


default search action
Automatic Control and Computer Sciences, Volume 55
Volume 55, Number 1, January 2021
- A. Belherazem, Mohamed Chenafa:

Passivity Based Adaptive Control of a Single-Link Flexible Manipulator. 1-14 - Mohamed Sayah, Djillali Guebli, Noureddine Zerhouni, Zeina Al Masry

:
Deep LSTM Enhancement for RUL Prediction Using Gaussian Mixture Models. 15-25 - Xin Zhang, Jing Zhang, Wenru Lu, Wenbo Xu:

Research on Fractional Sliding Mode Synchronous Control of Robotic ARMS under Uncertain Disturbance. 26-37 - Arman Mohammadi, Amin Ramezani:

An Analytical Robust Sensor Fault Detection and Fault Tolerant Control in Quadrotor. 38-52 - Na Guo, Caihong Li, Di Wang, Yong Song, Guoming Liu, Tengteng Gao:

Local Path Planning of Mobile Robot Based on Long Short-Term Memory Neural Network. 53-65 - Nicholas A. Nechval, Gundars Berzins, Konstantin N. Nechval, Zhanna Tsaurkubule:

A Novel Unified Computational Approach to Constructing Shortest-Length or Equal Tails Confidence Intervals in Terms of Pivotal Quantities and Quantile Functions. 66-84 - Sergei Parshutin

, Arnis Kirshners
, Yuri Kornijenko, Vitaly M. Zabiniako, Madara Gasparovica-Asite, Aivars Rozkalns:
Classification with LSTM Networks in User Behaviour Analytics with Unbalanced Environment. 85-91 - Seyed Mohammad Sadegh Hosseinimoghadam, Masoud Dashtdar, M. Esa Nezhad Bushehri, Majid Dashtdar:

Size Optimization of Distributed Generation Resources in Microgrids with Considering Uncertainty Units Based on Scenario Tree. 92-101 - Chunming Wu, Ying Zhang:

MTCNN and FACENET Based Access Control System for Face Detection and Recognition. 102-112
Volume 55, Number 2, March 2021
- Dmitry V. Efanov, Valery V. Sapozhnikov, Vladimir V. Sapozhnikov:

Organization of Testing of Combinational Devices Based on Boolean Complement to Constant-Weight "1-out-of-4" Code with Signal Compression. 113-124 - Mehmet Bozuyla

, Abdullah T. Tola:
Designing a Novel Transportation System Using Microscopic Models and Multi-Agent Approach. 125-136 - Prabhat Kumar

, Govind P. Gupta, Rakesh Tripathi:
Design of Anomaly-Based Intrusion Detection System Using Fog Computing for IoT Network. 137-147 - Fang Jin, Xingrong Qin, Chunqiang Chen

, Yanju Liu:
State Estimation of Networked Control Systems over Digital Communication Channels. 148-154 - Seyed Mohammad Sadegh Hosseinimoghadam, Masoud Dashtdar, Majid Dashtdar:

Improving the Sharing of Reactive Power in an Islanded Microgrid Based on Adaptive Droop Control with Virtual Impedance. 155-166 - Qingyu Zou, Yanlin Li, Xu Yang, Zhenxiong Zhou:

Identification of Key Nodes in Directed Network Based on Overlapping Community Structure. 167-176 - Niklavs Barkovskis, Kaspars Ozols, Atis Elsts:

Survey of Low-Power Wireless Network Technologies for the Internet of Things. 177-194 - Jiming Chen, Liping Chen:

Multi-Dimensional Color Image Recognition and Mining Based on Feature Mining Algorithm. 195-201 - Hao Zhang

, Xianggong Hong, Li Zhu:
Detecting Small Objects in Thermal Images Using Single-Shot Detector. 202-211
Volume 55, Number 3, May 2021
- Svetlana V. Budnik, Vladimir N. Shashihin:

Stabilization of Nonlinear Systems with Dynamic Chaos. 213-221 - Guangcheng Ge, Shuaishuai Liu, Jie Xu:

Research on Joint Control of Four-Wheel Steering and Electronic Differential on Account of Pavement Parameter Identification. 222-233 - Boris V. Sokolov, Anton Kolosov:

Blockchain Technology as a Platform for Integrating Corporate Systems. 234-242 - Mengxiong Lu, Zhicheng Xu:

Integrated Handling and Stability Control with AFS and DYC for 4WID-EVs via Dual Sliding Mode Control. 243-252 - Oleg I. Sheluhin, Sergey A. Sekretarev:

Concept Drift Detection in Streaming Classification of Mobile Application Traffic. 253-262 - S. M. Abdul Kalam Azad, K. Srinivasan

:
Dynamic Network Scheduler for Customized Aperiodic Communication in Networked Control System. 263-276 - Jun Wang, Ni Wang:

Improving Life Cycle of the Underwater Wireless Sensor Network. 277-286 - Seddik Rabhi, Fouzi Semchedine

, Nader Mbarek:
An Improved Method for Distributed Localization in WSNs Based on Fruit Fly Optimization Algorithm. 287-297 - Huaichao Wang, Jianli Ding, Tao Mu, Xinwei Chen:

Indoor Localization Algorithm of Terminal Based on RSS Feature Extension and Spectral Regression Kernel Discriminant Analysis. 298-309
Volume 55, Number 4, July 2021
- Yu Zhang, Jinfang Zeng, Youming Li, Da Chen:

Convolutional Neural Network-Gated Recurrent Unit Neural Network with Feature Fusion for Environmental Sound Classification. 311-318 - Tanusree Chatterjee, Sushmita Ruj

, Sipra Das Bit:
Efficient Data Storage and Name Look-Up in Named Data Networking Using Connected Dominating Set and Patricia Trie. 319-333 - Yanming Quan, Lingwei Huang, Lei Ma, Yiming He, Ronghui Wang:

Neural Network-Based Indoor Autonomously-Navigated AGV Motion Trajectory Data Fusion. 334-345 - Liyi Zhang, Mingyue Fu

, Teng Fei, Jingyi Liang:
The Artificial Fish Swarm Algorithm Optimized by RNA Computing. 346-357 - Arthur M. Stepchenko:

Land-Use Classification Using Convolutional Neural Networks. 358-367 - Xin Zhang, Wenbo Xu, Wenru Lu:

The Control Strategy of Manipulator Based on Fractional-Order Iterative Learning. 368-376 - Stamatis Mastromichalakis

, Spiros Chountasis:
A Moment Based Fractional Fourier Transform Scheme for MR Image Classification. 377-387 - Qinli Zhang, Weijie Lu, Xiulan Yang:

A Novel Low-Rank and Sparse Decomposition Model and Its Application in Moving Objects Detection. 388-395 - Vladimir Aristov, Eduard Lobanovs, Romans Maliks, Maksis Celitans

, J. Simanovichs, S. Bondars, R. Gailis:
Ultra-Wideband Pulse Radar Mounted on an Unmanned Aerial Vehicle for the Monitoring of Moving Objects. 396-405
Volume 55, Number 5, September 2021
- B. A. Haseena

, K. Srinivasan:
Design and Development of Constrained Next-Generation Controller with and without Event Triggered Mechanism for Single Link Robot Arm. 407-418 - Weiwei Zou, Haiying Dong, Kaiqi Liu, Miaohong Su:

Neural Network Internal Model Control of VSC-MTDC. 419-430 - Qiaoqiao Lou, Zhijin Zhao:

Active Rendezvous Broadcast Algorithm Based on Channel Weight in Cognitive Radio Ad Hoc Networks. 431-443 - D. R. Denslin Brabin

, Sriramulu Bojjagani
, D. R. Denslin Braja:
A Visible Watermarking Scheme for JPEG Images Based on Modification of Frequency Coefficients. 444-453 - Hongyao Ju, Gaoyun Lv:

Research on a Performance Enhancement Method for Heavy Load Network. 454-468 - Nicholas A. Nechval, Gundars Berzins, Konstantin N. Nechval, Zhanna Tsaurkubule:

Intelligent Constructing Efficient Statistical Decisions via Pivot-Based Elimination of Unknown (Nuisance) Parameters from Underlying Models. 469-489 - Zhong-xun Wang, Kai-yue Sha, Xinglong Gao:

Digital Image Encryption Test System Based on FPGA and Nios II Soft Core. 490-499
Volume 55, Number 6, November 2021
- Noor Cholis Basjaruddin, Didin Saefudin, Nela Andriani:

Hardware Simulation of Camera-Based Adaptive Cruise Control Using Fuzzy Logic Control. 501-509 - Shuaishuai Liu, Di Tan:

Recognition of Driver Type in Complex Driving Environment. 510-521 - Oleg I. Sheluhin, Denis V. Kostin, Mikhail V. Polkovnikov:

Forecasting of Computer Network Anomalous States Based on Sequential Pattern Analysis of "Historical Data". 522-533 - Yingjun Sang, Tingyu Sui, Peng Kang, Zizhen Ding, Xuan Zhao, Yuanyuan Fan:

Study on Load Monitoring and Demand Side Management Strategy of Chemical Enterprise. 534-545 - Saikat Gochhait

, Shariq Aziz Butt
, Emiro De la Hoz-Franco, Qaisar Shaheen
, Jorge Luis Díaz Martinez, Gabriel Piñeres-Espitia
, Darwin Mercado-Polo:
A Machine Learning Solution for Bed Occupancy Issue for Smart Healthcare Sector. 546-556 - Chi Zhang, Huanyu Li, Hui Li, Zhi-Yang Lin, Ping Wang:

Distributed MIMO System Design and Channel Capacity Analysis Based on Polar Orbit LEO Constellation. 557-567 - Yair Wiseman:

JPEG Quantization Tables for GPS Maps. 568-576 - Vladimir Aristov, Modris Greitans:

Determination of the Electrophysical Parameters of Dielectric Objects via the Processing of Ultra-Wideband Pulse Radar Signals. 577-587
Volume 55, Number 7, December 2021
- Alexandra Igorevna Kononova

, Alexey V. Gorodilov
:
Estimation of Distribution of Node-to-Node Path Lengths in the Global Network. 589-600 - Evgeniy A. Timofeev

:
On a Segment Partition for Entropy Estimation. 601-606 - Sergey V. Morzhov

:
Modern Approaches to Detecting and Classifying Toxic Comments Using Neural Networks. 607-616 - Vladimir V. Vasilchikov

:
Parallel Algorithm for Solving the Graph Isomorphism Problem. 617-622 - Adil A. Kassenov

, Alexey Anatolievich Magazev
, Valeria Fedorovna Tsyrulnik
:
Markov Model of Nonmutually Exclusive Cyberthreats and Its Applications for Selecting an Optimal Set of Information Security Tools. 623-635 - Alexander Ivanovich Legalov

, Ivan V. Matkovskii
, Mariya S. Ushakova
, Darya S. Romanova
:
Dynamically Changing Parallelism with Asynchronous Sequential Data Flows. 636-646 - Anastasiia N. Gainullina

, Anatoly A. Shalyto
, Alexey A. Sergushichev
:
Method for Joint Clustering in Graph and Correlation Spaces. 647-657 - Mark G. Gonopolskiy

, Alevtina B. Glonina
:
Research and Development of an Algorithm for Response Time Estimation in Multiprocessor Systems under Interval Uncertainty of Task Execution Times. 658-669 - Vladimir A. Zakharov

:
Efficient Equivalence Checking Technique for Some Classes of Finite-State Machines. 670-701 - Valery A. Sokolov

:
On the Existence Problem of Finite Bases of Identities in the Algebras of Recursive Functions. 702-711 - E. V. Kuzmin

, Oleg E. Gorbunov
, Petr O. Plotnikov
, Vadim A. Tyukin
, Vladimir A. Bashkin
:
Application of Convolutional Neural Networks for Recognizing Long Structural Elements of Rails in Eddy Current Defectograms. 712-722 - Sergey D. Glyzin

, Sergey A. Kashchenko
, Anna O. Tolbey
:
Features of the Algorithmic Implementation of Difference Analogs of the Delayed Logistic Equation. 723-730 - Sergey V. Zykin

:
Generalization of Derivation Rules for Join Dependencies in Database. 731-737 - Aleksandr S. Tvardovskii

, Nina V. Evtushenko:
Deriving Homing Sequences for Finite State Machines with Timed Guards. 738-750 - Evgenii M. Vinarskii

, Vladimir A. Zakharov
:
On the Modeling of Sequential Reactive Systems by Means of Real Time Automata. 751-762 - Natalia Olegovna Garanina

, Igor S. Anureev
, Vladimir E. Zyubin
, Sergey M. Staroletov
, Tatiana V. Liakh
, Andrei S. Rozov
, Sergei P. Gorlatch
:
A Temporal Logic for Programmable Logic Controllers. 763-775 - Anton R. Gnatenko

, Vladimir A. Zakharov
:
On the Model Checking Problem for Some Extension of CTL. 776-785 - Nikolay V. Shilov

, Natalia Olegovna Garanina
:
Knowledge-Based Algorithms for BDI Agents. 786-794 - Vladimir M. Deundyak

, Denis V. Zagumennov
:
On the Properties of Algebraic Geometric Codes as Copy Protection Codes. 795-808 - Anatoliy Y. Poletaev

, Elena M. Spiridonova
:
Hierarchical Clustering as a Dimension Reduction Technique in the Markowitz Portfolio Optimization Problem. 809-815 - Aleksandr N. Maksimenko

:
The Branch-and-Bound Algorithm for the Traveling Salesman Problem is Not a Direct Algorithm. 816-826 - Yury V. Kosolapov

:
On the Detection of Exploitation of Vulnerabilities That Leads to the Execution of a Malicious Code. 827-837 - Evgeniy P. Kubyshkin

, Vladimir A. Kulikov
:
On a Mechanism for the Formation of Spatially Inhomogeneous Structures of Light Waves in Optical Information Transmission Systems. 838-846 - Sergey A. Shershakov

:
VTMine for Visio: A Graphical Tool for Modeling in Process Mining. 847-865 - Ksenia V. Lagutina

, Alla M. Manakhova
:
Automated Search and Analysis of the Stylometric Features That Describe the Style of the Prose of 19th-21st Centuries. 866-876 - Vladimir E. Goryunov

:
Features of the Computational Implementation of the Algorithm for Estimating the Lyapunov Exponents of Systems with Delay. 877-884 - Anton O. Bassin

, Maxim V. Buzdalov
, Anatoly A. Shalyto
:
The "One-Fifth Rule" with Rollbacks for Self-Adjustment of the Population Size in the (1 + (λ, λ)) Genetic Algorithm. 885-902
Volume 55, Number 8, December 2021
- T. N. Saurenko, V. G. Anisimov, E. G. Anisimov, V. V. Kasatkin, V. P. Los':

Information Security Incident Forecasting. 903-907 - Maxim O. Kalinin:

Application of Neuro-Fuzzy Inference to Detect Network Scanning. 908-917 - P. A. Baranov:

Comparison of Four Methods of Checking the Integrity of Transmitted Message Blocks. 918-923 - E. P. Belova, Irina V. Mashkina:

Architecture and Operation Algorithm of a Biometric Voice Authentication System. 924-931 - T. D. Ovasapyan, P. V. Knyazev, Dmitry A. Moskvin:

Automated Search for Vulnerabilities in ARM Software Using Dynamic Symbolic Execution. 932-940 - R. A. Antonov, E. V. Karachanskaya, G. V. Khandozhko:

Using Artificial Neural Networks to Estimate the Probability of Information Security Threat Occurrences. 941-948 - A. V. Myasnikov, Artem S. Konoplev, A. F. Suprun, V. G. Anisimov, V. V. Kasatkin, V. P. Los':

Constructing the Model of an Information System for the Automatization of Penetration Testing. 949-955 - Andrei D. Dakhnovich, Dmitry A. Moskvin, Dmitry P. Zegzhda:

Requirements on Providing a Sustainability of Industrial Internet of Things. 956-961 - Mikhail A. Eremeev, V. S. Nefedov, A. S. Ostrovskii, D. A. Semchenkov:

The Use of Beacon Signals to Detect Covert Channels in DNS Traffic. 962-969 - I. E. Gorbachev, A. A. Kriulin, I. T. Latypov:

Methodology of Mediametric Information Analysis with the Use of Machine Learning Algorithms. 970-977 - Alexander A. Grusho, Nikolai A. Grusho, Michael I. Zabezhailo, Elena E. Timonina:

Localization of the Root Cause of the Anomaly. 978-983 - A. A. Poltavtsev, A. R. Khabarov, A. O. Selyankin:

Comparative Analysis of Methods for Protection against Logical Inference. 984-990 - T. D. Ovasapyan, V. D. Danilov, Dmitry A. Moskvin:

Application of Synthetic Data Generation Methods to the Detection of Network Attacks on Internet of Things Devices. 991-998 - V. A. Miklush, I. A. Sikarev, Tatiana M. Tatarnikova:

Organization of Environmental Monitoring of the Port Water Area by Processing an Anti-Interference Signal from a Vessel Traffic Control System. 999-1004 - Maksim V. Gofman, Anatoly Kornienko, M. L. Glukharev:

A Method for Watermark Detection in Digital Audio Signals by Authorized Users. 1005-1019 - Peter D. Zegzhda, V. G. Anisimov, E. G. Anisimov, T. N. Saurenko, V. P. Los':

Operational Efficiency of Computer Networks under Conditions of Malicious Cyber Activity. 1020-1024 - I. I. Marshev, E. V. Zhukovskii, Elena B. Aleksandrova:

Protection against Adversarial Attacks on Malware Detectors Using Machine Learning Algorithms. 1025-1028 - N. N. Shenets, A. S. Petushkov:

New Regular Sliding Window Algorithms for Elliptic Curve Scalar Point Multiplication. 1029-1038 - M. D. Stepanov, E. Yu. Pavlenko, Daria S. Lavrova:

Detecting Network Attacks on Software Configured Networks Using the Isolating Forest Algorithm. 1039-1050 - K. V. Vasil'eva, Daria S. Lavrova:

Detecting Anomalies in Cyber-Physical Systems Using Graph Neural Networks. 1051-1060 - Andrei D. Dakhnovich, Dmitry A. Moskvin, Dmitry P. Zegzhda:

Using Security-through-Obscurity Principle in an Industrial Internet of Things. 1061-1067 - S. A. Ageev, N. S. Ageeva, V. V. Karetnikov, A. A. Privalov, I. A. Sikarev:

Algorithm for Online Detection of Traffic Anomalies in High-Speed Enterprise Multiservice Communication Networks. 1068-1079 - D. A. Kulikov, V. V. Platonov:

Adversarial Attacks on Intrusion Detection Systems Using the LSTM Classifier. 1080-1086 - Elena B. Aleksandrova, A. Yu. Oblogina, E. N. Shkorkina:

Authentication of Control Devices in the Internet of Things with the Architecture of Edge Computing. 1087-1091 - R. A. Ognev, E. V. Zhukovskii, Dmitry P. Zegzhda:

Detection of Malicious Executable Files Based on Clustering of Activities. 1092-1098 - S. I. Smirnov, Mikhail A. Eremeev, I. A. Pribylov:

Approach to Recognition of Malicious Behavior Based on Autoregression Model upon Investigation into Cyberincident. 1099-1103 - T. D. Ovasapyan, V. A. Nikulkin, Dmitry A. Moskvin:

Applying Honeypot Technology with Adaptive Behavior to Internet-of-Things Networks. 1104-1110 - A. D. Fatin, E. Yu. Pavlenko:

Using the Neat-Hypercube Mechanism to Detect Cyber Attacks on IoT Systems. 1111-1114 - Alexander A. Grusho, Nikolai A. Grusho, Michael I. Zabezhailo, Elena E. Timonina:

Use of Contradictions in Data for Finding Implicit Failures in Computer Systems. 1115-1120 - A. V. Kozachok, V. I. Kozachok, A. A. Spirin:

An Encrypted File Detection Algorithm. 1121-1128 - Vladimir N. Kustov, Alexei G. Krasnov:

Discrete Chaotic Transformations of Hidden Messages to Disguise Them as Noise in Steganography Problems. 1129-1135 - Mikhail E. Sukhoparov, Ilya S. Lebedev

:
Application of Ensembles of Neural Networks Trained on Unbalanced Samples for Analyzing Statuses of IoT Devices. 1136-1141 - V. I. Doroshenko, A. N. Pivovarov, Yu. G. Ksenofontov:

Improvement of Information Security of Monitoring Channels in Meteor-Burst Communication Networks of the Russian Arctic. 1142-1148 - E. N. Chizhikov, A. A. Gorbunov, A. S. Belov, E. L. Trakhinin, D. V. Stavitskii:

Theoretical Approach for Evaluating the Connectivity of Distributed Systems and Telecommunications for the Digital Economy. 1149-1152 - Maxim V. Shakurskiy

:
A Two-Component Steganographic System Based on the Sum of Linear Functions of Two Signals Using a Multiplicative Form of Constraint of Embedded Signals. 1153-1158 - I. A. Sikarev, A. V. Garanin:

Basic Principles of Creating Control Algorithms for a Remotely Piloted Sea Vessel to Improve the Information Security of Noisy Data Transmission Channels. 1159-1164 - Maxim O. Kalinin, Vasiliy M. Krundyshev:

Analysis of a Huge Amount of Network Traffic Based on Quantum Machine Learning. 1165-1174 - Mikhail E. Sukhoparov, Kseniya I. Salakhutdinova, Ilya S. Lebedev

:
Software Identification by Standard Machine Learning Tools. 1175-1179 - Evgeny K. Alekseev, Liliya R. Akhmetzyanova, V. D. Nikolaev, Stanislav V. Smyshlyaev

, A. I. Bondarenko:
On Cryptographic Properties of the NB-Fi Protocol. 1180-1187 - Sergey A. Dichenko:

An Integrity Control Model for Multidimensional Data Arrays. 1188-1193 - E. V. Zavadskii, D. V. Ivanov:

Implementation of Honeypot Systems Based on the Potential Attack Graph. 1194-1200 - Maria A. Poltavtseva:

Formation of Data Structures in the Problems of Active Security Monitoring. 1201-1208 - V. S. Nefedov, A. A. Kriulin, Mikhail A. Eremeev:

Approach to Recognition of Malicious Servers of TOR Anonymization Network Based on Cluster Analysis. 1209-1214 - O. A. Izotova, Daria S. Lavrova:

Fake Post Detection Using Graph Neural Networks. 1215-1221 - V. V. Gryzunov:

Conceptual Model for Adaptive Control of a Geographic Information System under Conditions of Destabilization. 1222-1227

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














