


default search action
Automatic Control and Computer Sciences, Volume 58
Volume 58, Number 1, February 2024
- Alexander M. Andronov, Kristina Mahareva:
Elaborated Analysis of a Nonreplenishable Queue with Erlang Distribution of the Service Time. 1-10 - Yongcun Zhu:
Numerical Analysis of Pneumatic Regenerative Braking System. 11-22 - Hanhua Yang:
Research on Multisensor Data Fusion Model for Monitoring Animal Breeding Environment. 23-32 - Zhoe Comas-Gonzalez
, Johan Mardini, Shariq Aziz Butt, Andres Gabriel Sanchez Comas, Kåre Synnes, Aurelian Joliet, Emiro De la Hoz-Franco
, Diego Molina-Estren, Gabriel Piñeres-Espitia
, Sumera Naz, Daniela Ospino-Balcázar:
Sensors and Machine Learning Algorithms for Location and POSTURE Activity Recognition in Smart Environments. 33-42 - Kexin Ding, Xueliang Zhang, Yurong Nan, Min Zhuang:
Fixed Time Adaptive Fuzzy Control of Nonlinear Systems with Time-Varying State Constraints. 43-57 - Lihui Hu:
Analysis of Employment Information of University Graduates through Data Mining. 58-65 - D. Senthil Kumar, S. S. Arumugam, M. Lordwin Cecil Prabhaker, R. Daisy Merina:
Eamlm: Enhanced Automated Machine Learning Model for IoT Based Water Quality Analysis with Real-Time Dataset. 66-77 - Yijun Mai, Mingjing Li, Yingbo Pei, Hongbing Wu, Zhenyao Su:
Research and Design of an Intelligent Street Lamp Control System Based on NB-IoT. 78-89 - Jing Hou, Meimei Chen, Yihang Guo, Zhangxi Lin, Bin Hong:
Research on GDR Obstacle Detection Method Based on Stereo Vision. 90-100 - Vladimir Aristov:
Monostatic Pulsed Ultrawideband Radar Antenna for Studying Biological Rhythms of the Human Body and Internal Inhomogeneities of Dielectric Objects. 101-108 - Shuangshuang Yu:
Extraction and Analysis of Semantic Features of English Texts under Intelligent Algorithms. 109-115
Volume 58, Number 2, April 2024
- Hakim Bagua
, Belgacem Said Khaldi
, Abdelhamid Iratni
, Ahmed Hafaifa, Ilhami Colak:
Model-Based Faults Diagnostics of Single Shaft Gas Turbine Using Fuzzy Faults Tolerant Control. 117-130 - Zhuangzhuang Deng, Shihai Yang
, Yun Li
, Xiaojie Gu, Lingzhe Xu, Ruiqiang Liu:
Unanticipated Fault Detection and Isolation of Telescope Drive System Based on Luenberger Observer and Axes Transformation. 131-141 - Mohamed Chafa
, Kamel Messaoudi
, Lamri Louze:
Speed Control of Permanent Magnet Synchronous Motor Using Xilinx System Generator. 142-152 - Jay Dave, Nikumani Choudhury:
Secure and Efficient Traffic Obfuscation Scheme for Deduplicated Cloud Storage. 153-165 - ChunXiang Liu, Yuwei Wang, Lei Wang, Tianqi Cheng, Xinping Guo:
BCNN: An Effective Multifocus Image fusion Method Based on the Hierarchical Bayesian and Convolutional Neural Networks. 166-176 - Seddik Rabhi, Fouzi Semchedine, Nader Mbarek:
Localization in Wireless Sensor Networks by Hybridization between Optimization Algorithms of Particle Swarms and Fruit Flies. 177-184 - Feng Xu, Shuli Jia, Chong Qu, Duo Chen, Liyong Ma:
Diesel Engine Fault Diagnosis Based on Convolutional Autoencoder Using Vibration Signals. 185-194 - Kulvinder Singh
, Sanjeev Dhawan, Deepanshu Mehla:
Performance Evaluation of Machine Learning Models for Multiple Chronic Disease Diagnosis Using Symptom Data. 195-208 - Mingliang Zheng:
Clustering of Image Covariance Matrixes on Lie Group Manifold. 209-215 - Yingwei Gao:
Study on Applications of Reversible Information Hiding Algorithms Based on Discrete Cosine Transform Coefficient and Frequency Band Selection in JPEG Image Encryption. 216-225
Volume 58, Number 3, June 2024
- Feng Guo, Hong Zhang, Hong Yu:
Dynamic Properties and Chaos Control of a High Dimensional Double Rotor Model. 227-236 - M. Abdullah, Lubna Moin, Fayyaz Ahmed, Farhan Khan, Wahab Mohyuddin:
Electric Vehicle Battery Temperature Control Using Fuzzy Logic. 237-251 - Hai Yang, Wenjun Kao, Jinqiang Li, Chunling Liu, JianGuo Bai, ChangDe Wu, Feng Geng:
ResNet Combined with Attention Mechanism for Genomic Deletion Variant Prediction. 252-264 - Sergey V. Sokolov, Daniil V. Marshakov, Irina V. Reshetnikova:
Robust Estimation of State Parameters of Discrete Nonlinear Stochastic Systems. 265-273 - Tingyang Zhao, Tao Hou, Hongxia Niu:
Research on Detection and Correction of High-Speed Train Idling and Skidding Based on Improved Fuzzy Neural Network. 274-288 - T. Shuprajhaa
, K. Srinivasan, M. Brindha
:
Event Triggered Constrained Regulatory Control of Blood Glucose in Type I Diabetes Mellitus Condition. 289-302 - Baofeng Zhao:
Multisensor Maneuvering Target Fusion Tracking Using Interacting Multiple Model. 303-312 - Fatima Belamri, Samra Boulfekhar, Djamil Aïssani
:
C-QoSRP: Cluster Based QOS-Routing Protocol for VANET in Highway Environment. 313-325 - Wenjin Wang, Miaomiao Lu, Xuanling Dai, Ping Jiang:
Binary Wavelet Transform-Based Financial Text Image Authentication Algorithm. 326-335 - Wei Li, Kai Zhang, Chunpeng Zhang, Qiang Wang, Yi Zhang:
An Adaptive Indicator Optimization Ensemble Empirical Mode Decomposition Method and Its Application on the Denoising of BeiDou B1I Signal. 336-345 - A. Belherazem, R. Salim, Abdelmalek Laidani, Mohamed Chenafa:
Vibration Control of a Two-Link Flexible Manipulator. 346-358
Volume 58, Number 4, August 2024
- Jin Wang, Ruiting Liu, Liming Liu, Xiaoxiang Cheng, Feiyong Chen, Xue Shen:
Fire Risk Monitoring of Tamarix chinensis Forest Based on Infrared Remote Sensing Technology. 359-365 - Shan Li, Diyuan Tan, Binbin Yao, Zhe Wang:
Fall Monitoring System Based on Wearable Device and Improved KNN. 366-378 - Saeid Haidari, Alireza Hosseinpour:
RF Source Localization Method Based on a Single-Anchor and Map Using Reflection in an Improved Particle Filter. 379-391 - Wang Hao, Li Hui, Duanzheng Song, Jintao Zhu:
A Research on Genetic Algorithm-Based Task Scheduling in Cloud-Fog Computing Systems. 392-407 - Jianlou Lou, Xuan Xie, Guang Huo, Zhaoyang Hong, Chuang Yang, Jin Qi:
CSASNet - A Crop Leaf Disease Identification Method Based on Improved ShuffleNetV2. 408-419 - Ahmed Sahnoune
, Sefouane Chellali, Daoud Berkani, Elhadj Zeraoulia:
Secure Turbo Codes Design Using Chaotic Interleaver Based on Generalized 2D Chaotic Map. 420-428 - Lisha Yao
:
Facial Expression Recognition Based on Multiscale Features and Attention Mechanism. 429-440 - Qi Yao, Dayang Jiang:
Improved AOA Algorithm to Optimize Image Entropy for Image Recognition Model. 441-453 - Eugene Zhmakin, Grach Mkrtchian:
Building a Production-Ready Keyword Detection System on a Real-World Audio. 454-458 - Zhipeng Yu, Qiang Wan:
Majorization Resource for Visual Communication Effect of Multiframe Low-Resolution Photograph Sequence. 459-471 - Lei Yan:
Research on Binocular Vision Image Calibration Method Based on Canny Operator. 472-480
Volume 58, Number 5, October 2024
- Lina Yu, Yinjun Zhou, Yao Hu:
Research on Groundwater Level Prediction Method in Karst Areas Based on Improved Attention Mechanism Fusion Time Convolutional Network. 481-490 - Kulvinder Singh
, Sanjeev Dhawan, Nisha Bali:
An Ensemble Learning Hybrid Recommendation System Using Content-Based, Collaborative Filtering, Supervised Learning and Boosting Algorithms. 491-505 - Xiaoxiao Cheng, Jianjun Wang, Jiongyu Wang, Kun Wang, Xudong Li:
Extraction of Features of Regular Surfaces from the Laser Point Clouds for 3D Objects. 506-518 - Walid Fakhet, Salim El Khediri, Salah Zidi:
A Novel Arabic Optical Character Recognition Approach Based on Levenshtein Distance. 519-529 - Jiang Xiang Ju, Wang Rui Tong:
Insulator Defect Detection of Lightweight Rotating YOLOv5 Based on Adaptive Feature Fusion. 530-543 - Sofiane Abdelkrim Khalladi, Asmâa Ouessai
, Mokhtar Keche:
Road Traffic Classification from Nighttime Videos Using the Multihead Self-Attention Vision Transformer Model and the SVM. 544-554 - Haiyan Kang
, Congming Zhang, Hongling Jiang:
Advancing Driver Behavior Recognition: An Intelligent Approach Utilizing ResNet. 555-568 - Anju Augustin, Cinu C. Kiliroor:
Airborne Chemical Detection Using IoT and Machine Learning in the Agricultural Area. 569-579 - Yuehua Li, Yueyue Zhang, Jinfeng Wang, Fanfan Zhong, Bin Hu:
Chinese License Plate Recognition Based on OpenCV and LPCR Net. 580-591 - Wenjin Wang, Miaomiao Lu, Xuanling Dai, Ping Jiang:
Financial Digital Images Compression Method Based on Discrete Cosine Transform. 592-601
Volume 58, Number 6, December 2024
- Hassène Gritli
, Sahar Jenhani
, Jyotindra Narayan
:
Motion Control of Manipulator Robots via Two PD-Based Nonlinear Controllers: Design and Comparative Analysis. 603-616 - Hanhua Yang, Chong Chen:
Water Quality Assessment for Fishpond via Multisource Information Fusion. 617-629 - Edwards Ernesto Sánchez-Ramírez, Alberto Jorge Rosales-Silva, Ponciano Jorge Escamilla-Ambrosio, Floriberto Ortiz-Rodríguez, Rogelio Antonio Alfaro-Flores, Jean Marie Vianney Kinani:
Rogust Sensor Fusion Using Federated Kalman Filter and Discrete Generalized-Proportional-Integral Observers. 630-641 - Yilihamu Yaermaimaiti, Yajie Liu, Lingfei Xi, Ruohao Wang:
Helmet Detection Algorithm Based on Improved YOLOv7. 642-655 - Xiaoguang Wei, Qian Zhang:
A Security Scheme for Source-Location Privacy Protection in Wireless Sensor Networks by Selecting Phantom Nodes. 656-662 - Verasis Kour, Parveen Kumar Lehana
:
GMM Based Fault Signature Estimation of Electromechanical Machines for Small and Medium-Sized Enterprises in IoT Environment. 663-678 - Jianlou Lou, Xinyan Chi, Guang Huo, Jin Qi, Zhaoyang Hong, Chuang Yang:
Agri-NER-Net: Glyph Fusion for Chinese Field Crop Diseases and Pests Named Entity Recognition Network. 679-689 - Maha Ben Ayed, Mohamed Sayah, Raouf Ketata, Noureddine Zerhouni:
A Smart LSTM for Industrial Part Conformity: SME Material-Data Based Decision-Making. 690-704 - Benshuang Chen, Liangjing Shao, Xinrong Chen:
Template-Free Neural Representations for Novel View Synthesis of Humans. 705-713 - Vladimir Aristov, Modris Greitans:
Study of a Radar Sensor Transmitter to Optimize a Bipolar Ultrawideband Pulse Used to Excite the Antenna. 714-721 - Arslan A. Rizvi, Talha Ali Khan, Cao Feng, Abdelrahman El-Leathy:
Pyramidal Sun Sensor: A Novel Sun Tracking System Solution for Single Axis Parabolic Trough Collector. 722-734 - Shahid Ali, Bingli Jiao:
Altitude-Based Dynamics Modulation and Power Analysis in LEO Satellites. 735-743 - Fatima Belamri, Samra Boulfekhar, Djamil Aïssani:
Erratum to: Cluster Based QOS-Routing Protocol for VANET in Highway Environment. 744
Volume 58, Number 7, December 2024
- Alexander V. Smirnov
:
The Optimized Algorithm of Finding the Shortest Path in a Multiple Graph. 745-752 - Leonid N. Kazakov
, Evgeniy P. Kubyshkin
, D. E. Paley
:
Construction of the Optimal Information Exchange Scheme of an Adaptive Motion Control System for a Group of Unmanned Aerial Vehicles. 753-761 - Alexander I. Legalov
, Pavel Kosov
:
C Language Extension to Support Procedural-Parametric Polymorphism. 762-778 - Nadezhda S. Lagutina
, Andrey Vasilyev
, Daniil D. Zafievsky
:
Tasks in Named Entity Recognition: Technologies and Tools. 779-796 - Ilya V. Paramonov
, Anatoliy Y. Poletaev
:
Annotation of Text Corpora by Sentiment and Irony in a Project of Citizen Science. 797-807 - Leonid Y. Bystrov
, Egor Vladimirovich Kuzmin
:
Zhegalkin Polynomial of a Multiary Sole Sufficient Operator. 808-826 - Vladimir V. Vasilchikov
:
Recursive-Parallel Algorithm for Solving the Maximum Common Subgraph Problem. 827-835 - Yu. V. Kosolapov
:
On Simplifying Mixed Boolean-Arithmetic Expressions. 836-852 - Sergey D. Glyzin
, E. A. Marushkina
:
Algorithms for Asymptotic and Numerical Modeling of Oscillatory Modes in the Simplest Ring of Generators with Asymmetric Nonlinearity. 853-860 - Sergey V. Zykin
:
Generalization of Typed Inclusion Dependencies with Null Values in Databases. 861-868 - Nadezhda S. Lagutina
, Ksenia V. Lagutina
, Anastasia M. Brederman, Natalia Kasatkina:
Text Classification by CEFR Levels Using Machine Learning Methods and the BERT Language Model. 869-878 - Mikhail V. Nevskii
, Alexei Yu. Ukhalov
:
On a Geometric Approach to the Estimation of Interpolation Projectors. 879-888 - Alexander V. Smirnov
:
The Algorithms for the Eulerian Cycle and Eulerian Trail Problems for a Multiple Graph. 889-903 - E. Yu. Pavlenko
:
Algorithm for Link Prediction in a Self-Regulating Network with Adaptive Topology Based on Graph Theory and Machine Learning. 904-919 - Maxim V. Neyzov
, Egor Vladimirovich Kuzmin
:
LTL-Specification for Development and Verification of Control Programs. 920-945 - Olga P. Yakimova
, Dmitry M. Murin
, Vladimir G. Gorshkov
:
Joint Simplification of Various Types of Spatial Objects While Preserving Topological Relations. 946-956 - Artem V. Ryabinov
, Anton I. Saveliev
, Dmitry A. Anikin
:
Modeling the Effect of External Actions on the Process of Automated Landing of a Quadcopter UAV on a Moving Platform Using Technical Vision. 957-968 - Maria D. Averina, Olga A. Levanova
:
Extracting Named Entities from Russian-Language Documents with Varying Degrees of Structural Clarity. 969-976 - Anatoliy Y. Poletaev
, Ilya V. Paramonov
, Elena I. Boychuk
:
Semantic Rule-Based Sentiment Detection Algorithm for Russian Publicism Sentences. 977-994 - Anna V. Glazkova
, Dmitry Morozov
, Marina S. Vorobeva
, Andrey A. Stupnikov
:
Keyword Generation for Russian-Language Scientific Texts Using the mT5 Model. 995-1002 - Ivan M. Chernenko
, Igor S. Anureev
, Natalya Olegovna Garanina
:
Requirement Patterns in Deductive Verification of poST Programs. 1003-1024 - Natalya Olegovna Garanina
, Sergey M. Staroletov
, Vladimir E. Zyubin
, Igor S. Anureev
:
Model Checking Programs in Process-Oriented IEC 61131-3 Structured Text. 1025-1041 - A. V. Davydov
, Alexander Larionov, Nadezhda V. Nagul
:
On the Application of the Calculus of Positively Constructed Formulas for the Study of Controlled Discrete-Event Systems. 1042-1062 - Sergey V. Zykin
:
Minimal Covering of Generalized Typed Inclusion Dependencies in Databases. 1063-1072 - Maksim A. Kosterin
, Ilya V. Paramonov
:
Application of Deep Neural Networks for Automatic Irony Detection in Russian-Language Texts. 1073-1081 - Alexander V. Smirnov
:
NP-Completeness of the Eulerian Walk Problem for a Multiple Graph. 1082-1091
Volume 58, Number 8, December 2024
- A. F. Suprun, Dmitry P. Zegzhda, V. G. Anisimov, E. D. Anisimov:
Justification of the Rational Composition of the Information Security System. 1093-1099 - O. V. Rybkina:
Construction of Deterministic and Stochastic Mathematical Models of Information System Protection. 1100-1107 - S. V. Bezzateev, V. A. Mylnikov, A. R. Starodub:
Model for Ranking the System of Indicators of Node Compromise of Corporate Data Network Nodes. 1108-1113 - Maxim O. Kalinin, Artem S. Konoplev:
The Concept of Secure Distributed Ledger Technology in the Digital Environment of a Smart City. 1114-1118 - E. Yu. Pavlenko:
Intelligent Synthesis of Cyber-Resilient Network Structures: Methods, Experiments, and Architecture Implementation. 1119-1131 - Vasiliy M. Krundyshev, Georgi A. Markov, I. Yu. Zhukov:
Mathematical Model of Information Security Event Management Using a Markov Chain in Industrial Systems. 1132-1138 - E. M. Orel, I. A. Anoshkin, Dmitry A. Moskvin:
Threat Model for Decentralized Messaging Systems. 1139-1146 - T. D. Ovasapyan, M. A. Volkovskii, A. S. Makarov:
Detecting Malware Using Deep Neural Networks. 1147-1155 - Vladimir Nikolaevich Ruchkin, Vladimir Fulin, Ekaterina Ruchkina, D. V. Grigorenko:
Cluster Analysis of a Collective of Algorithms of Multicore Neural Network Automata and Robots on Chip. 1156-1163 - D. E. Vil'khovskii:
Steganalytical Module for Detecting Embeddings in Images with a Low Stego Container Filling. 1164-1168 - M. Yu. Fedosenko:
Peculiarities of Solving the Problem of Controlling Information Security Risks in the Development of Protection Methods against Covert (Steganographic) Information Exchange in Public Internet Resources. 1169-1179 - S. G. Fomicheva, O. D. Gayduk:
Intelligent Mechanisms for Extracting Signs of File Modification in Dynamic Virus Analysis. 1180-1191 - Mikhail E. Sukhoparov, Ilya S. Lebedev, Daniil Tikhonov:
Segmenting Input Data to Improve the Quality of Identification of Information Security Events. 1192-1203 - L. Kh. Safiullina, A. R. Kasimova, A. A. Alekseeva:
Analysis of the Reliability of Template Storage When Implementing Modern Biometric Technologies in Information Security Systems. 1204-1211 - O. A. Izotova, Daria S. Lavrova:
Detecting Synthesized Audio Files Using Graph Neural Networks. 1212-1217 - I. A. Sikarev, Tatiana M. Tatarnikova:
Detecting Attacks Using Artificial Neural Networks. 1218-1225 - P. E. Yugai, D. A. Moskvin:
Using Machine Learning Algorithms and Honeypot Systems to Detect Adversarial Attacks on Intrusion Detection Systems. 1226-1233 - Maxim O. Kalinin, A. A. Muryleva, V. V. Platonov:
Protecting Machine Learning Models from Training Data Set Extraction. 1234-1241 - A. F. Suprun, A. Yu. Garkushev, A. V. Vyvolokina, S. I. Fokina:
Application of Indicator Functions in Models of Detection and Neutralization of Harmful Information Objects. 1242-1249 - N. V. Gololobov:
Formal Statement of the Problem of Morphing Executive Code in Software Operation. 1250-1254 - G. S. Kubrin, Peter D. Zegzhda:
Detecting Defects in Multicomponent Software Using a Set of Universal Graph Representations of the Code. 1255-1262 - E. V. Zavadskii, A. V. Bulat, N. A. Gribkov:
Method of Searching for Clones of the Program Code in Binary Executive Files. 1263-1270 - T. D. Ovasapyan, E. M. Tolgorenko, E. A. Zubkov:
Identification and Verification of Authorship Using Machine and Deep Learning Methods. 1271-1282 - Elena B. Aleksandrova, A. I. Bezborodko, Daria S. Lavrova:
The Use of Generative-Adversarial Networks to Counter Steganalysis. 1283-1288 - M. R. Salikhov:
Model of a Distributed Storage System for Crypto Wallet Private Keys. 1289-1296 - Elena B. Aleksandrova, S. O. Kostin:
On the Method of Masking in the Multiple Signature Protocol Based on Isogenies of Elliptic Curves. 1297-1302 - D. S. Bogdanov, A. S. Logachev, V. O. Mironkin:
Probability-Theoretical Models of Physical Random Number Generators. 1303-1310 - Maria A. Poltavtseva, A. A. Podorov, Elena B. Aleksandrova:
Verification of Access Control in Big Data Systems Using Temporal Logics. 1311-1317 - E. Yu. Pavlenko, M. A. Pakhomov:
Providing Information Security of Vehicular Ad Hoc Networks Using the Early Detection of Malicious Nodes. 1318-1325 - A. A. Kornienko, S. V. Kornienko, N. S. Razzhivin:
Protection Against Unauthorized Access of Mobile Devices When Using the BYOD Concept. 1326-1335 - Maxim O. Kalinin, Alexey G. Busygin, Artem S. Konoplev, Vasiliy M. Krundyshev:
Application of Distributed Ledger Technology to Ensure the Security of Smart City Information Systems. 1336-1342 - M. A. Pakhomov:
Protection of Ad Hoc Networks against Distributed Network Scanning. 1343-1351 - Maria A. Poltavtseva, V. V. Zaitseva, D. V. Ivanov:
Assessing the Security of Big Data Systems. 1352-1364 - E. Yu. Pavlenko, N. V. Polosukhin:
Analysis of Data Exchange Systems about Information Security Threats. 1365-1372 - Sergei V. Bezzateev, G. A. Zhemelev, S. G. Fomicheva:
Researching the Performance of AutoML Platforms in Confidential Computing. 1373-1385 - I. A. Goretskii, Daria S. Lavrova:
Intelligent Recommendation System for Countering Network Attacks. 1386-1391 - S. V. Belim, S. A. Gorshkov:
Method of Embedding Hidden Data into a Message Stream with Noise-Immune Encoding. 1392-1395 - F. G. Pashaev, D. I. Zeinalov, G. T. Nadzhafov:
Development of Software and Hardware to Protect Technological Processes from Cyber Threats. 1396-1405 - S. V. Bezzateev, M. Yu. Fedosenko:
Analysis of the Problems of Using Steganographic Methods in Implementing Illegal Actions and Their Role in Digital Forensics. 1406-1421 - Ivan R. Fedorov, A. A. Kovalev:
Development of a Method for Ensuring Data Integrity in Edge Computing Networks Based on Blockchain Technology. 1422-1428 - A. F. Suprun, A. Yu. Gar'kushev, A. V. Lipis, I. L. Karpova, A. A. Shalkovskaya:
Assessment of the Competence of an Intelligent Information Security Management System. 1429-1435 - E. M. Orel, D. A. Moskvin, A. A. Lyashenko:
Attack Graph-Based Data Presentation for Use in Automated Security Analysis Systems. 1436-1441 - E. Yu. Pavlenko, M. A. Pakhomov:
Graph of Self-Regulation of Various Types of Networks with Adaptive Topology. 1442-1449

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.