default search action
Automatic Control and Computer Sciences, Volume 52
Volume 52, Number 1, January 2018
- Dmitry V. Efanov, Valery V. Sapozhnikov, Vladimir V. Sapozhnikov:
Two-Modulus Codes with Summation of On-Data Bits for Technical Diagnostics of Discrete Systems. 1-12 - Maria Cecilia Fernández, Santiago Rómoli, Maria Nadia Pantano, Oscar Alberto Ortiz, Hector D. Patiño, Gustavo Juan Eduardo Scaglia:
A New Approach for Nonlinear Multivariable Fed-Batch Bioprocess Trajectory Tracking Control. 13-24 - K. Geetha, R. Vadivel:
Syllable Segmentation of Tamil Speech Signals Using Vowel Onset Point and Spectral Transition Measure. 25-31 - Zhu Zhao, RongHua Du:
Yaw Moment Control Strategy for Four Wheel Side Driven EV. 32-39 - E. A. Kol'chugina:
Spontaneous Emergence of Programs from "Primordial Soup" of Functions in Distributed Computer Systems. 40-48 - Yunshan Sun, Teng Fei, Liyi Zhang, Xiaopei Liu, Jingyu Zhang:
Improving Medical CT Image Blind Restoration Algorithm Based on Dictionary Learning by Alternating Direction Method of Multipliers. 49-59 - Eduard S. Sopin, Anastasia V. Gorbunova, Yuliya V. Gaidamaka, Elvira R. Zaripova:
Analysis of Cumulative Distribution Function of the Response Time in Cloud Computing Systems with Dynamic Scaling. 60-66 - Shuijian Zhang, Ying Zhang:
A Hybrid Genetic and Ant Colony Algorithm for Finding the Shortest Path in Dynamic Traffic Networks. 67-76
Volume 52, Number 2, March 2018
- A. S. Rybakov:
Demodulation of Frequency-Modulated Signals by Pseudorandomly Selected Zero-Crossing Instants. 77-88 - Andrii O. Oliinyk, S. Yu. Skrupsky, Sergei Subbotin:
Experimental Research and Analysis of Complexity of Parallel Method for Production Rules Extraction. 89-99 - Ivan V. Horbatyi:
Research of Theoretical Methods Precision of the Amplitude-Phase-Modulated Signal Spectrum Calculation. 100-108 - Alireza Rezaee:
The Nash Equilibrium Point of Dynamic Games Using Evolutionary Algorithms in Linear Dynamics and Quadratic System. 109-117 - Yuqiang Cao, Weiguo Gong, Bo Zhang, Sen Bai:
Block Compressed Sensing Using Random Permutation and Reweighted Sampling for Image Compression Applications. 118-125 - Yanpeng Wu, Ying Wu:
A Novel Predictive Control Scheme with an Enhanced Smith Predictor for Networked Control System. 126-134 - Lei Zhang, Fengbao Yang, Linna Ji:
Infrared Polarization and Intensity Image Fusion Algorithm Based on the Feature Transfer. 135-145 - Nauris Dorbe, Aigars Jaundalders, Roberts Kadikis, Krisjanis Nesenbergs:
FCN and LSTM Based Computer Vision System for Recognition of Vehicle Type, License Plate Number, and Registration Country. 146-154
Volume 52, Number 3, May 2018
- Khaled Dehmani, Fathi Fourati, Khaled Elleuch, Ahmed Toumi:
Multiple Neural Control Strategies Using a Neuro-Fuzzy Classifier. 155-165 - Yevgeniy V. Bodyanskiy, Anastasiia O. Deineko, F. M. Eze:
Kernel Fuzzy Kohonen's Clustering Neural Network and It's Recursive Learning. 166-174 - Weijiang Li, Sheng Wang, Zhengtao Yu:
Deep Learning and Semantic Concept Spaceare Used in Query Expansion. 175-183 - Nicholas A. Nechval, Gundars Berzins, Konstantin N. Nechval:
Intelligent Planning Reliability-Based Inspections of Fatigued Structures for the Crack Initiation Period in the Weibull Case under Parametric Uncertainty. 184-197 - Weiqiang Tang, Wenkun Long, Haiyan Gao:
A Novel Robust Flight Controller Design for an Air-Breathing Hypersonic Vehicle. 198-207 - Sourav Banerjee, Akash Chowdhury, Swastik Mukherjee, Utpal Biswas:
An Approach Towards Development of a New Cloudlet Allocation Policy with Dynamic Time Quantum. 208-219 - S. Senthil Kumar, S. Margret Anouncia:
QoS-Based Concurrent User-Service Grouping for Web Service Recommendation. 220-230 - T. A. Aliev, N. F. Musaeva, M. T. Suleymanova:
Algorithms for Indicating the Beginning of Accidents Based on the Estimate of the Density Distribution Function of the Noise of Technological Parameters. 231-242 - A. F. Chipiga, V. P. Pashintsev, V. A. Tsymbal, V. V. Zelenevskiy:
Low-Frequency Satellite Communication System Technical Means' Parameters Synthesis by the Requirements for Energetic Concealment and Noise Immunity. 243-249
Volume 52, Number 4, July 2018
- Vyacheslav M. Zakharov, Valerii A. Pesoshin, Sergey V. Shalagin:
The Complexity of a Pipelined Algorithm for Remainder Computing in a Given Modulo. 251-255 - Elham Yazdani Bejarbaneh, Ahmad Bagheri, Behnam Yazdani Bejarbaneh, Salinda Buyamin:
Optimization of Model Reference Adaptive Controller for the Inverted Pendulum System Using CCPSO and DE Algorithms. 256-267 - Vyacheslav P. Koryachko, Dmitry A. Perepelkin, Vladimir S. Byshov:
Enhanced Dynamic Load Balancing Algorithm in Computer Networks with Quality of Services. 268-282 - Yun Zhang:
Key Technologies of Confrontational Intelligent Decision Support for Multi-Agent Systems. 283-290 - Haijun Diao:
Deep Mining of Redundant Data in Wireless Sensor Network Based on Genetic Algorithm. 291-296 - Arnis Ancans, Ernests Petersons:
The Relationship between Transport Wireless Network Throughput and Vehicle Speed. 297-305 - Iman N. Askerzade:
Influence of Thermal Fluctuations on Sensitivity of Balanced Comparators Based on Small Josephson Junctions. 306-310 - Zenoviy A. Kolodiy, Bohdan I. Stadnyk, Svyatoslav P. Yatsyshyn, Andriy Z. Kolodiy:
Energy Spectrum of Stochastic Signals Caused by Variations of Electrical Resistance. 311-316 - Valdemars Plocins:
The Effect of Inaccuracy of Digital-to-Analog Conversion on Properties of the Up-and-Down Method for Digital Signal Processing. 317-321 - Yi Jiang, Shufang Zhang, Junhua Teng:
An Analysis of Positioning Method in AIS Ranging Mode. 322-333 - Yifei Meng, Xue Yuan, Xue-Ye Wei, Wenhui Yang, Yan Chen:
Synthetic Sample Extension in Implementation of Tangut Character Databases. 334-343
Volume 52, Number 5, September 2018
- Eduard S. Sopin, Kirill A. Ageev, Ekaterina V. Markova, Olga G. Vikhrova, Yuliya V. Gaidamaka:
Performance Analysis of M2M Traffic in LTE Network Using Queuing Systems with Random Resource Requirements. 345-353 - Meng Zhao, Canchen Jiang, Xiaoming Tang, Minghong She:
Interpolation Model Predictive Control of Nonlinear Systems Described by Quasi-LPV Model. 354-364 - Alexander M. Andronov, Iakov M. Dalinger:
On Reliability of Renewable Binary Elements' System. 365-370 - Agris Nikitenko, Egons Lavendelis, Martins Ekmanis, Rudolfs Rumba:
Task Allocation Methods for Homogeneous Multi-Robot Systems: Feed Pushing Case Study. 371-381 - S. Adarsh, K. I. Ramachandran:
Design of Sensor Data Fusion Algorithm for Mobile Robot Navigation Using ANFIS and Its Analysis Across the Membership Functions. 382-391 - Janis Arents, Ricards Cacurs, Modris Greitans:
Integration of Computervision and Artificial Intelligence Subsystems with Robot Operating System Based Motion Planning for Industrial Robots. 392-401 - Amit Kumar Choudhary, Shyam Krishna Nagar:
Model Order Reduction of Discrete-Time Interval Systems by Differentiation Calculus. 402-411 - Cheng Jiang, Jie Sui, Hua Yu:
A Recursive Bayesian Approach for the Link Prediction Problem. 412-420 - Oleg I. Sheluhin, I. Yu. Lukin:
Network Traffic Anomalies Detection Using a Fixing Method of Multifractal Dimension Jumps in a Real-Time Mode. 421-430 - Niqin Jing:
Application of Wireless Sensor Network in Urban Intelligent Traffic Information Acquisition. 431-438 - G. Anand Kumar, P. V. Sridevi:
3D Deep Learning for Automatic Brain MR Tumor Segmentation with T-Spline Intensity Inhomogeneity Correction. 439-450 - Motaz Daadoo, Derar Eleyan, Saed Tarapiah, Shadi Atalla, Amna Eleyan:
Computer Numerical Control-PCB Drilling Machine with Efficient Path Planning - Case Study 2. 451-463
Volume 52, Number 6, November 2018
- Sheng Guo, Yafei Sun, Fengzhi Wu, Yuhong Li:
Integrating Laplacian Eigenmaps Feature Space Conversion into Deep Neural Network for Equipment Condition Assessment. 465-475 - Nicholas A. Nechval, Konstantin N. Nechval, Gundars Berzins:
A New Technique for Intelligent Constructing Exact γ-content Tolerance Limits with Expected (1 - α)-confidence on Future Outcomes in the Weibull Case Using Complete or Type II Censored Data. 476-488 - Jie Shen, Qiuping Ji, Yaoju Zhang, Xiukai Ruan, Zhennao Cai, Zhihong Li:
Theoretical Design of Band Pass Filter Utilizing Long Period Fiber Grating Having Cladding Refractive Index Perturbation. 489-495 - Alexander Ilyashenko, S. P. Voskoboynikov, S. M. Ustinov, Alexey Lukashin:
Methodology of Effective Task Planning and Algorithm for Multivariate Computation of the Characteristics of a Quantum Rotation Sensor on a Hybrid Supercomputer Cluster. 496-504 - Arash Pourhashemi, Amin Ramezani, Mehdi Siahi:
Design of New Fractional Sliding Mode Control Due to Complete Synchronization of Commensurate and Incommensurate Fractional Order Chaotic Systems. 505-516 - Long Yu, Ruonan Zhang, Shengwei Tian, Liu Yang, Yalong Lv:
Deep Multi-Feature Learning for Water Body Extraction from Landsat Imagery. 517-527 - S. Gaamouri, Mounir Bousbia-Salah, R. Hamdi:
Denoising ECG Signals by Using Extended Kalman Filter to Train Multi-Layer Perceptron Neural Network. 528-538 - Natheer Almtireen, Hisham ElMoaqet, Mutaz Ryalat:
Linearized Modelling and Control for a Twin Rotor System. 539-551 - Xiaohui Wang:
A Vehicular Opportunity Routing Protocol with Area Learning: Voal. 552-560 - Li Hongyan, Cao Meng, Wang Yue:
Separation of Reverberant Speech Based on Computational Auditory Scene Analysis. 561-571 - Vladimir Aristov:
Mathematical Description of the Operation of a Step-Recovery-Diode-Based Pulse Generator Circuit. 572-580
Volume 52, Number 7, December 2018
- Artyom Olegovich Aleksyuk, Vladimir M. Itsykson:
Semantics-Driven Migration of Java Programs: A Practical Application. 581-588 - Natalia Kushik, Nina Yevtushenko, Igor B. Bourdonov, Alexander S. Kossatchev:
Deriving Synchronizing and Homing Sequences for Input/Output Automata. 589-595 - Tatiana R. Shmeleva:
Comparative Analysis of Stability to Induced Deadlocks for Computing Grids with Various Node Architectures. 596-604 - E. Ju. Antoshina, D. Ju. Chalyy:
Semantic Security Tools in Software-Defined Networks. 605-607 - Sergey M. Taranin:
Deduplication in the Backup System with Information Storage in a Database. 608-614 - Alexey Anatolevich Magazev, Valeria Fedorovna Tsyrulnik:
Investigation of a Markov Model for Computer System Security Threats. 615-624 - Alexander V. Smirnov:
The Shortest Path Problem for a Multiple Graph. 625-633 - Yuriy A. Belov, S. I. Vovchok:
Clarification of the Properties of a Tree Centroid. 634-637 - Vladimir S. Zykin, Sergey V. Zykin:
Analysis of Typed Inclusion Dependences with Null Values. 638-646 - Vladimir M. Deundyak, Yu. V. Kosolapov, E. A. Lelyuk:
Decoding the Tensor Product of MLD Codes and Applications for Code Cryptosystems. 647-657 - Egor Vladimirovich Kuzmin, Oleg E. Gorbunov, Petr O. Plotnikov, Vadim A. Tyukin:
Finding the Level of Useful Signals on Interpretation of Magnetic and Eddy-Current Defectograms. 658-666 - Mikhail V. Nevskii, Alexei Yu. Ukhalov:
On n -Dimensional Simplices Satisfying Inclusions $$S \subset {{[0, 1]}^{n}} \subset nS$$. 667-679 - Mikhail V. Nevskii, Alexei Yu. Ukhalov:
On Minimal Absorption Index for an n-Dimensional Simplex. 680-687 - Sergey D. Glyzin, M. V. Lokhanin, D. M. Sirotin:
Invariant Characteristics of Forced Oscillations of Beams with Longitudinal Compression. 688-693 - Vladimir E. Goryunov:
The Andronov-Hopf Bifurcation in a Biophysical Model of the Belousov Reaction. 694-699 - E. V. Grigorieva, Sergey A. Kaschenko, D. V. Glazkov:
Local Dynamics of a Model of an Opto-Electronic Oscillator with Delay. 700-707 - Anatoli N. Kulikov, Dmitriy A. Kulikov:
The Kuramoto-Sivashinsky Equation. A Local Attractor Filled with Unstable Periodic Solutions. 708-713 - Sergey D. Glyzin:
Age Groups in Hutchinson Equations. 714-727 - Sergey A. Kaschenko:
Asymptotic Expansions of Eigenvalues of Periodic and Antiperiodic Boundary Value Problems for Singularly Perturbed Second-Order Differential Equation with Turning Points. 728-744 - Valentin F. Butuzov:
Contrast Structures with a Multizone Internal Layer. 745-761 - Sergey D. Glyzin:
Difference Approximations of a Reaction-Diffusion Equation on Segments. 762-776 - M. M. Preobrazhenskaia:
The Impulse-Refractive Mode in a Neural Network with Ring Synaptic Interaction. 777-789 - Sergey D. Glyzin, Sergey A. Kaschenko, Artem S. Polstyanov:
Spatially Inhomogeneous Periodic Solutions in a Distributed Hutchinson's Equation. 790-796 - Sergey A. Kaschenko:
Asymptotical Distributions of Eigenvalues of Periodic and Antiperiodic Boundary Value Problems for Second-Order Differential Equations. 797-809 - Vladimir V. Vasilchikov:
On а Recursive-Parallel Algorithm for Solving the Knapsack Problem. 810-816 - Alevtina B. Glonina, Vasily V. Balashov:
On the Correctness of Real-Time Modular Computer Systems Modeling with Stopwatch Automata Networks. 817-827 - Mikhail V. Nevskii, Alexei Yu. Ukhalov:
On Optimal Interpolation by Linear Functions on n-Dimensional Cube. 828-842 - Vladimir S. Vasilev, Alexander I. Legalov:
Loop-invariant Optimization in the Pifagor Language. 843-849 - Mariya S. Ushakova, Alexander I. Legalov:
Verification of Programs with Mutual Recursion in Pifagor Language. 850-866 - E. V. Kuzmin, Oleg E. Gorbunov, Petr O. Plotnikov, Vadim A. Tyukin:
An Efficient Algorithm for Finding the Level of Useful Signals on Interpretation of Magnetic and Eddy Current Defectograms. 867-870 - Alexander V. Smirnov:
The Spanning Tree of a Divisible Multiple Graph. 871-879 - Valery G. Durnev, Dmitriy Mikhailovich Murin, Valery A. Sokolov, D. Ju. Chalyy:
On Some Approaches to the Solution of the "Useful Proof-of-Work for Blockchains" Task. 880-884 - Sergey D. Glyzin, E. A. Marushkina:
Complicated Dynamic Regimes in a Neural Network of Three Oscillators with a Delayed Broadcast Connection. 885-893 - Evgeny Vladislavovich Konovalov:
Equivalence of Conventional and Modified Network of Generalized Neural Elements. 894-900
Volume 52, Number 8, December 2018
- Dmitry P. Zegzhda, Denis V. Ivanov, Dmitry A. Moskvin, A. A. Ivanov:
The Use of Adjacency Series for Recognition of Prefractal Graphs in Assessing VANET Cybersecurity. 901-905 - Maxim O. Kalinin, Vasiliy M. Krundyshev, Evgenia Rezedinova, D. V. Reshetov:
Hierarchical Software-Defined Security Management for Large-Scale Dynamic Networks. 906-911 - Maxim O. Kalinin, Daria S. Lavrova, A. V. Yarmak:
Detection of Threats in Cyberphysical Systems Based on Deep Learning Methods Using Multidimensional Time Series. 912-917 - Peter D. Zegzhda, Maria A. Poltavtseva, Alexander I. Pechenkin, Daria S. Lavrova, Elizaveta Zaitseva:
A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems. 918-930 - Daria S. Lavrova, I. V. Alekseev, Anna A. Shtyrkina:
Security Analysis Based on Controlling Dependences of Network Traffic Parameters by Wavelet Transformation. 931-935 - Peter D. Zegzhda, Daria S. Lavrova, Anna A. Shtyrkina:
Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks. 936-944 - S. I. Shterenberg, Maria A. Poltavtseva:
A Distributed Intrusion Detection System with Protection from an Internal Intruder. 945-953 - T. D. Ovasapyan, Dmitry A. Moskvin, Maxim O. Kalinin:
Using Neural Networks to Detect Internal Intruders in VANETs. 954-958 - V. V. Platonov, P. O. Semenov:
Detection of Abnormal Traffic in Dynamic Computer Networks with Mobile Consumer Devices. 959-964 - Roman Demidov, Alexander I. Pechenkin, Peter D. Zegzhda, Maxim O. Kalinin:
Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security. 965-970 - Roman Demidov, Peter D. Zegzhda, Maxim O. Kalinin:
Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model. 971-976 - Maxim O. Kalinin, E. A. Zubkov, A. F. Suprun, Alexander I. Pechenkin:
Prevention of Attacks on Dynamic Routing in Self-Organizing Adhoc Networks Using Swarm Intelligence. 977-983 - Dmitry P. Zegzhda, E. Yu. Pavlenko:
Cyber-sustainability of Software-Defined Networks Based on Situational Management. 984-992 - Peter D. Zegzhda, Denis V. Ivanov, Dmitry A. Moskvin, G. S. Kubrin:
Actual Security Threats for Vehicular and Mobile Ad Hoc Networks. 993-999 - Dmitry P. Zegzhda, Yu. S. Vasil'ev, Maria A. Poltavtseva:
Approaches to Modeling the Security of Cyberphysical Systems. 1000-1009 - Roman Demidov, Alexander I. Pechenkin:
An Approach to the Programs Security Analysis using Vector Representation of Machine Code. 1010-1016 - Artem S. Konoplev, Alexey G. Busygin, Dmitry P. Zegzhda:
A Blockchain Decentralized Public Key Infrastructure Model. 1017-1021 - Roman Demidov, Alexander I. Pechenkin, Peter D. Zegzhda:
An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code. 1022-1028 - I. I. Falcone, O. Yu. Gatsenko:
Modeling the Dissemination of Information Threats in Social Media. 1029-1035 - Dmitry P. Zegzhda, E. S. Usov, V. A. Nikol'skii, E. Yu. Pavlenko:
Ensuring Secure Data Input/Output Operations for SGX ENCLAVE. 1036-1041 - T. D. Ovasapyan, Denis V. Ivanov:
Security Provision in Wireless Sensor Networks on the Basis of the Trust Model. 1042-1048 - A. P. Baranov, P. A. Baranov:
CRC Error Probability under Batch Random Noise. 1049-1058 - Elena B. Aleksandrova, Anna A. Shtyrkina:
Directed Digital Signature on Isogenies of Elliptic Curves. 1059-1064 - Victor Sergeevich Gorbatov, I. Yu. Zhukov, O. N. Murashov:
Security of a Key System of a Fiscal Feature. 1065-1070 - Andrei D. Dakhnovich, Dmitry A. Moskvin, Dmitry P. Zegzhda:
Analysis of the Information Security Threats in the Digital Production Networks. 1071-1075 - Alexander A. Grusho, Nikolai A. Grusho, Michael I. Zabezhaylo, Elena E. Timonina:
Protection of Valuable Information in Information Technologies. 1076-1079 - Alexey G. Busygin, Artem S. Konoplev, Dmitry P. Zegzhda:
Providing Stable Operation of Self-Organizing Cyber-Physical System via Adaptive Topology Management Methods Using Blockchain-Like Directed Acyclic Graph. 1080-1083 - A. A. Sikarev, I. A. Sikarev, A. V. Garanin:
Noise Immunity of Noncoherent Reception under Complex Interference Effect on Communication and Monitoring Channels of Automated Information Systems of River Transport on Inland Waterways of the Russian Federation. 1084-1089 - Yu. S. Vasil'ev, Dmitry P. Zegzhda, Maria A. Poltavtseva:
Problems of Security in Digital Production and Its Resistance to Cyber Threats. 1090-1100 - Kseniya I. Salakhutdinova, Ilya S. Lebedev, Irina E. Krivtsova, Mikhail E. Sukhoparov:
Studying the Effect of Selection of the Sign and Ratio in the Formation of a Signature in a Program Identification Problem. 1101-1104 - V. G. Anisimov, E. G. Anisimov, Peter D. Zegzhda, A. F. Suprun:
The Problem of Innovative Development of Information Security Systems in the Transport Sector. 1105-1110 - Dmitry P. Zegzhda, Dmitry A. Moskvin, A. V. Myasnikov:
Assurance of Cyber Resistance of the Distributed Data Storage Systems Using the Blockchain Technology. 1111-1116 - A. V. Kozachok:
Development of a Heuristic Mechanism for Detection of Malware Programs Based on Hidden Markov Models. 1117-1123 - Sergey Victorovich Belim, Svetlana Yuryevna Belim:
Implementation of Mandatory Access Control in Distributed Systems. 1124-1126 - Andrei D. Dakhnovich, Dmitry P. Zegzhda, Dmitry A. Moskvin:
Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network. 1127-1133 - Sergey Victorovich Belim, Svetlana Yuryevna Belim:
Modification of Preliminary Blom's Key Distribution Scheme Taking into Account Simplex Channels. 1134-1137 - V. P. Los', G. V. Ross, E. D. Tyshuk:
Use of Statistical Processing of Reference Images in Biometric Authentication Systems. 1138-1143 - E. S. Usov, V. A. Nikol'skii, E. Yu. Pavlenko, Dmitry P. Zegzhda:
Architecture of the Protected Cloud Data Storage Using Intel SGX Technology. 1144-1149 - Dmitry P. Zegzhda, E. Yu. Pavlenko:
Digital Manufacturing Security Indicators. 1150-1159 - Elena B. Aleksandrova, E. N. Shkorkina:
Using Undeniable Signature on Elliptic Curves to Verify Servers in Outsourced Computations. 1160-1163 - Violetta N. Volkova, Yuri Yu. Chernyi:
Application of Systems Theory Laws for Investigating Information Security Problems. 1164-1170
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.