default search action
Automatic Control and Computer Sciences, Volume 53
Volume 53, Number 1, January 2019
- Dmitry V. Efanov, Valery V. Sapozhnikov, Vladimir V. Sapozhnikov:
Using Codes with Summation of Weighted Bits to Organize Checking of Combinational Logical Devices. 1-11 - Qinli Zhang, Yu Chen:
An Improved Generalized Fuzzy Model Based on Epanechnikov Quadratic Kernel and Its Application to Nonlinear System Identification. 12-21 - Dmitriy V. Speranskiy:
About the Stability of Fuzzy Linear Automata. 22-27 - Madara Gasparovica-Asite, Ludmila Aleksejeva:
Classification Methodology for Bioinformatics Data Analysis. 28-38 - Alexander V. Babash, Valery A. Sizov, Andrey A. Mikrukov:
Security Evaluation of a Brute-force Attack on a Cipher Using a Statistical Criterion for Plaintext. 39-44 - Rasim M. Alguliyev, Yadigar N. Imamverdiyev, Fargana J. Abdullayeva:
PSO-based Load Balancing Method in Cloud Computing. 45-55 - Wei Yanli, Qian Chaoyang, Li Jun:
Modular Design of Mobile APP Interface Based on the Visual Flow. 56-62 - Dmitry Namiot, Manfred Sneps-Sneppe:
On Bikes in Smart Cities. 63-71 - Diqun Yan, Li Xiang, Zhifeng Wang, Rangding Wang:
Detection of HMM Synthesized Speech by Wavelet Logarithmic Spectrum. 72-79 - Qingquan Liu, Zheyuan Bi, Rui Ding, Fang Jin:
A Lower Bound on Data Rates for Observability and Stabilizability of Linear Systems. 80-89 - Aldis Baums:
Mobile Robot Performance at Restricted Energy and Autonomy. 90-95
Volume 53, Number 2, March 2019
- Vladimir N. Shashihin:
Synthesis of Control for Nonlinear Systems. 97-106 - A. S. Rybakov:
Sampling and Estimating the Waveform of Analog Signals Based on Precision Event Timing. 107-115 - Mohammad Babaie, Zahra Rahmani Cherati, Behrooz Rezaie:
Designing a Switching Controller Based on Control Performance Assessment Index and a Fuzzy Supervisor for Perturbed Discrete-Time Systems Subject to Uncertainty. 116-126 - Jaydeep Swarnakar, Prasanta Sarkar, Lairenlakpam Joyprakash Singh:
Direct Discretization Method for Realizing a Class of Fractional Order System in Delta Domain - a Unified Approach. 127-139 - Yun Zhang:
Study on the Attacking Intelligent Decision-Making Technology Based on the Game Theory. 140-147 - Masuma H. Mammadova, Zarifa Jabrayilova:
Methods Managing for Matching of Supply and Demand on the IT Specialists. 148-158 - Gundala Swathi:
Refining the Renowned Route Performance on Location Information About Mobile Adhoc Network. 159-168 - Liyi Zhang, Yang Gao, Yunshan Sun, Teng Fei, Yujing Wang:
Application on Cold Chain Logistics Routing Optimization Based on Improved Genetic Algorithm. 169-180 - Alexander N. Sychev:
Application of Walsh Spectral Representations in Soft Computing. 181-185 - Yang Li, Ding Kai, Ji Maorong, Qiang Liu, Liu Xiaofeng:
Research and Experiment on UWB Path Loss Characteristics in Outdoor Near-Ground Environments. 186-193 - Yu Wang, Xiaomeng Chen, Huan Jiang, Qian Cao, Xiuxin Chen:
Applying Space-Variant Point Spread Function to Three-Dimensional Reconstruction of Fluorescence Microscopic Images. 194-201
Volume 53, Number 3, May 2019
- Nacereddine Djelal, Nadia Saadia, Amar Ramdane-Cherif:
Adaptive Force-Vision Control of Robot Manipulator Using Sliding Mode and Fuzzy Logic. 203-213 - Adil Khan, Feng Jiang, Shaohui Liu, Ibrahim Omara:
Playing a FPS Doom Video Game with Deep Visual Reinforcement Learning. 214-222 - Nicholas A. Nechval, Gundars Berzins, Konstantin N. Nechval, Juris Krasts:
A New Technique of Intelligent Constructing Unbiased Prediction Limits on Future Order Statistics Coming from an Inverse Gaussian Distribution under Parametric Uncertainty. 223-235 - Xiaojing Li, Dongman Yu:
Study on an Optimal Path Planning for a Robot Based on an Improved ANT Colony Algorithm. 236-243 - Zhihuang Jiang:
Traffic Operation Data Analysis and Information Processing Based on Data Mining. 244-252 - A. I. Povoroznyuk, Anna E. Filatova, Alexander Yurievich Zakovorotniy, Kh. Shehna:
Development of Method of Matched Morphological Filtering of Biomedical Signals and Images. 253-262 - Zhi Liu, Mengmeng Zhang, Shipeng Dou, Changzhi An:
An Improved Intra Block Copy Algorithm Based on Character Segmentation. 263-269 - Karel Dudácek, Karel Dudácek:
Trellis-Based Postprocessing for Short Delay Measurement Using NDFT. 270-280 - Jingyu Zhang, Jianfu Teng, Yu Bai:
Improving Sparse Compressed Sensing Medical CT Image Reconstruction. 281-289
Volume 53, Number 4, July 2019
- Vladimir Aristov:
Influence of Nonlinearity of Fast Sawtooth Voltage on Stroboscopic Transformation of Signals in Receivers of Sensors Locators. 291-297 - Sergei Osadchy, Valeriy A. Zozulya, Anatoliy P. Ladanyuk, Larisa G. Vikhrova, Viktor M. Kalich:
Optimal Robust Control of a Robots Group. 298-309 - Nanditha Nair, K. V. Santhosh:
Sensor Fault Isolation in a Liquid Flow Process Using Kalman Filter. 310-319 - Narek Abroyan:
Using Hybrid Discriminative-Generative Models for Binary Classification. 320-327 - R. Pradeep, Mittapalle Kiran Reddy, K. Sreenivasa Rao:
LSTM-Based Robust Voicing Decision Applied to DNN-Based Speech Synthesis. 328-332 - Muhammad Taseer Suleman, Shahid Mahmood Awan:
Optimization of URL-Based Phishing Websites Detection through Genetic Algorithms. 333-341 - Shumin Xue, Chengjuan Ren:
Security Protection of System Sharing Data with Improved CP-ABE Encryption Algorithm under Cloud Computing Environment. 342-350 - Adriana Lipovac, Edvin Skaljo, Vlatko Lipovac, Pamela Njemcevic:
Practical Prediction of CFO-Made OFDM Symbol Distortion. 351-363 - Gian Luigi Gragnani, Daniele D. Caviglia, Claudio Montecucco:
Design of Printed log-Periodic Antennas for Long Range Communication within a Wireless Sensor Network for Sea Water Quality Monitoring. 364-375 - P. Efstratiou, Ioannis D. Moscholios:
User Mobility in a 5G Cell with Quasi-Random Traffic under the Complete Sharing and Bandwidth Reservation Policies. 376-386
Volume 53, Number 5, September 2019
- Daria S. Lavrova, Elizaveta Zaitseva, Dmitry P. Zegzhda:
Approach to Presenting Network Infrastructure of Cyberphysical Systems to Minimize the Cyberattack Neutralization Time. 387-392 - Helmi Abrougui, Habib Dallagi, Samir Nejim:
Autopilot Design for an Autonomous Sailboat Based on Sliding Mode Control. 393-407 - Alireza Rezaee, S. M. Mehdi Hoseini:
Parameter Identification of Induction Motor by Using Cooperative-Coevolution and a Nonlinear Estimator. 408-418 - Naveen Bindra, Manu Sood:
Detecting DDoS Attacks Using Machine Learning Techniques and Contemporary Intrusion Detection Dataset. 419-428 - Yanjiao Wang, Ye Chen:
Coverage-All Targets Algorithm for 3D Wireless Multimedia Sensor Networks Based on the Gravitational Search Algorithm. 429-440 - Abdulraqeb Alhammadi, Mardeni Roslee, Mohammad Yusoff Alias, Ibraheem Shayea, Saddam Alraih:
Self-optimization of Handover Control Parameters for Mobility Management in 4G/5G Heterogeneous Networks. 441-451 - Li Wang, Zhi Lan, Qiang Wang, Rong Yang, Hongliang Li:
ELM_Kernel and Wavelet Packet Decomposition Based EEG Classification Algorithm. 452-460 - Abdelhak Bouhali, Daoud Berkani:
MAD-based Estimation of the Noise Level in the Contourlet Domain. 461-470 - Zhi Liu, Mengmeng Zhang, Delun Lai, Changzhi An:
A Novel Fast Partition Algorithm Based on EDGE Information in HEVC. 471-479 - Nikolajs Bogdanov, Arnis Ancans, K. Martinsons, Ernests Petersons:
Erratum to: Estimating the Speed of an Integrated Wireless Network for Transportation Applications. 480
Volume 53, Number 6, November 2019
- Dmitry V. Efanov, Valery V. Sapozhnikov, Vladimir V. Sapozhnikov, Dmitrii V. Pivovarov:
Synthesis of Built-in Self-Test Control Circuits Based on the Method of Boolean Complement to Constant-Weight 1-out-of-n Codes. 481-491 - Soumia Bouzid, Messaoud Ramdani, Salah Chenikher:
Quality Fuzzy Predictive Control of Water in Drinking Water Systems. 492-501 - Victor Vladimirovich Deryabin:
Neural Networks Based Prediction Model for Vessel Track Control. 502-510 - Ameni Jouila, Najib Essounbouli, K. Nouri, Abdelaziz Hamzaoui:
Robust Nonsingular Fast Terminal Sliding Mode Control in Trajectory Tracking for a Rigid Robotic Arm. 511-521 - Yingying Feng, Shasha Zhao, Hui Liu:
Target Tracking Based on Multi Feature Selection Fusion Compensation in Monitoring Video. 522-531 - Nicholas A. Nechval, Gundars Berzins, Konstantin N. Nechval:
Intelligent Constructing Exact Statistical Prediction and Tolerance Limits on Future Random Quantities for Prognostics and Health Management of Complex Systems. 532-549 - Huixian Yang, Weifa Gan, Fan Chen, Jinfang Zeng:
Cropped and Extended Patch Collaborative Representation Face Recognition for a Single Sample Per Person. 550-559 - Chuan Lin, Hao-Jun Zhao, Yijun Cao:
Improved Color Opponent Contour Detection Model Based on Dark and Light Adaptation. 560-571 - Liyi Zhang, Yang Gao, Yunshan Sun, Teng Fei, Yujing Wang:
Erratum to: Application on Cold Chain Logistics Routing Optimization Based on Improved Genetic Algorithm. 572
Volume 53, Number 7, December 2019
- M. M. Abbas, Vladimir A. Zakharov:
Even Simple π-Calculus Processes Are Difficult to Analyze. 573-583 - Natalya Olegovna Garanina, Igor S. Anureev, Olesya Borovikova:
Verification-Oriented Process Ontology. 584-594 - Nikolay V. Shilov, Dmitry A. Kondratyev, Igor S. Anureev, Evgeny V. Bodin, Alexey V. Promsky:
Platform-Independent Specification and Verification of the Standard Mathematical Square Root Function. 595-616 - A. A. Kalenkova, D. A. Kolesnikov:
Application of a Genetic Algorithm for Finding Edit Distances between Process Models. 617-627 - E. V. Kuzmin, Oleg E. Gorbunov, Petr O. Plotnikov, Vadim A. Tyukin, Vladimir A. Bashkin:
Application of Neural Networks for Recognizing Rail Structural Elements in Magnetic and Eddy Current Defectograms. 628-637 - Maria Karyaeva, Pavel Braslavski, Valery Sokolov:
Word Embedding for Semantically Related Words: An Experimental Study. 638-643 - Mikhail V. Nevskii:
On Some Problems for a Simplex and a Ball in ℝn. 644-652 - Dmitry A. Kondratyev, Ilya V. Maryasov, Valery A. Nepomniaschy:
The Automation of C Program Verification by the Symbolic Method of Loop Invariant Elimination. 653-662 - Anton R. Gnatenko, Vladimir A. Zakharov:
On the Expressive Power of Some Extensions of Linear Temporal Logic. 663-675 - J. L. Vega Vice, Yuri V. Mikhailov:
On Methods of the Verification and Elaboration of Development Programs for Agricultural Territories. 676-682 - Sergey M. Dudakov:
On Safety of Unary and Nonunary IFP Operators. 683-688 - Alexandra Igorevna Kononova:
Dynamic Model of Information Exchange Processes in a Peer-to-Peer Network. 689-698 - D. R. Filonov, D. Ju. Chalyy, Dmitriy Mikhailovich Murin, Valery G. Durnev, Valery A. Sokolov:
A Question-Answering System for Applicant Support Using Modern Messaging Apps. 699-704 - Nadezhda S. Lagutina, Ksenia V. Lagutina, A. S. Adrianov, Ilya V. Paramonov:
Russian-Language Thesauri: Automatic Construction and Application for Natural Language Processing Tasks. 705-718 - Yu. V. Kosolapov, A. N. Shigaev:
On the Support Splitting Algorithm for Induced Codes. 719-729 - L. I. Rodina, I. I. Tyuteev:
Estimating the Average Temporal Benefit in Probabilistic Environmental-Economic Models. 730-737 - A. N. Kirillov, I. V. Danilova:
Dynamics of Population Distribution by Patches. 738-744 - K. V. Vedenev, Vladimir M. Deundyak:
Codes in a Dihedral Group Algebra. 745-754 - Pavel N. Nesterov:
Asymptotic Integration of Certain Differential Equations in Banach Space. 755-768 - S. M. Terekhov, V. A. Nemtinov, K. S. Kornilov:
A Mathematical Model for Optimal Number of Heat Consumers Connection to the Heat Supply System. 769-778 - S. E. Vaganov, S. I. Khashin:
Comparison of Doubling the Size of Image Algorithms. 779-786 - O. Yu. Maryasin, A. S. Kolodkina, A. A. Ogarkov:
Computer Simulation of a Smart Building. 787-793 - Yu. N. Artamonov:
Building a Data Store with the Dynamic Structure. 794-810 - Andrey Velichko, Valeriya V. Gribova, Leonid A. Fedorishchev:
Cloud Service for Interactive Simulation of Interregional Trade Flows. 811-820 - V. N. Boykov, M. S. Karyaeva:
Poetology: Problems of Constructing a Thesaurus and Verse Text Specification. 821-823 - D. A. Makarov:
Synthesis of Control and State Observer for Weakly Nonlinear Systems Based on the Pseudo-Linearization Technique. 824-829 - Nadezhda S. Lagutina, Ksenia V. Lagutina, Ivan Shchitov, Ilya V. Paramonov:
Analysis of Influence of Different Relations Types on the Quality of Thesaurus Application to Text Classification Problems. 830-838 - A. M. Tsirlin, Al. A. Akhremenkov:
Probabilistic Analysis of Tournament Organization Systems. 839-850 - V. A. Alexandrov, V. A. Desnitsky, D. Y. Chaly:
Design and Security Analysis of a Fragment of Internet of Things Telecommunication System. 851-856
Volume 53, Number 8, December 2019
- N. N. Shenets:
Security Infrastructure of FANET Based on Secret Sharing and Authenticated Encryption. 857-864 - I. D. Pankov, Artem S. Konoplev, A. Yu. Chernov:
Analysis of the Security of UEFI BIOS Embedded Software in Modern Intel-Based Computers. 865-869 - V. A. Lokhvitskii, Anatoly D. Khomonenko, M. A. Bol'shakov:
On the Construction of a Cybervisor for the Intelligent Monitoring and Control of Data Centers. 870-873 - A. P. Baranov, P. A. Baranov:
Estimating the Probability of a Checksum Error in a Message. 874-878 - Elena B. Aleksandrova, A. V. Yarmak, Maxim O. Kalinin:
Analysis of Approaches to Group Authentication in Large-Scale Industrial Systems. 879-882 - Sh. G. Magomedov, V. P. Los':
Forming the Composition of Functions and Instructions of Microprocessor Devices for Access Control Systems. 883-888 - E. V. Malyshev, Dmitry A. Moskvin, Dmitry P. Zegzhda:
Application of an Artificial Neural Network for Detection of Attacks in VANETs. 889-894 - Maria A. Poltavtseva, Maxim O. Kalinin:
Modeling Big Data Management Systems in Information Security. 895-902 - Maria A. Poltavtseva, Dmitry P. Zegzhda, Maxim O. Kalinin:
Big Data Management System Security Threat Model. 903-913 - Maria A. Poltavtseva:
A Consistent Approach to Building Secure Big Data Processing and Storage Systems. 914-921 - Nikolai A. Grusho:
Method of Integration of Multiagent Information Search Using Security Analysis and Information Services in Digital Infrastructures. 922-931 - I. A. Sikarev, A. V. Garanin:
General Principles of Constructing a Motion Control System for a Remotely Operated Sea Vessel in the Port Area Based on the NMEA-2000 Network Protocol. 932-936 - Elizaveta Zaitseva, Dmitry P. Zegzhda, Maria A. Poltavtseva:
Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems. 937-947 - Andrei D. Dakhnovich, Dmitry A. Moskvin, Dmitry P. Zegzhda:
An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things. 948-953 - Elena B. Aleksandrova, Daria S. Lavrova, A. V. Yarmak:
Benford's Law in the Detection of DoS Attacks on Industrial Systems. 954-962 - Denis V. Ivanov, Dmitry A. Moskvin, G. S. Kubrin:
Detection of Security Threats to Modern Websites. 963-968 - Elena B. Aleksandrova, E. N. Shkorkina, Maxim O. Kalinin:
Organization of the Quantum Cryptographic Keys Distribution System for Transportation Infrastructure Users. 969-971 - Dmitry P. Zegzhda, Maxim O. Kalinin, M. V. Levykin:
Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series. 972-979 - Grigory B. Marshalko, L. O. Nikiforova:
Spoofing Attack on Eigenfaces-Based Biometric Identification System. 980-986 - I. V. Luskatov, S. V. Pilkevich:
Model for Identifying Cyber Threats to Internet Information Resources. 987-994 - Wang Lyanpen, O. G. Petrosyan, Jianming Du:
Face Recognition Based on the Coefficient Tree for Three Scale Wavelet Transformation. 995-1005 - Vasiliy M. Krundyshev:
Identifying Cyberthreats in Modern Industrial Systems by Means of Deep-Learning Networks. 1006-1011 - Vasiliy M. Krundyshev:
Preparing Datasets for Training in a Neural Network System of Intrusion Detection in Industrial Systems. 1012-1016 - E. Yu. Pavlenko:
Model of Cyberattacks on Digital Production Systems. 1017-1019 - E. Yu. Pavlenko:
Detection of Information Security Breaches in a Digital Production System Based on the Component Interaction Model. 1020-1022 - Daria S. Lavrova:
Forecasting the State of Components of Smart Grids for Early Detection of Cyberattacks. 1023-1025 - Daria S. Lavrova:
Maintaining Cyber Sustainability in Industrial Systems Based on the Concept of Molecular-Genetic Control Systems. 1026-1028 - Elena Doynikova, Andrey Fedorchenko, Igor V. Kotenko:
Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions. 1029-1037 - V. G. Anisimov, Peter D. Zegzhda, E. G. Anisimov, T. N. Saurenko, V. V. Kasatkin:
Model and Method for Optimizing Computational Processes in Parallel Computing Systems. 1038-1044 - R. A. Ognev, E. V. Zhukovskii, Dmitry P. Zegzhda:
Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls. 1045-1055 - N. A. Semenov, A. A. Poltavtsev:
Cloud-Based Data Architecture Security. 1056-1064 - Daria S. Lavrova, E. A. Popova, Anna A. Shtyrkina:
Prevention of DoS Attacks by Predicting the Values of Correlation Network Traffic Parameters. 1065-1071
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.