default search action
Automatic Control and Computer Sciences, Volume 50
Volume 50, Number 1, January 2016
- K. Anusha, E. Sathiyamoorthy:
Comparative study for feature selection algorithms in intrusion detection system. 1-9 - Iman N. Askerzade:
Influence of Bloch inductance on the time resolution of balanced comparators based on small Josephson junctions. 10-14 - Zenoviy A. Kolodiy, Bohdan A. Mandziy:
Calculation of flicker noise power. 15-19 - K. Krumin'sh, V. Peterson, V. Plotsin'sh:
Influence of thermal hysteresis on distortions of zero line at various comparator type equivalent time signal conversion methods. 20-27 - Pavel A. Kucherenko, Sergey V. Sokolov:
Solution of the problem of identifying structures of discrete stochastic objects based on the minimum posterior error criterion of distribution densities. 28-36 - Nikolay Kulikov:
Analysis of quality-of-service metrics in IMS networks. 37-45 - V. S. Mikhailenko, M. S. Solodovnik:
Analysis of the adaptive neural network router. 46-53 - Abebe Tesfahun, Dhavala Lalitha Bhaskari:
A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructures. 54-62 - Knyaz Sh. Mamedov, K. K. Mamedov, S. K. Yolchuyeva:
Erratum to: "Solving the Mixed-Integer Knapsack Problem by Decrease of Dimension and Use of Dynamic Programming". 63
Volume 50, Number 2, March 2016
- Oleksii K. Tyshchenko:
A reservoir radial-basis function neural network in prediction tasks. 65-71 - Dmitriy V. Speranskiy:
Synchronization of fuzzy linear automata. 72-79 - Yuyan Cao, Ting Li, Jian Wang, Rong Xie, Xinmin Wang:
Fuzzy dynamic fault tree analysis for electro-mechanical actuator based on algebraic model with common-cause failures. 80-90 - Jianchao Zhang, Zhihong Yu:
Overview of 3D printing technologies for reverse engineering product design. 91-97 - Ye Zhang:
Research on the security mechanism of cloud computing service model. 98-106 - Vladimir V. Sergeichik, Alexander A. Ivaniuk:
Digital watermark and fingerprint in variable rank linear-feedback shift register. 107-115 - Xiaojun Liu, Guangming Zhang, Lei Mei, Deming Wang:
Backstepping control with speed estimation of PMSM based on MRAS. 116-123
Volume 50, Number 3, May 2016
- Alexander M. Andronov, Vladimir M. Vishnevsky:
Markov-modulated continuous time finite Markov chain as the model of hybrid wireless communication channels operation. 125-132 - Gazanfar A. Rustamov:
Robust control design for uncertain objects with time delay on the state. 133-140 - Yunchang Liu, Chunlin Li, Layuan Li:
Distributed two-level cloud-based multimedia task scheduling. 141-150 - R. M. Swarna Priya, Sevugan Prabu, V. S. Dharun:
F-SIFT and FUZZY-RVM based efficient multi-temporal image segmentation approach for remote sensing applications. 151-164 - P. Senthil Kumari, A. R. Nadira Banu Kamal:
Key Derivation Policy for data security and data integrity in cloud computing. 165-178 - Meizhi Zhang:
Application of computer image processing in office automation system. 179-186 - S. Senthilkumar, C. Geetha Priya:
A review of channel estimation and security techniques for CRNS. 187-210
Volume 50, Number 4, July 2016
- V. V. Khutortsev:
Local optimization of trajectory control of observations for mobile digital direction-finder in the location of discrete sources of radiation system. 211-219 - Vladimir Aristov:
Optimization of the transmitter pulse duration by the criterion of the radiation spectrum maximization at a given frequency. 220-225 - Xingtao Zhu, Yulin Liu, Xiaoke Zhang:
Exploiting cyclostationary difference in anti-jamming method based on single channel source separation. 226-232 - Biyuan Yao, Jianhua Yin, Hui Li, Wei Wu:
Wireless channel extraction analyzing based on graph theory. 233-243 - Mingwei Wang, Huisheng Zhang, Lixin Li, Lifeng He, Zhan Yao:
Performance of multiple access CSK communication system with DF cooperative strategy. 244-252 - Chun Shan, Zequn Yu, Changzhen Hu, Jingfeng Xue, Luxia Wu:
Optimization of program recursive function calls analysis method. 253-259 - Zhi-yong Yu, Jindong Wang, Hengwei Zhang, Kan Niu:
Services recommended trust algorithm based on cloud model attributes weighted clustering. 260-270 - Weijiang Li, Yanming Feng, Dongjun Li, Zhengtao Yu:
Micro-blog topic detection method based on BTM topic model and K-means clustering algorithm. 271-277 - Bing-jin Liang, Yue-yin Zhang, Yan-Jun Lin:
Study on the technology of medical image reading based on JPEG2000. 278-284 - Wei Wu, Wencai Du, Jiezhuo Zhong:
Using Radial Basis Function Neural Networks to identify river water data parameters. 285-292
Volume 50, Number 5, September 2016
- Tushar M. Patel, Nilesh M. Bhatt:
Development of FEA-ANN hybrid model for Equivalent Stress prediction of automobile structural member. 293-305 - Yassine Bouteraa, Ismail Ben Abdallah:
Distributed control and speed sensorless for the synchronisation of multi-robot systems. 306-317 - Zhi Liu:
Face recognition system based on block Gabor feature collaborative representation. 318-323 - Kangming Liu:
Optimization algorithm of cognitive radio spectrum sensing based on quantum neural network. 324-331 - F. Haouari, N. Bali, Mohamed Tadjine, Mohamed Seghir Boucherit:
A CDM-backstepping control with nonlinear observer for electrically driven robot manipulator. 332-346 - Hujun Li, Xiaozhi Liu, Yi Wan:
Autonomous network-based integration architecture for multi-agent systems under dynamic and heterogeneous environment. 347-360 - Yu Tai, Wei Hu, Huixiang Zhang, Dejun Mu, Xing-Li Huang:
Generating optimized gate level information flow tracking logic for enforcing multilevel security. 361-368 - Yun-Ru Chen, Jianyi Guo, Yantuan Xian, Zhengtao Yu, Wei Chen, Qiyue Yang:
A hybrid method for entity hyponymy acquisition in Chinese complex sentences. 369-377 - Xiaohong Huang, Guoqing Sun, Kaiyue Zhang:
Research on the location of acoustic emission source of rock breaking point by using phase difference method and Geiger algorithm. 378-384
Volume 50, Number 6, November 2016
- A. S. Rybakov:
The use of asynchronous sigma-delta modulation in analog-signal sampling based on event-timing techniques. 385-396 - Aleksey I. Peschansky, A. I. Kovalenko:
On a strategy for the maintenance of an unreliable channel of a one-server loss queue. 397-407 - A. F. Chipiga, V. P. Pashintsev, V. A. Tsymbal, S. N. Shimanov:
Procedure for calculating the dependence of the energy concealment factor on carrier frequency selection for low-frequency satellite communications system. 408-414 - S. V. Korsakov, Alexander V. Smirnov, Valery A. Sokolov:
Principles of organizing the interoperability of equipollent nodes in a wireless mesh-network with time division multiple access. 415-422 - Nicholas A. Nechval, Konstantin N. Nechval, S. P. Prisyazhnyuk, Vladimir F. Strelchonok:
Tolerance limits on order statistics in future samples coming from the Pareto distribution. 423-431 - Zhiwen Wang, Yuhang Wang, Lianyuan Jiang, Canlong Zhang, Pengtao Wang:
An image segmentation method using automatic threshold based on improved genetic selecting algorithm. 432-440 - Jafar Taheri-Kalani, NadAli Zarei:
An adaptive technique for trajectory tracking control of a wheeled mobile robots without velocity measurements. 441-452
Volume 50, Number 7, December 2016
- A. A. Korotkin, A. A. Maksimov:
Cellular-local algorithm for localizing and estimating of changes in binary images. 453-459 - Alexey A. Mitsyuk, Ivan S. Shugurov:
On process model synthesis based on event logs with noise. 460-470 - M. A. Farkov, Alexander Ivanovich Legalov:
Application of numerical optimization methods to molecular docking on graphics processing units. 471-476 - Sergey A. Shershakov:
DPMine graphical language for automation of experiments in process mining. 477-485 - Pavel D. Drobintsev, Vsevolod Kotlyarov, I. V. Nikiforov, Alexander A. Letichevsky:
Incremental approach to the technology of test design for industrial projects. 486-492 - Alexander G. Marchuk:
PolarDB: An infrastructure for specialized NoSQL datebases and DBMS. 493-496 - L. S. Kazarin, S. S. Poiseeva:
On finite groups with large degrees of irreducible character. 497-509 - E. V. Kuzmin, D. A. Ryabukhin, Valery A. Sokolov:
On the expressiveness of the approach to constructing PLC-programs by LTL-specification. 510-519 - A. N. Noskov, I. A. Manov:
Development of an adaptive routing mechanism in software-defined networks. 520-526 - Alexander V. Smirnov:
The problem of finding the maximum multiple flow in the divisible network and its special cases. 527-535 - Valery A. Sokolov, S. V. Korsakov, Alexander V. Smirnov, Vladimir A. Bashkin, Evgeny S. Nikitin:
Instrumental supporting system for developing and analysis of software-defined networks of mobile objects. 536-545 - A. A. Noskov, Mikhail A. Nikitinskiy, Igor V. Alekseev:
Development of an active external network topology module for Floodlight software-defined network controller. 546-551 - Sergey A. Kaschenko:
Relaxation oscillations in models of multispecies biocenose. 552-566 - N. D. Bykova, E. V. Grigorieva:
Averaging principles applied to logistic equations with rapidly oscillating delays. 567-570 - Sergey D. Glyzin, Andrei Yu. Kolesov, Nikolai Kh. Rozov:
Nonclassical relaxation oscillations in neurodynamics. 571-585 - N. D. Bykova, Sergey A. Kaschenko:
Corporate dynamics of systems of logistic delay equations with large delay control. 586-602 - Sergey V. Aleshin, Sergey D. Glyzin, Sergey A. Kaschenko:
Dynamic properties of the Fisher-Kolmogorov-Petrovskii-Piscounov equation with the deviation of the spatial variable. 603-616 - V. O. Golubenets:
Local bifurcations analysis of a state-dependent delay differential equation. 617-624 - Sergey D. Glyzin, P. L. Shokin:
Diffusion chaos in the reaction-diffusion boundary problem in the dumbbell domain. 625-635 - Sergey A. Kaschenko:
Asymptotics of eigenvalues of the first boundary-value problem for singularly perturbed second-order differential equation with turning points. 636-656
Volume 50, Number 8, December 2016
- I. M. Azhmukhamedov, O. N. Vybornova, Yu. M. Brumshtein:
Management of information security risks in a context of uncertainty. 657-663 - Artem S. Konoplev, Maxim O. Kalinin:
Access control system for distributed computing networks. 664-668 - Artem S. Konoplev, Maxim O. Kalinin:
Tasks of providing information security in distributed computing networks. 669-672 - Daria S. Lavrova:
An approach to developing the SIEM system for the Internet of Things. 673-681 - A. S. Molyakov:
A prototype computer with non-von Neumann architecture based on strategic domestic J7 microprocessor. 682-686 - A. S. Molyakov:
Token scanning as a new scientific approach in the creation of protected systems: A new generation OS MICROTEK. 687-692 - V. V. Nikonov, V. P. Los', G. V. Ross:
Development of automated system for identifying abnormal network activity and detecting threats. 693-702 - Maria A. Poltavtseva, Daria S. Lavrova, Alexander I. Pechenkin:
Planning of aggregation and normalization of data from the Internet of Things for processing on a multiprocessor cluster. 703-711 - Mikhail E. Sukhoparov, Ilya S. Lebedev, Viktoria M. Korzhuk, Irina E. Krivtsova:
Information security of data channels based on a multifunctional tailored software and hardware solution. 712-716 - V. G. Anisimov, Peter D. Zegzhda, E. G. Anisimov, D. A. Bazhin:
A risk-oriented approach to the control arrangement of security protection subsystems of information systems. 717-721 - Alexander A. Grusho, Nikolai A. Grusho, Michael I. Zabezhailo, Elena E. Timonina:
Intelligent data analysis in information security. 722-725 - Lev V. Utkin, V. S. Zaborovskii, Sergey G. Popov:
Detection of anomalous behavior in a robot system based on deep learning elements. 726-733 - Peter D. Zegzhda, Maxim O. Kalinin:
Technology of security services virtualization for high-speed computer networks. 734-738 - Elena B. Aleksandrova, Dmitry P. Zegzhda, Artem S. Konoplev:
Applying the group signature for entity authentication in distributed grid computing networks. 739-742 - Alexey G. Busygin, Artem S. Konoplev, Maxim O. Kalinin:
Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates. 743-748 - Alexander V. Babash:
Attainable upper estimate of the degree of distinguishability of a connected permutation automaton. 749-758 - A. P. Baranov, P. A. Baranov:
Asymptotic assessments of CRC error probabilities in some telecommunication protocols. 759-764 - A. P. Baranov, P. A. Baranov:
Assessment of CRC error probability at minor distortion of information. 765-772 - Sergey Victorovich Belim, Svetlana Yuryevna Belim:
KDP scheme of preliminary key distribution in discretionary security policy. 773-776 - Sergey Victorovich Belim, Nadezda F. Bogachenko:
Distribution of cryptographic keys in systems with a hierarchy of objects. 777-786 - K. S. Sumkin, V. P. Los', G. V. Ross:
User identification and authentication system based on a hybrid fuzzy approach. 787-791 - Mikhail E. Sukhoparov, Ilya S. Lebedev:
Implementation of symmetric encryption by State Standard 28147-89 algorithm on a graphical processor. 792-795 - Elena B. Aleksandrova, E. N. Shkorkina:
Tripartite outsoursing key-agreement protocol on bilinear pairings. 796-801 - Alexey Nikolaevich Shniperov, K. A. Nikitina:
A text steganography method based on Markov chains. 802-808 - Dmitry P. Zegzhda, Tatiana V. Stepanova, A. F. Suprun:
Multiagent system controllability evaluation using the multilevel structure of the graph of agents. 809-812 - Dmitry P. Zegzhda:
Sustainability as a criterion for information security in cyber-physical systems. 813-819
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.