu. Gar'kushev, A. V. Lipis, I. L. Karpova, A. A. Shalkovskaya:

Assessment of the Competence of an Intelligent Information Security Management System. 1429-1435 - E. M. Orel, D. A. Moskvin, A. A. Lyashenko:

Attack Graph-Based Data Presentation for Use in Automated Security Analysis Systems. 1436-1441 - E. Yu. Pavlenko, M. A. Pakhomov:

Graph of Self-Regulation of Various Types of Networks with Adaptive Topology. 1442-1449

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














