default search action
Automatic Control and Computer Sciences, Volume 51
Volume 51, Number 1, January 2017
- Arefe Esalat Nejad, Morteza Romoozi:
Presenting a traffic management and control system in driver assistance form based on vehicular networks. 1-12 - Mehdi Merouane:
An approach for detecting and preventing DDoS attacks in campus. 13-23 - Yan He, Na Zhang:
Shortwave spatial spectrum direction finding and positioning system based on software communication architecture. 24-31 - Fengxian Shen, Xu Jian, Xianjie Xi:
Implementation of graphic vertex-coloring parallel synthesis algorithm based on genetic algorithm and compute unified device architecture. 32-41 - Cheng Zeng, Yingying Su, Shan Liang:
A sufficient and necessary condition for stabilization of zeros in discrete-time multirate sampled systems. 42-49 - Kaspars Sudars:
Face recognition Face2vec based on deep learning: Small database case. 50-54 - Yevgeniy V. Bodyanskiy, Anastasiia O. Deineko, Yana V. Kutsenko:
On-line kernel clustering based on the general regression neural network and T. Kohonen's self-organizing map. 55-62 - Vyacheslav P. Koryachko, Dmitry A. Perepelkin, Dmitry S. Byshov:
Development and research of improved model of multipath adaptive routing in computer networks with load balancing. 63-73
Volume 51, Number 2, March 2017
- Vladimir N. Shashihin:
Guaranteed-result strategy to synthesize a decentralized control for systems under parametric perturbations. 75-84 - Gang Xiong, Jiming Lan, Haiyan Zhang, Tian-Huai Ding:
The effect of attribute normalization factors in attribute distance weighted average. 85-96 - Hong Li, Long Yu, Shengwei Tian, Li Li, Mei Wang, Xueyuan Lu:
Deep learning in pharmacy: The prediction of aqueous solubility based on deep belief network. 97-107 - C. Deepa:
SABC-SBC: a hybrid ontology based image and webpage retrieval for datasets. 108-113 - Laurens Lemaire, Jan Vossaert, Joachim Jansen, Vincent Naessens:
A logic-based framework for the security analysis of Industrial Control Systems. 114-123 - Alireza Rezaee:
Determining PID controller coefficients for the moving motor of a welder robot using fuzzy logic. 124-132 - Zhihong Zhang, Limiao Li, Huafu Liu:
Ultrasonic elastography optimization algorithm based on coded excitation and spatial compounding. 133-140
Volume 51, Number 3, May 2017
- A. V. Mandrik:
Estimation of stability of oscillations of linear time-varying systems with one time-varying parameter with calculation of influence of higher frequency motions. 141-148 - Lei Huang, Zhongsheng Li, Ben-Liang Wang:
Detection of abnormal traffic video images based on high-dimensional fuzzy geometry. 149-158 - Hanshu Hong, Zhixin Sun:
Efficient key insulated attribute based signature without bilinear pairings for mobile communications. 159-166 - Dmitry I. Kaplun, Dmitry M. Klionskiy, D. V. Bogaevskiy, V. V. Gulvanskiy, Alexander V. Veligosha, Igor Anatolyevich Kalmykov:
Error correction of digital signal processing devices using non-positional modular codes. 167-173 - Miaolei Deng, Kai Nie, Weijun Zhu, Chunyan Zhang:
The detection of Udpstorm attacks based on model checking linear temporal logic. 174-179 - Weiwei Xing, Pingping Bai, Shunli Zhang, Peng Bao:
Scene-specific pedestrian detection based on transfer learning and saliency detection for video surveillance. 180-192 - Jia Lin, Xiaogang Ruan, Naigong Yu, Jianxian Cai:
Multi-cue based moving hand segmentation for gesture recognition. 193-203 - Feng Tan:
Development and realization of embedded car networking vehicle terminal software system. 204-213
Volume 51, Number 4, July 2017
- Andrii O. Oliinyk, S. Yu. Skrupsky, Sergey Subbotin, Igor Korobiichuk:
Parallel method of production rules extraction based on computational intelligence. 215-223 - Aivars Lorencs, V. Plocinsh:
Efficient determination of a finite set of states for an up-and-down process possessing a practical closure. 224-232 - Chunqing Han, Lin Li:
Control on the transmission of computer viruses in network. 233-239 - M. Thangapandiyan, P. M. Rubesh Anand:
Robust CHARM: an efficient data hosting scheme for cloud data storage system. 240-247 - Ssu-Han Chen:
Inspecting mixed textured lens collar images using discrete Fourier transformation. 248-253 - Ping Kuang, Jianhua Deng:
HEVC intra coding using vote-based optimization algorithm. 254-262 - Qinli Zhang, Shuting Shen, Xiaoyun Su, Qi Guo:
A novel method of medical image enhancement based on wavelet decomposition. 263-269 - Sergey V. Sokolov, Sergey M. Kovalev, Andrey Sukhanov:
Parametric identification for perturbed paths of navigation satellites based on inter-satellite measurements. 270-278 - D. Skripniks, S. Sarkovskis, A. Yershov, Elans Grabs:
Impulse response approximation of digital finite impulse response filter with delay line units. 279-284
Volume 51, Number 5, September 2017
- V. P. Suprun:
The complexity of Boolean functions in the Reed-Muller polynomials class. 285-293 - Vladimir Aristov:
Distance localization of the moving object by applying the Karhunen-Loeve transform to ultra-wideband impulse signals. 294-300 - Djamel Eddine Ghouraf, Abdellatif Naceri:
Robust H2-PSS design based on LQG control optimized by genetic algorithms. 301-310 - Youan Zhang, Heng Li, Jingmao Liu, Ruwei Zeng, Junwei Lei:
Research on adaptive sliding synchronization of Rikitake chaotic system with single unknown control coefficient. 311-320 - Xinyu Shi, Shengwei Tian, Long Yu, Li Li, Shuangyin Gao:
Prediction of soil adsorption coefficient based on deep recursive neural network. 321-330 - Nicholas A. Nechval, Gundars Berzins, S. Balina, I. Steinbuka, Konstantin N. Nechval:
Constructing unbiased prediction limits on future outcomes under parametric uncertainty of underlying models via pivotal quantity averaging approach. 331-336 - Omid Heydarnia, Behnam Dadashzadeh, Akbar Allahverdizadeh, M. R. Sayyed Noorani:
Discrete sliding mode control to stabilize running of a biped robot with compliant kneed legs. 347-356 - Alexander Titaev:
Reducing update data time for exchange via MODBUS TCP protocol by controlling a frame length. 357-365 - Liyi Zhang, Chao Xiao, Teng Fei:
Improved ant colony optimization algorithm based on RNA computing. 366-375
Volume 51, Number 6, November 2017
- I. El Harraki, A. Khazari, Ali Boutoulout:
Exact gradient controllability with strategic actuators. 377-390 - Iryna Pliss, Iryna Perova:
Diagnostic Neuro-Fuzzy System and Its Learning in Medical Data Mining Tasks in Conditions of Uncertainty about Numbers of Attributes and Diagnoses. 391-398 - S. H. Rajani, Bindu M. Krishna, Usha Nair:
Pressure regulation inside a hypersonic wind tunnel using H-infinity optimization control. 399-409 - Aldis Baums:
Response to CBRNE and human-caused accidents by using land and air robots. 410-416 - Pavel Osipov, Ludmila Aleksejeva, Arkady Borisov, Yu. A. Chizhov, Tatjana Zmanovska, Vitaly M. Zabiniako:
Implementation and operation aspects of a system for detecting abnormally level of user activity. 417-425 - Alexander Ilyashenko, Alexey Lukashin, Vladimir S. Zaborovsky, An. A. Lukashin:
Algorithms for planning Resource-Intensive computing tasks in a hybrid supercomputer environment for simulating the characteristics of a quantum rotation sensor and performing engineering calculations. 426-434 - Hongtian Shen, Jianwei Yan:
Optimal control of rail transportation associated automatic train operation based on fuzzy control algorithm and PID algorithm. 435-441 - Jiandong Yao, Xiaoyong Yan, Rulin Dou:
An anisotropic-tolerant and error control localization algorithm in wireless sensor network. 442-452 - Alexander N. Sychev:
The effect of presynaptic inhibition in switching neurostructures. 453-462
Volume 51, Number 7, December 2017
- Olga Kouchnarenko, Jean-François Weber:
Component-Based Systems Reconfigurations Using Graph Transformations with GROOVE. 463-478 - Sergey Baranov, Victor Nikiforov:
Analysis of Real-Time Applications Feasibility through Simulation. 479-488 - N. V. Vizovitin, Valery A. Nepomniaschy, A. A. Stenenko:
Application of Colored Petri Nets for Verification of Scenario Control Structures in UCM Notation. 489-497 - Natalya Olegovna Garanina, Elena A. Sidorova:
An Approach to Verification of a Family of Multiagent Systems for Conflict Resolution. 498-506 - Maxim Gromov, Natalia Shabaldina:
Derivation of the Cascade Parallel Composition of Timed Finite State Machines Using BALM-II. 507-515 - Anton Ermakov, Nina Yevtushenko:
Deriving Test Suites with the Guaranteed Fault Coverage for Extended Finite State Machines. 516-522 - Vladimir A. Zakharov, G. G. Temerbekova:
On the Minimization of Finite State Transducers over Semigroups. 523-530 - Vladimir M. Itsykson:
Formalism and Language Tools for Specification of the Semantics of Software Libraries. 531-538 - Dmitry Yu. Volkanov:
Method for Choosing a Balanced Set of Fault-Tolerance Techniques for Distributed Computer Systems. 539-550 - Vladimir V. Vasilchikov:
On Optimization and Parallelization of the Little Algorithm for Solving the Travelling Salesman Problem. 551-557 - Alexander V. Smirnov:
Network Model for the Problem of Integer Balancing of a Four-Dimensional Matrix. 558-566 - D. A. Ryabukhin, E. V. Kuzmin, Valery A. Sokolov:
Construction of CFC-Programs by LTL-Specification. 567-575 - Vladimir A. Bondarenko, Andrei V. Nikolaev, Dzhambolet Shovgenov:
Polyhedral Characteristics of Balanced and Unbalanced Bipartite Subgraph Problems. 576-585 - Evgeniy A. Timofeev:
Expansion of Self-Similar Functions in the Faber-Schauder System. 586-591 - Sergey A. Kaschenko:
Asymptotic Expansions of Eigenvalues of the First Boundary-Value Problem for Singularly Perturbed Second-Order Differential Equation with Turning Points. 592-605 - Valentin F. Butuzov, Nikolay N. Nefedov, Lutz Recke, Klaus R. Schneider:
Asymptotics, Stability, and Region of Attraction of Periodic Solution to a Singularly Perturbed Parabolic Problem with Double Root of a Degenerate Equation. 606-613 - Nikolai A. Kudryashov, R. V. Muratov, Pavel N. Ryabov:
Numerical Simulation of Adiabatic Shear-Band Formation in Composites. 614-620 - Nikolai A. Kudryashov, Dmitry I. Sinelshchikov:
Analytical Solutions for Nonlinear Convection-Diffusion Equations with Nonlinear Sources. 621-626 - Sergey D. Glyzin, Sergey A. Kaschenko, Anna O. Tolbey:
Two-Wave Interactions in the Fermi-Pasta-Ulam Model. 627-633 - Evgeniy A. Timofeev:
Polylogarithms and the Asymptotic Formula for the Moments of Lebesgue's Singular Function. 634-638 - A. A. Kashchenko:
Dynamics of a System of Two Simplest Oscillators with Compactly Supported Nonlinear Feedbacks. 639-644 - Pavel N. Nesterov:
Asymptotics for Solutions of Harmonic Oscillator with Integral Perturbation. 645-657 - Sergey D. Glyzin, Andrei Yu. Kolesov, E. A. Marushkina:
Relaxation Oscillations in a System of Two Pulsed Synaptically Coupled Neurons. 658-665 - Vladimir A. Bashkin:
On the Spatial Boundedness of Cellular RDA-nets. 666-677 - Yuriy A. Belov, S. I. Vovchok:
Generation of a Social Network Graph by Using Apache Spark. 678-681 - Vladimir A. Bondarenko, Andrei V. Nikolaev, Dzhambolet Shovgenov:
1-Skeletons of the Spanning Tree Problems with Additional Constraints. 682-688 - Vladimir A. Zakharov, S. R. Jaylauova:
On the Minimization Problem for Sequential Programs. 689-700 - M. S. Komar:
Data Rate Assessment on L2-L3 CPU Bus and Bus between CPU and RAM in Modern CPUs. 701-708 - Alexey A. Mitsyuk, Irina A. Lomazova, Wil M. P. van der Aalst:
Using Event Logs for Local Correction of Process Models. 709-723 - Aleksandr S. Tvardovskii, Khaled El-Fakih, Maxim Gromov, Nina Yevtushenko:
Testing Timed Nondeterministic Finite State Machines with the Guaranteed Fault Coverage. 724-730 - Evgeniy A. Timofeev:
Asymptotic Formula for the Moments of the Takagi Function. 731-735 - Sergey D. Glyzin:
Mathematical Model of Nicholson's Experiment. 736-752 - A. A. Kashchenko:
A Family of Non-Rough Cycles in a System of Two Coupled Delayed Generators. 753-756 - Mikhail V. Nevskii, Alexei Yu. Ukhalov:
On Numerical Characteristics of a Simplex and Their Estimates. 757-769 - Mikhail V. Nevskii, Alexei Yu. Ukhalov:
New Estimates of Numerical Values Related to a Simplex. 770-782 - M. M. Preobrazhenskaia:
Relaxation Cycles in a Model of Synaptically Interacting Oscillators. 783-797
Volume 51, Number 8, December 2017
- Alexander A. Grusho, Nikolai A. Grusho, Elena E. Timonina:
Information security architecture synthesis in distributed information computation systems. 799-804 - Dmitry P. Zegzhda, Evgeny Pavlenko:
Cyber-physical system homeostatic security management. 805-816 - Daria S. Lavrova, Yu. S. Vasil'ev:
An ontological model of the domain of applications for the Internet of Things in analyzing information security. 817-823 - V. G. Anisimov, E. G. Anisimov, Peter D. Zegzhda, T. N. Saurenko, S. P. Prisyazhnyuk:
Indices of the effectiveness of information protection in an information interaction system for controlling complex distributed organizational objects. 824-828 - E. Yu. Pavlenko, A. V. Yarmak, Dmitry A. Moskvin:
Hierarchical approach to analyzing security breaches in information systems. 829-834 - Dmitry P. Zegzhda, Maria A. Poltavtseva, Daria S. Lavrova:
Systematization and security assessment of cyber-physical systems. 835-843 - A. Yu. Chernov, Artem S. Konoplev, D. V. Reshetov:
The task of building a trusted computing environment on the Intel hardware platform. 844-847 - Dmitry P. Zegzhda, E. S. Usov, V. A. Nikol'skii, Evgeny Pavlenko:
Use of Intel SGX to ensure the confidentiality of data of cloud users. 848-854 - Denis V. Ivanov, Dmitry A. Moskvin, V. A. Myasnikov, A. F. Suprun:
Applying NFC for automated replication of user data. 855-859 - Anton Zaytsev, Anatoly Malyuk:
Identifying a potential insider using classification models. 860-866 - E. Yu. Pavlenko, A. V. Yarmak, Dmitry A. Moskvin:
Application of clustering methods for analyzing the security of Android applications. 867-873 - Peter D. Zegzhda, E. V. Malyshev, Evgeny Pavlenko:
The use of an artificial neural network to detect automatically managed accounts in social networks. 874-880 - Lev V. Utkin, Vladimir S. Zaborovsky, Sergey G. Popov:
Siamese neural network for intelligent information security control in multi-robot systems. 881-887 - Dmitry O. Zhukov, D. A. Akimov, O. K. Red'kin, V. P. Los':
Application of convolutional neural networks for preventing information leakage in open internet resources. 888-893 - V. V. Platonov, P. O. Semenov:
An adaptive model of a distributed intrusion detection system. 894-898 - Maxim O. Kalinin, Alexander Minin:
Security evaluation of a wireless ad-hoc network with dynamic topology. 899-901 - Denis V. Ivanov, Dmitry A. Moskvin, T. D. Ovasapyan:
Approaches to detecting active network nodes in IPv6 address space. 902-906 - Maxim O. Kalinin, Vasiliy M. Krundyshev, P. V. Semianov:
Architectures for building secure vehicular networks based on SDN technology. 907-914 - I. V. Alekseev, V. V. Platonov:
Detection of encrypted executable files based on entropy analysis to determine the randomness measure of byte sequences. 915-920 - I. A. Sikarev, S. F. Shakhnov:
Data protection in radio channels of local differential satellite navigation subsystems. 921-927 - Elena B. Aleksandrova, Anna A. Shtyrkina, A. V. Yarmak:
Elliptic curves generation for isogeny-based cryptosystems. 928-935 - N. N. Shenets:
Authentication in dynamic peer-to-peer networks based on homomorphic secret sharing. 936-946 - Elena B. Aleksandrova:
Methods of group authentication for low-resource vehicle and flying self-organizing networks. 947-958 - A. P. Baranov, P. A. Baranov:
Models of the formation of CRC values and monitoring sums under the conditions of multiple distortions. 959-964 - Dmitriy Samoylenko, Mikhail A. Eremeev, Oleg Finko:
A method of providing the integrity of information in the group of robotic engineering complexes based on crypt-code constructions. 965-971 - N. N. Shenets, E. E. Trukhina:
X-PACE: Modified Password Authenticated Connection Establishment protocol. 972-977 - Dmitry P. Zegzhda, Dmitry A. Moskvin, Andrei D. Dakhnovich:
Protection of Wi-Fi network users against rogue access points. 978-984 - Maria A. Poltavtseva, Alexander I. Pechenkin:
Intelligent data analysis in decision support systems for penetration tests. 985-991 - Mikhail E. Sukhoparov, N. A. Bazhaev, Irina E. Krivtsova, Ilya S. Lebedev:
Modeling of information influence on remote wireless network devices. 992-999 - V. A. Yakovlev, V. V. Arkhipov, Sergey E. Adadurov:
Analysis of the constructing principles and methodology for evaluating the security of shoulder-surfing resistant graphic passwords. 1000-1010
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.