The Impulse-Refractive Mode in a Neural Network with Ring Synaptic Interaction
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411618070210
Optimization of URL-Based Phishing Websites Detection through Genetic Algorithms
来源期刊:Autom. Control. Comput. Sci.DOI:10.3103/S0146411619040102
On Optimal Interpolation by Linear Functions on n-Dimensional Cube
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411618070283
On Bikes in Smart Cities
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619010085
Complicated Dynamic Regimes in a Neural Network of Three Oscillators with a Delayed Broadcast Connection
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411618070349
User Mobility in a 5G Cell with Quasi-Random Traffic under the Complete Sharing and Bandwidth Reservation Policies
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619040047
Using Codes with Summation of Weighted Bits to Organize Checking of Combinational Logical Devices
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619010061
Design of Printed log-Periodic Antennas for Long Range Communication within a Wireless Sensor Network for Sea Water Quality Monitoring
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619040059
Codes in a Dihedral Group Algebra
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619070198
LSTM-Based Robust Voicing Decision Applied to DNN-Based Speech Synthesis
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619040096
Optimal Robust Control of a Robots Group
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619040084
PSO-based Load Balancing Method in Cloud Computing
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619010024
Modular Design of Mobile APP Interface Based on the Visual Flow
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619010127
Poetology: Problems of Constructing a Thesaurus and Verse Text Specification
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619070253
Estimating the Average Temporal Benefit in Probabilistic Environmental–Economic Models
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619070174
Model of Cyberattacks on Digital Production Systems
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619080236
Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S014641161908008X
Asymptotical Distributions of Eigenvalues of Periodic and Antiperiodic Boundary Value Problems for Second-Order Differential Equations
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411618070143
Security Infrastructure of FANET Based on Secret Sharing and Authenticated Encryption
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619080297
Word Embedding for Semantically Related Words: An Experimental Study
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619070083
Analysis of the Security of UEFI BIOS Embedded Software in Modern Intel-Based Computers
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619080224
Sampling and Estimating the Waveform of Analog Signals Based on Precision Event Timing
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619020056
Face Recognition Based on the Coefficient Tree for Three Scale Wavelet Transformation
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619080315
Investigation of a Markov Model for Computer System Security Threats
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411618070180
Sensor Fault Isolation in a Liquid Flow Process Using Kalman Filter
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619040072
Forecasting the State of Components of Smart Grids for Early Detection of Cyberattacks
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619080133
The Spanning Tree of a Divisible Multiple Graph
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411618070325
Using Hybrid Discriminative-Generative Models for Binary Classification
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619040023
Application of an Artificial Neural Network for Detection of Attacks in VANETs
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619080194
Influence of Nonlinearity of Fast Sawtooth Voltage on Stroboscopic Transformation of Signals in Receivers of Sensors Locators
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619040035
Clarification of the Properties of a Tree Centroid
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411618070040
Application of Walsh Spectral Representations in Soft Computing
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619020093
On the Support Splitting Algorithm for Induced Codes
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619070125
Practical Prediction of CFO-Made OFDM Symbol Distortion
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619040060
Identifying Cyberthreats in Modern Industrial Systems by Means of Deep-Learning Networks
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S014641161908011X
Probabilistic Analysis of Tournament Organization Systems
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619070290
Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619080339
Mobile Robot Performance at Restricted Energy and Autonomy
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619010048
Organization of the Quantum Cryptographic Keys Distribution System for Transportation Infrastructure Users
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619080042
The Automation of C Program Verification by the Symbolic Method of Loop Invariant Elimination
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619070101
Security Protection of System Sharing Data with Improved CP-ABE Encryption Algorithm under Cloud Computing Environment
来源期刊:Autom. Control. Comput. Sci.DOI:10.3103/S0146411619040114
Lipoma Arborescens: A Rare Extra-Articular Manifestation of Extensor Tendons of the Wrist
来源期刊:Automatic Control and Computer SciencesDOI:10.33552/accs.2019.01.000524
Model for Identifying Cyber Threats to Internet Information Resources
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619080170
Invasive Ductal Carcinoma of the Axillary Tail: Reportof three Cases and Review of the Literature
来源期刊:Automatic Control and Computer SciencesDOI:10.33552/ACCS.2019.01.000519
Erratum to: Estimating the Speed of an Integrated Wireless Network for Transportation Applications
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619050080
Parameter Identification of Induction Motor by Using Cooperative-Coevolution and a Nonlinear Estimator
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619050092
Even Simple π-Calculus Processes Are Difficult to Analyze
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619070022
Detection of Information Security Breaches in a Digital Production System Based on the Component Interaction Model
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619080248
Estimating the Probability of a Checksum Error in a Message
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619080066
Trellis-Based Postprocessing for Short Delay Measurement Using NDFT
来源期刊:Automatic Control and Computer SciencesDOI:10.3103/S0146411619030039