


default search action
Automatic Control and Computer Sciences, Volume 59
Volume 59, Number 1, February 2025
- Jingjing Sun:

Design of Transplanting Machinery Automation Based on Position-Velocity PID Double Closed-Loop Control Algorithm. 1-12 - Ali Khudhair Al-Jiboory, Zaid S. Hammoudi:

Active Control of Vehicle Suspension System with Robust Control. 13-26 - Ruiting Xu, Hui Hu, Fan Qu, Ying Chen, Long Peng, Jiande Yan, Peng Guo, Bozhi Chen:

Maximum Power Point Tracking Control of Wind Turbine Based on Neural Network Model Reference Adaptive Control. 27-38 - Nguyen Thi Thu Dung

, Liudmila V. Chernenkaya:
A Forecasting Model Fuzzy Time Series Type 2 with Hedge Algebraic and Genetic Optimization Algorithm. 39-51 - Chunxiang Liu, Tianqi Cheng, Xinping Guo, Yuwei Wang, Lei Wang:

An Effective Point Cloud Simplification Method Based on the Harris-SIFT Feature and Improved Voxel Filtering. 52-62 - Vasanthakumar Sekar

, K. Senthilkumar, K. Srinivasan:
Event-Triggered Orthogonal Estimator Design for Cloud Communication Based Unmanned Aerial Vehicle System. 63-77 - Weiqiang Tang, Chengchao Jia, Wenke Shi, Tianpeng Xu

, Haiyan Gao:
Fixed-Time Observer-Based Sliding Mode Control of Air-Breathing Hypersonic Vehicles Subject to Multisource Uncertainties and Actuator Faults. 78-90 - Sripriya Arunachalam:

An Effective Security Enhancement Scheme for Postquantum Cryptography Based Blockchain Networks in Cloud Computing. 91-101 - Xin Zhang, Shaojun Qin:

An Adaptive Fast Sliding Mode Control for Trajectory Tracking of Robotic Manipulators. 102-115 - Zhanjiang Li, Xueting Ren, Hua Tao:

Optimal Prediction Model of Default Probability Based on Multiple Machine Learning Methods. 116-125
Volume 59, Number 2, April 2025
- Nimish Kumar, Rahul Raman:

Efficient Approach for Solving Economic Load Dispatch Problems of Hybrid Renewable Energy System Using Particle Swarm Optimization Algorithm. 127-137 - Cuicui Cai, Maosheng Fu, Fenghui Zhang, Mingjing Pei, Jing Zhang:

A Modified Subtraction Average-Based Optimizer for Solving Optimization Problems. 138-149 - Fargana J. Abdullayeva

, Suleyman Suleymanzade
:
Estimating Page Ranks with Inductive Capability of Graph Neural Networks and Zone Partitioning in Information Retrieval. 150-163 - Yueting Liu, Weihua Meng:

Research on PID Parameter Tuning Based on SIMCDE-RBF Algorithm. 164-177 - Sukanta Chakraborty

, Abhishek Majumder:
HBbITL: A Hierarchical Blockchain Based Secure Intelligent Traffic Light System. 178-193 - Hejun Zhou:

Differential Privacy and Multilayer Grouping Consensus Algorithm for Social Network Privacy and Security Management. 194-205 - Kulvinder Singh

, Sanjeev Dhawan, Sarika Gambhir:
Utilizing Artificial Intelligence to Detect Fraudulent Manipulation in Recommender Systems. 206-218 - Brahim Issaoui

, Issam Zidi
, Salim El Khediri, Rehan Ullah Khan:
Empowering Home Health Care: Precision Unleashed with an Innovative Hybrid Machine Learning Approach for Tailored Patient Classifications. 219-229 - Shanghu Zhou, Bingyu Mo, Yanjiao He, Menglong Han, Pengsheng Xie, Peixuan Li:

Analysis and Research of Unbalanced Transformer Insulation Oil Monitoring Data Using Machine Learning Methods. 230-243 - G. M. Siddesh, S. R. Mani Sekhar

, K. G. Srinivasa:
Detection of Anomalies in Docker-Based Containers through Monitoring. 244-254 - Ajay Waghumbare, Upasna Singh:

DIAT-DSCNN-GRU-HARNet: A Lightweight DCNN for Video Based Classification of Human Activities. 255-265 - Haifeng Wang:

Design and Application of Interactive Drawing Teaching System Based on Artificial Intelligence Technology. 266-277
Volume 59, Number 3, June 2025
- Lanfeng Chen, Dinyyu Xue, Xinshu Cui:

Modeling and Control Research of Fractional-Order Memristor Based on Optimization Algorithm in Frequency Domain. 279-286 - Ying Fang:

Design of Experimental Simulation Test Bed for Regenerative Braking System. 287-296 - Khandakar Md Shafin, Saha Reno:

Resolving the Trilemma Challenge in Blockchain: An Integrated Consensus Mechanism for Balancing Security, Scalability, and Decentralization. 297-316 - Boqiang Cao:

Load Balancing Algorithms for Comparative Pattern Mining. 317-327 - Pavel A. Lyakhov, Uliana A. Lyakhova, Diana I. Kalita:

Ensemble System for Skin Cancer Detection Based on the Analysis of Heterogeneous Dermatological Data Using Multimodal Neural Networks. 328-339 - Ping Xu

, Shuangfei Zhang:
Design of Monitoring and Control System of Hydraulic Pump Station Based on Internet of Things. 340-348 - Islem Mansri, Nasreddine Kouadria, Ahcen Aliouat, Noureddine Doghmane:

A Comparative Evaluation of Various HEVC Implementations in Error-Prone Environments. 349-354 - Ying Cheng, Hongwei Li, Tao Meng, Lu Bai, Yan Li:

Feature Extraction and Recognition Based on Integrated Material Painting Images. 355-367 - V. Aristov:

Slow Sawtooth Voltage in a Stroboscopic Converter of a Georadar Receiver. Effect of Its Nonlinearity on Signal Distortions. 368-375 - Qiang Fu:

Design of Real Time Target Tracking Method for Film and Television Video Based on Deep Learning under Visual Communication. 376-388 - Vipin Jain, Shilpa Agnihotri Pandey, Ankit Chakrawarti

, Rahul Sharma, Vinod Patidar
:
A Novel Stack Ensemble Learning Techniques for Sentiment Classification in Climate Change Discourse. 389-401 - Yun Zhou:

The Application of Deep Network and Reinforcement Learning for Art Design in Graphical User Interface Wireframe Generation. 402-415
Volume 59, Number 4, August 2025
- Qingqin Fu, Zhengquan Ang, Fan He, Pingjiang Xu, Guanglun Yang:

A Secure Operation Method Based on Secure Chip Identity Authentication. 417-425 - Haiming Sun, Yicheng Cao, Chuan Sun, Fengxiang Jia, Junru Yang, Haoran Li, Fei Li:

A Path Planning Method for Test Scenarios of an Autonomous Vehicle in Closed Test Site. 426-435 - Dashqin Nazarli

, Nadir Aghayev:
Forecasting Model for Nonscheduled Passenger Air Transportation Using Traditional Statistical and Fuzzy Logic Approaches. 436-443 - Yuehua Li, Zhangyan Yao, Yuyang Gu, Bin Hu:

A Weed Detection Algorithm Based on Improved YOLOv5S. 444-454 - Bo Jiang:

The Application of Vue.js Framework Technology in Multidomain Automated Testing Systems. 455-466 - Zakaria Bellahcene

, Abdelmalek Laidani, Assia Belherazem, Mohamed Bouhamida:
Robust Adaptive Controller Design Based on Neural Networks for a Remotely Operated Underwater Vehicle (ROV). 467-480 - Senyang Lu, Ziyan Yue:

Application of Image Search System Based on CPU Parallel Computing in Smart Home Design. 481-491 - Jinfeng Ding, Mingliang Zheng:

A New Combination Algorithm for Harmonic Detection and Disturbance Analysis of Power Quality. 492-502 - Atul Kumar Uttam

, Rohit Agarwal, Anand Singh Jalal:
Unsupervised Divergence-Based Domain Adaptation for Fingerprint Presentation Attack Detection. 503-515 - Di Wu, Zihan Chen:

Graph Embedded Extreme Learning Machine Autoencoder with Multilayer Cyclic Structure. 516-529 - Jianming Ye, Tao Kan:

Image Dehazing Algorithm Based on Multiscale Residual and Attention Mechanism. 530-540 - XiaoYong Li, Qing Jiang, Jing Zhang, ZeQun Zhang, JianWen Zhang:

Multiobjective Optimal Trajectory Planning for Robotic ARMS Based on PAD-MOPSO. 541-550 - Xiangyu Guo:

Accurate Translation of English - Based on LSTM Algorithm and Part-of-Speech Auxiliary. 551-559
Volume 59, Number 6, December 2025
- Yunming Wang, Jiacai Gao, Xianwu Chu, Xinping Wang, Jinbo Tang:

Temperature Prediction Model of High-Speed Train Traction Motor Based on SE-BILSTM-CNN. 697-707 - Wamidh Jalil Mazher

, Wamidh K. Mutlag
, Hadeel Tariq Ibrahim
, Osman Nuri Uçan:
MPA + SVM: An Active Feature Selection Approach in High-Dimensional Data Sets. 708-719 - Weiqiang Tang, Peng Tian, Chengbin Wang, Haiyan Gao:

Sliding Mode Predictive Control of Flexible Air-Breathing Hypersonic Vehicles. 720-732 - P. Vinothiyalakshmi, F. Geetha, B. Abirami, S. Bhavya:

Job Failure Prediction and Recommendation System to Prevent Job Failure in Cloud Computing Environment. 733-746 - Huanyou Wang, Guangqi Xie, Gui Jin:

Three-Dimensional Path Planning of Unmanned Aerial Vehicles Based on Improved Ant Colony Algorithm. 747-755 - Arpit Sharma, Jagdeep Singh Lather:

Gain Scheduling of Backstepping Sliding Mode Controller Using Interval Type-2 Fuzzy Logic Approach for Quadcopter. 756-770 - Si Chen:

A Multimodal Fake News Detection Method Combining Adaptive Graph Convolutional Networks. 771-782 - Abdul Mazid, Sheeraz Kirmani, Manaullah Abid:

Enhanced Network Intrusion Detection Framework Using Deep Convolutional Neural Networks. 783-797 - Xuan Huang:

Chaotic Digital Image Encryption Algorithm Based on Compressive Sensing. 798-810 - Lan Li, Yun Zhang, Guoliang Lin, Chengjun Xu:

Image Superresolution Reconstruction Method Research Based on Improved Residual Network. 811-818 - Kulvinder Singh, Sanjeev Dhawan, Manoj Yadav:

Cinescope: An Intelligent Context-Aware Movie Recommendation System for Enhancing Viewer Experience. 819-831 - Xue Li:

A Scene-Based Multimodal Video Similarity Detection Algorithm. 832-845 - Hao Hu, Fuzhou Feng, Lei Jiang, Junzhen Zhu:

Research on Diesel Engine Signal Noise Reduction Based on Zero Space Tracking Algorithm. 846-857
Volume 59, Number 7, December 2025
- Maxim V. Neyzov, E. V. Kuzmin

:
Verification of Declarative LTL Specification of Control Program Behavior. 859-876 - N. V. Gaianov:

Mathematical Properties of the Agent-Based Model of Extinction-Recolonization for Population Genetics. 877-884 - Yu. V. Kosolapov

, T. A. Pavlova:
On the Study of One Way to Detect Anomalous Program Execution. 885-894 - Leonid Y. Bystrov

, A. N. Gladkov, E. V. Kuzmin
:
Suppression of Additive Periodic Low-Frequency Interference on Eddy-Current Defectograms. 895-909 - Maria D. Averina, Olga A. Levanova

, D. V. Grushevskaya, K. A. Kukharev, Dmitry M. Murin
, M. A. Kalinin:
UAV Detection Using Neural Networks. 910-919 - N. S. Lagutina

, Ksenia V. Lagutina, V. N. Kopnin:
Automatic Determination of Semantic Similarity of Student Answers with the Reference Answer Using Modern Models. 920-928 - Dmitry Morozov

, I. A. Smal, Timur Garipov, Anna V. Glazkova
:
Keywords, Morpheme Parsing, and Syntactic Trees: Features for Text Complexity Assessment. 929-940 - Anatoliy Y. Poletaev

, Ilya V. Paramonov
, E. M. Kolupaev:
Methods of Implicit Aspect Detection in Russian Publicistic Texts. 941-950 - Maxim V. Neyzov, E. V. Kuzmin

:
LTL Specification for the Development and Verification of Logical Control Programs in Feedback Systems. 951-984 - Ilya A. Surov

:
Matrix-Qubit Algorithm for Semantic Analysis of Probabilistic Data. 985-995 - Mikhail V. Nevskii

:
Estimation of Interpolation Projectors Using Legendre Polynomials. 996-1014 - Alexander V. Smirnov

:
Some Polynomial Subclasses of the Eulerian Walk Problem for a Multiple Graph. 1015-1031 - Anatoliy Y. Poletaev

, Ilya V. Paramonov
, Elena I. Boychuk
:
Methods for Sentiment Detection toward Aspects of Economic and Social Development in Russian Sentences. 1032-1047 - Ivan M. Chernenko

, Igor S. Anureev
:
Pattern-Based Approach to the Automation of Deductive Verification of Process-Oriented Programs: Patterns, Lemmas, and Algorithms. 1048-1081 - Maxim V. Neyzov, E. V. Kuzmin

:
Using TLA+/TLC for Modeling and Verification of Cryptographic Protocols. 1082-1104 - Natalia Olegovna Garanina

:
An Exact Schedulability Test for Real-Time Systems with an Abstract Scheduler on Multiprocessor Platforms. 1105-1124 - E. V. Grigorieva

, D. V. Glazkov
, Anna O. Tolbey
:
Algorithm for Constructing the Asymptotics of Periodic Solutions in Laser Models with a Rapidly Oscillating Delay. 1125-1131 - Dmitry Chalyy

:
Extremal Estimates of the Wiener Index for Weakly Connected Directed Graphs. 1132-1143 - M. A. Iordanski

:
Dominating Sets with Neighborhoods for Trees. 1144-1151 - Nadezhda S. Lagutina

, Ksenia V. Lagutina:
A Survey of Models for Automatic Assessment of Similarity of Student's Answer to the Reference Answer. 1152-1169 - A. V. Melnikova, Marina S. Vorobeva

, Anna V. Glazkova
:
Comparison of Pretrained Models for Domain-Specific Entity Extraction from Student Report Documents. 1170-1180 - V. Y. Mamedov, D. A. Kovalevsky, Dmitry Morozov

, S. S. Stolyarov, Sergei Ospichev
:
Hierarchical Classification of Scientific Articles Using Deep Learning (Using the UDC Hierarchy As an Example). 1181-1192
Volume 59, Number 8, December 2025
- A. F. Suprun, Yu. V. Vedernikov, A. Yu. Gar'kushev, A. V. Lipis:

Reconfiguration of the Development Model of an Information Security Management System: Interaction between Core Modules and the Operator. 1193-1200 - V. O. Erastov, E. A. Zubkov, D. P. Zegzhda:

Study of the Problems of Information-Security Auditing of Geographically Distributed Internet-of-Things Devices. 1201-1208 - V. L. Gorbunov, A. I. Faizullina:

Predictive Analysis of Information Flows in Information Security Systems of Telecommunication Complexes. 1209-1216 - Vasiliy M. Krundyshev, A. K. Skrypnikov, Maxim O. Kalinin:

Network Traffic Anonymization in Blockchain Systems Based on Garlic Routing. 1217-1223 - Daria S. Lavrova, P. D. Bezborodov:

Protection of Neural Network Models from Privacy Breach Threats in Federated Learning Using Optimization Methods. 1224-1229 - Sergey V. Bezzateev, I. S. Velichko:

From Exploitation to Protection: Analysis of Attacks on Large Language Models. 1230-1241 - Vasiliy M. Krundyshev, V. K. Cheskidov, Maxim O. Kalinin:

Trust-Model-Based Method for Protecting Global Models in Federated Learning Systems. 1242-1252 - R. A. Ognev, Dmitry P. Zegzhda:

Generalized Method for Comparative Analysis of Fuzz-Testing Tools. 1253-1259 - Andrei D. Dakhnovich, A. A. Lyrchikov, Dmitry A. Moskvin:

Automated Method for Evaluating the Correctness of Distributed Algorithms Using Chaos Engineering Testing. 1260-1269 - E. Yu. Pavlenko, I. A. Anoshkin:

Automated Software Security Analysis for the Android OS. 1270-1277 - T. D. Ovasapyan, D. A. Gavrichkov, Denis V. Ivanov:

Fuzz Testing of Closed-Source Software Using Large Language Models. 1278-1284 - P. O. Semenov, S. A. Yudin, G. S. Kubrin:

Automated Security Scanning and Analysis of Container Images. 1285-1291 - E. Yu. Pavlenko, M. S. Ivanov:

Analysis of Malware Detection Methods Using Large Language Models and eBPF Technology. 1292-1299 - A. S. Cherevan', A. P. Lapsar':

Method for Detecting Latent Vulnerabilities at the Final Stage of Software Development. 1300-1306 - E. V. Zhukovskii, V. A. Bugaev, A. A. Lyrchikov:

Detection of Potentially Malicious Activities in CI/CD Pipelines Based on Build Agent Behavior Analysis. 1307-1314 - M. A. Finoshin, I. D. Ivanova, I. Yu. Zhukov, A. V. Zuikov:

Memory-Based Covert Channels in the TLS Protocol. 1315-1321 - Maxim O. Kalinin, Vasiliy M. Krundyshev, O. S. Vasil'ev:

Ensuring Byzantine Fault Tolerance of a Distributed Ledger in a Smart City Based on a Trust Model. 1322-1327 - M. A. Pakhomov:

Model of Interaction of Mobile Ad Hoc Network Nodes Taking into Account Protection against Active Network Attacks. 1328-1337 - T. D. Ovasapyan, D. A. Ponomarev, Denis V. Ivanov, E. V. Zavadskii:

Detection of Honeypot Systems Based on a Comprehensive Analysis of Node Performance Indicators. 1338-1344 - Daria S. Lavrova, A. A. Zyryanova, A. A. Lyrchikov:

Detecting the Spread of False News Content Using Machine Learning. 1345-1356 - V. V. Platonov, A. F. Suprun, Ya. E. Yanbarisova, V. G. Anisimov:

Application of a Genetic Algorithm for Selecting Neural Network Hyperparameters. 1357-1363 - I. A. Sikarev, Tatiana M. Tatarnikova, Vyacheslav M. Abramov:

Combination of Methods for Selective Teacher Intervention in the Student's Learning Process and Low-Rank Adaptation in the Knowledge Distillation Models. 1364-1370 - Elena B. Aleksandrova, S. O. Kostin:

Multisignature on Isogenies of Elliptic Curves with Participant Masking and Authentication. 1371-1376 - V. O. Mironkin, N. A. Yurasov:

On the Applicability of the Chi-Square Statistic in the Problem of Determining the Parameters of Block Encryption Algorithms. 1377-1386 - Elena B. Aleksandrova, D. M. Samareva:

Lattice-Based Commitment Scheme for Proving Linear Relations between Hidden Values. 1387-1394 - N. N. Shenets, Elena B. Aleksandrova, Artem S. Konoplev, N. V. Gololobov:

Key Pre-Distribution Technique Using Shamir's Secret Sharing Scheme. 1395-1402 - Maksim V. Gofman, Anatoly Kornienko:

Method for Predicting the Correlation Properties of Marker Bipolar Sequences in Digital Watermarking Using the Patchwork Method. 1403-1414 - Maria A. Poltavtseva, A. V. Bolokan, P. V. Semyanov:

Countering Illegitimate Activations of a Smart Voice Assistant. 1415-1425 - P. E. Yugai:

Study of Adversarial Attacks on Classical Machine Learning Models in the Context of Network Threat Detection. 1426-1439 - A. I. Bezborodko, M. A. Prisich:

Application of Convolutional Neural Networks to Increase the Security Level of Steganographic Methods. 1440-1447 - Maria A. Poltavtseva, E. S. Lavrenko:

Intelligent Data Analysis and Processing for Detecting Insider Data Confidentiality Breaches in a DBMS. 1448-1456 - T. D. Ovasapyan, T. A. Bondarenko, A. A. Piskov:

Using Entropy Metrics to Detect Data Integrity Attacks in Real Time. 1457-1463 - Maria A. Poltavtseva, O. A. Izotova, Denis V. Ivanov, Dmitry P. Zegzhda:

Optimization of Data Obfuscation in Big Data Processing and Storage Systems. 1464-1474 - I. Yu. Zhukov, E. E. Balashova, A. P. Mandrov, N. D. Kravchenko:

Construction of a Semantic Space of Intentionalities Using Generative Pretrained Models to Solve the Problem of Spam Filtering. 1475-1483 - Maxim O. Kalinin, Artem S. Konoplev:

Protecting Smart City Blockchain Systems from Selfish Mining Attacks. 1484-1490 - E. V. Zavadskii:

Ensuring the Cybersecurity of the Functional Network of CII Facilities Using the Optimal Honeypot Node Deployment Strategy. 1491-1496 - F. G. Pashaev, S. E. Pashaeva, N. A. Maksudova:

Optimization of a Search Information System in a Database of Directive Documents. 1497-1503 - S. V. Kornienko, S. E. Adadurov, Anatoly Kornienko, E. D. Osipenko:

Analysis of the Potential for Using Biometric Characteristics to Identify Insider Threats Based on Psycho-Emotional State. 1504-1511 - M. A. Pakhomov, E. Yu. Pavlenko, Daria S. Lavrova:

Architecture of a Software System for Protecting Wireless Ad Hoc Networks from Active Network Attacks. 1512-1518 - E. Yu. Pavlenko, N. N. Samarin:

Artificial Immunization in Hierarchical and Peer-to-Peer Networks to Protect Against Cyber Threats. 1519-1526 - Sergey V. Bezzateev, A. V. Blinov:

Protection of DevOps Pipelines: Automation of Security within DevSecOps. 1527-1535 - Andrei D. Dakhnovich, V. M. Bogina, A. A. Makeeva:

Application of Large Language Models in the Problem of Event Forecasting. 1536-1543

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














