default search action
Automatic Control and Computer Sciences, Volume 56
Volume 56, Number 1, February 2022
- Valery V. Sapozhnikov, Vladimir V. Sapozhnikov, Dmitry V. Efanov:
Duplication of Boolean Complements for Synthesis of Fault-Tolerant Digital Devices and Systems. 1-9 - Kamel Tebessi, Fouzi Semchedine:
An Improvement on LEACH-C Protocol (LEACH-CCMSN). 10-16 - Huong Thu Nguyen, L. T. Nguyen, Aleksandr Diomidovich Afanasiev, L. T. Pham:
Classification of Road Pavement Defects Based on Convolution Neural Network in Keras. 17-25 - Adil Khan, Ar Junejo, M. Naeem, M. Sattar, Abdul Haseeb Malik:
Inter-Organizational Cloud Computing and Robust Scalability in Current Scenario and Beyond. 26-37 - Yuanyuan Fan, S. Zhang, Zizhen Ding, K. Peng, Y.-J. Zhang, D.-J. Cheng, Yingjun Sang:
The Design of an Expressway Lighting and Early Warning System Based on MCU. 38-44 - Mehdi Merouane:
An Approach for Detecting Anonymized Traffic: Orbot as Case Study. 45-57 - Shuohui Chen, Xuan Teng, Xiuxing Sang, Huidi Zhang, Jinzhao Zhuang:
Automatic Recognition of Welding Seam Defects in TOFD Images Based on TensorFlow. 58-66 - Fouzia Chighoub, Rachida Saouli:
Fully Integrated Spatial Information to Improve FCM Algorithm for Brain MRI Image Segmentation. 67-82 - Yiqin Bao, Zhengtang Sun, Zhao Qiang, Tianya Lin, Hao Zheng:
Hot News Prediction Method Based on Natural Language Processing Technology and Its Application. 83-94
Volume 56, Number 2, April 2022
- Alexander M. Andronov, Iakov M. Dalinger:
Algorithms for the Analysis of Queueing System M/G/1/∞ with Cut-Off of the Line. 95-108 - Yupeng Liu, Yanan Zhang, Xiaochen Zhang:
Neural Translation System of Meta-Domain Transfer Based on Self-Ensemble and Self-Distillation. 109-119 - Anupama Jawale, Ganesh Magar:
Time Series Similarity Search Methods for Sensor Data. 120-129 - Tengteng Gao, Caihong Li, Guoming Liu, Na Guo, Di Wang, Yongdi Li:
Hybrid Path Planning Algorithm of the Mobile Agent Based on Q-Learning. 130-142 - Igor V. Shcherban, S. V. Ivanov, O. G. Shcherban:
An Evader Control Strategy in the Non-Linear Differential Game Problem with Terminal Limitations. 143-149 - Qingdang Li, Rui Xu, Mingyue Zhang, Zhen Sun:
Visual Tracking Method Based on Siamese Network with Multi-Feature Fusion. 150-159 - Y. K. Bharath:
Griffiths' Variable Learning Rate Online Sequential Learning Algorithm for Feed-Forward Neural Networks. 160-165 - Guangcheng Ge:
Analysis of Dynamic Characteristics of Man-Machine Co-Driving Vehicle during Driving Right Switching. 166-179 - Qin Liu, Yimin Wang, Birun Ye, Min Ding:
Recognition Confidence of Welding Seam Defects in TOFD Images Based on Artificial Intelligence. 180-188
Volume 56, Number 3, June 2022
- Wenjin Wang, Xinghua Liu, Miaomiao Lu, Jia Liu, Ping Jiang:
Intelligent Fuzzy Approach Based High-Performance Steganography in Wavelet Domain. 189-197 - Gehad Ismail Sayed:
A Novel Multi-Objective Rat Swarm Optimizer-Based Convolutional Neural Networks for the Diagnosis of COVID-19 Disease. 198-208 - Lida Zou:
Rapid Discovery Approach of Abnormal Stocks Based on Temporal Convolutional Autoencoder. 209-220 - Sergei I. Osadchy, Valerii A. Zozulya, I. A. Bereziuk, M. M. Melnichenko:
Stabilization of the Angular Position of Hexapod Platform on Board of a Ship in the Conditions of Motions. 221-229 - Mingyue Qiu, Xinmeng Wang, Yubao Wu, Anran Luo:
The Forecast of the Number of Police Cases Based on Time Series and Convolutional Neural Network Model. 230-238 - Satoshi Kitayama, Kohei Saito:
Time Series Prediction Using Radial Basis Function Network with Transformation of Training Data and Its Applications. 239-252 - Guotao Zhao, Jie Ding:
Research on Multi-Modal Image Target Recognition Based on Asynchronous Depth Reinforcement Learning. 253-260 - Chaimae Ouchicha, Ouafae Ammor, Mohammed Meknassi:
A Novel Deep Convolutional Neural Network Model for Alzheimer's Disease Classification Using Brain MRI. 261-271 - Lei Zhang, Fengbao Yang:
2D-VMD Embedded Fusion of Infrared Polarization and Intensity Images Using Muitiple-Algorithms Based on Their Complementary Relation. 272-282 - Jose Mekha, V. Parthasarathy:
An Automated Pest Identification and Classification in Crops Using Artificial Intelligence - A State-of-Art-Review. 283-290
Volume 56, Number 4, August 2022
- Hairong Wang, Dandan Wang, Xi Xu:
Research on the Construction Method of Rice Knowledge Graph. 291-299 - Ikram Remadna, Labib Sadek Terrissa, M. Sayah, Soheyb Ayad, Noureddine Zerhouni:
Boosting RUL Prediction Using a Hybrid Deep CNN-BLSTM Architecture. 300-310 - Liyi Zhang, Mingyue Fu, Teng Fei, Hongbo Li:
The Artificial Fish Swarm Algorithm Improved by Fireworks Algorithm. 311-323 - S. Banerjee, Atanu Panda, Indrajit Pandey, Parijat Bhowmick:
Parameter Estimation and Its Application on Designing Adaptive Nonlinear Model Based Control Schemes for the Time Varying System. 324-336 - Wei Li, Kai Zhang, Gang Lv, Huaichu Dai, Chunpeng Zhang:
An Improved Fuzzy Logic Control Method for Combine Harvester's Cleaning System. 337-346 - Haiyan Kang, Hao Zhang:
A New Improved Method for Online Credit Anti-Fraud. 347-355 - Ahmed Sahnoune, Daoud Berkani:
On Statistical Properties of Chaotic Signals Generated by Negative Sawtooth Maps. 356-363 - Rencun Dai:
Zero-Shot Image Classification Algorithm Based on SIF Fusion Semantic Tags. 364-373 - Vladimir N. Shashihin, Svetlana V. Budnik, Y. R. Kireeva:
Color Image Encryption Using Hyperchaotic Maps. 374-381
Volume 56, Number 5, October 2022
- Jingfang Zeng, Jieyu Li, Linlang Feng:
Face Recognition Based on Improved Residual Network and Channel Attention. 383-392 - Zhong-xun Wang, Zhan-kai Bao, Lingzeng Meng:
Application of LDPC Code Decoding Algorithm in Digital Watermarking. 393-402 - Jiangyi Qin, Kai Wang, Xianbin Li, Yong Jiang, Yuan Zuo:
A Software Defined High-Speed CameraLink Image Data Transmission System Based on Pixel Clock Recovery. 403-410 - Liu Mei, Alexander N. Dudin:
Analysis of Unreliable Retrial Queue with Heterogeneous Servers and Markovian Arrival Process. 411-420 - Boris Klepfish, Sergey Sokolov, Marianna Polyakova:
Synthesis of Stochastic Optimal Control Based on Nonlinear Probabilistic Criteria. 421-427 - Xiaofei Han:
A Novel Search Strategy-Based Deep Learning for City Bridge Cracks Detection in Urban Planning. 428-437 - Yanxiang Geng, Liyi Zhang, Jianing Guo, Yin Jiang:
Adaptive Bat Algorithm Based on Historical Population Control. 438-446 - Victor Vladimirovich Deryabin:
The Assessment of Ship Drift on the Basis of a Neural Network. 447-454 - Tianhua Chen, Elans Grabs, Ernests Petersons, Dmitry Efrosinin, Aleksandrs Ipatovs, Nikolajs Bogdanov, Dmitrijs Rjazanovs:
Multiclass Live Streaming Video Quality Classification Based on Convolutional Neural Networks. 455-466 - A. M. Aly, Pablo Chacón, H. Gol-Zaroudi, Jin-Woo Choi, George Z. Voyiadjis:
Proposed Practical Overheight Detection and Alert System. 467-480
Volume 56, Number 6, December 2022
- Liyi Zhang, Jinyan Tang, Ting Liu, Zuochen Ren:
An Improved Artificial Bee Colony Optimization Algorithm Based on Slime Mold and Marine Predator. 481-493 - Maryam Mohseni, Amin Ramezani, Mehdi Siahi:
Fault Estimation for a Class of Uncertain Nonlinear Descriptor Systems Using an Adaptive Observer. 494-508 - Weiqiang Tang, Wenkun Long, Tianpeng Xu, Haiyan Gao:
Multiple Model Adaptive Control of Nonlinear Systems Based on Dynamic Optimization. 509-518 - U. T. T. Hoang, Kim Dinh Thai, Hai Xuan Le, Dat Xuan Pham, Minh-Xuan Phan, Thien Van Nguyen:
Adaptive Fuzzy Hierarchical Sliding Mode Control for Ball Segway. 519-532 - Chong Liu, Xunian Yang, Lizhao Zheng, Xiaochen Hao:
The Decision Algorithm of Cement Mill Operation Index Based on Improved Differential Evolution Algorithm. 533-545 - Mehmet Bozuyla, Abdullah T. Tola:
Comparison of Metrocar System with Dual-Mode Transit Systems. 546-552 - Jiang Xiang Ju, Du Xiao Liang:
Railway Catenary Insulator Recognition Based on Improved Faster R-CNN. 553-563 - Yanpei Liu, Qi Zhu, Ningning Chen, Yunjing Zhu, Liping Wang:
Computing Offloading and Resource Optimization of Adaptive Data Block Size in Edge Environments. 564-576 - Ngoc Hung Nguyen, Cao Huu Tinh, D. V. Minh:
Real-Time Implementation of a Novel Automatic Gain Control Algorithm for Infrared Image Processing Based on MPSoC. 577-586 - Vladimir Aristov, Armands Ancans:
Transient Phenomena Analysis of Peak Detector for Nanosecond Pulse Amplitude Measurement. 587-594
Volume 56, Number 7, December 2022
- Petr Dmitrievich Borisov, Yury V. Kosolapov:
On the Characteristics of Symbolic Execution in the Problem of Assessing the Quality of Obfuscating Transformations. 595-605 - Frédéric Dadeau, Jean-Philippe Gros, Olga Kouchnarenko:
Online Testing of Dynamic Reconfigurations w.r.t. Adaptation Policies. 606-622 - Mikhail G. Dmitriev, Z. N. Murzabekov, G. A. Mirzakhmedova:
An Algorithm for Finding Feedback in a Problem with Constraints for One Class of Nonlinear Control Systems. 623-633 - Natalia Olegovna Garanina, Sergei P. Gorlatch:
Autotuning Parallel Programs by Model Checking. 634-648 - Anton R. Gnatenko, Vladimir A. Zakharov:
Satisfiability and Model Checking for One Parameterized Extension of Linear Temporal Logic. 649-660 - Leonid N. Kazakov, Evgeniy P. Kubyshkin, Ilya V. Lukyanov:
An Algorithm for Estimating the Signal Frequency at the Output of a Channel with a Controlled Information Flow under Phase Noise. 661-668 - Dmitry A. Kondratyev:
Towards Automatic Deductive Verification of C Programs with Sisal Loops Using the C-lightVer System. 669-687 - Alexander V. Korostil, Andrei V. Nikolaev:
Backtracking Algorithms for Constructing the Hamiltonian Decomposition of a 4-Regular Multigraph. 688-700 - E. V. Kuzmin, Oleg E. Gorbunov, Petr O. Plotnikov, Vadim A. Tyukin, Vladimir A. Bashkin:
An Algorithm for Correcting Levels of Useful Signals on Interpretation of Eddy-Current Defectograms. 701-710 - E. V. Kuzmin:
LTL-Specification of Counter Machines. 711-722 - E. V. Kuzmin, Oleg E. Gorbunov, Petr O. Plotnikov, Vadim A. Tyukin, Vladimir A. Bashkin:
Assessing Flaw Severity on Interpretation of Eddy-Current Defectograms. 723-734 - Ksenia V. Lagutina, Nadezhda S. Lagutina, Elena I. Boychuk:
Text Classification by Genres Based on Rhythmic Characteristics. 735-743 - Alla M. Manakhova, Nadezhda S. Lagutina:
Analysis of the Influence of Mixed-Level Stylometric Characteristics on the Verification of Authors of Literary Works. 744-761 - Andrew M. Mironov:
A Mathematical Model of Parallel Programs and an Approach to Verification of MPI Programs Based on the Proposed Model. 762-777 - Mikhail V. Nevskii:
On Properties of a Regular Simplex Inscribed into a Ball. 778-787 - Alexander V. Smirnov:
NP-Completeness of the Minimum Spanning Tree Problem of a Multiple Graph of Multiplicity k ≥ 3. 788-799 - Elena A. Tumanova:
Computational Analysis of Quantitative Characteristics of Some Residual Properties of Solvable Baumslag-Solitar Groups. 800-806 - Alexander V. Tymoshenko, Rasul A. Kochkarov, Azret A. Kochkarov:
Identification Conditions for the Solvability of NP-Complete Problems for the Class of Prefractal Graphs. 807-814 - Vladimir S. Vasilev, Alexander I. Legalov, Sergey V. Zykov:
Transformation of Functional Dataflow Parallel Programs into Imperative Programs. 815-827 - Yury V. Kosolapov:
Erratum to: On the Detection of Exploitation of Vulnerabilities That Leads to the Execution of a Malicious Code. 828
Volume 56, Number 8, December 2022
- Maria A. Poltavtseva, T. M. Andreeva:
Methods of Multidimensional Aggregation of Time Series of Streaming Data for Cyber-Physical System Monitoring. 829-837 - Tatiana M. Tatarnikova, I. A. Sikarev, Pavel Bogdanov, T. V. Timochkina:
Botnet Attack Detection Approach in IoT Networks. 838-846 - Alexander A. Grusho, Nikolai A. Grusho, Michael I. Zabezhailo, Elena E. Timonina:
Trust Evaluation Problems in Big Data Analytics. 847-851 - R. A. Ognev, E. V. Zhukovskii, Dmitry P. Zegzhda, A. N. Kiselev:
Detecting Malicious Executable Files Based on Static-Dynamic Analysis Using Machine Learning. 852-864 - A. I. Sergadeeva, Daria S. Lavrova, Dmitry P. Zegzhda:
Bank Fraud Detection with Graph Neural Networks. 865-873 - Maria A. Poltavtseva, V. A. Torgov:
Applying Distributed Ledger Technology to Auditing and Incident Investigation in Big Data Processing Systems. 874-882 - V. G. Anisimov, E. G. Anisimov, T. N. Saurenko, V. P. Los':
Performance Evaluation of Antivirus Systems for Computer Networks. 883-887 - A. A. Poltavtsev:
Reactive and Proactive Methods for Database Protection against Logical Inference Attacks. 888-897 - A. D. Fatin, E. Yu. Pavlenko:
Immunization of Complex Networks: Topology and Methods. 898-905 - E. Yu. Pavlenko:
Systematization of Cyber Threats to Large-Scale Systems with Adaptive Network Topology. 906-915 - V. D. Danilov, T. D. Ovasapyan, Denis V. Ivanov, Artem S. Konoplev, Dmitry A. Moskvin:
Generation of Synthetic Data for Honeypot Systems Using Deep Learning Methods. 916-926 - Vasiliy M. Krundyshev, Maxim O. Kalinin:
Mathematical Model of the Spread of Computer Attacks on Critical Information Infrastructure. 927-933 - E. A. Rudnitskaya, Maria A. Poltavtseva:
Adversarial Machine Learning Protection Using the Example of Evasion Attacks on Medical Images. 934-941 - E. Yu. Pavlenko, A. D. Fatin:
Immunization of Complex Networks: System of Differential Equations and Dynamic Variation. 942-946 - N. N. Shenets:
Authentication and Key Establishment in WSN Based on Key Predistribution. 947-956 - E. Yu. Pavlenko, I. S. Eremenko, A. D. Fatin:
Computer Network Clustering Methods in Cybersecurity Problems. 957-963 - E. V. Zavadskii, D. V. Ivanov:
Counteracting Information Threats Using Honeypot Systems Based on a Graph of Potential Attacks. 964-969 - Vladimir Ruchkin, Boris V. Kostrov, Vladimir Fulin:
Intelligent Security Strategy Based on the Selection of the Computer and Neural Network Architecture. 970-980 - Ilya S. Lebedev, Mikhail E. Sukhoparov:
Using Information about Influencing Factors to Split Data Samples in Machine Learning Methods for the Purposes of Assessing Information Security. 981-987 - Maxim V. Shakurskiy:
Two-Component Steganographic System for Embedding Information into Least Significant Bits of Audio Signals. 988-993 - O. I. Berezovskaya, S. S. Chuprov, E. A. Neverov, E. R. Sadreev:
Review and Comparison of Lightweight Modifications of the AES Cipher for a Network of Low-Power Devices. 994-1006 - Vladimir N. Kustov, Alexei G. Krasnov:
Noise-Resistant Coding and Highly Undetectable Stegosystems - Is the Alliance Successful? 1007-1015 - E. Yu. Pavlenko:
Functional Model of Adaptive Network Topology of Large-Scale Systems Based on Dynamical Graph Theory. 1016-1024 - Ivan R. Fedorov, A. V. Pimenov, G. A. Panin, Sergei V. Bezzateev:
Blockchain Technology in 5G Networks: Performance Comparison of Private and Public Blockchains. 1025-1029 - Maksim V. Gofman:
Noise-Immune Marking of Digital Audio Signals in Audio Stegosystems with Multiple Inputs and Multiple Outputs. 1030-1039 - Vasiliy M. Krundyshev, Maxim O. Kalinin:
Adaptive Control System for Detecting Computer Attacks on Objects of Critical Information Infrastructure. 1040-1048
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.