Study on Applications of Reversible Information Hiding Algorithms Based on Discrete Cosine Transform Coefficient and Frequency Band Selection in JPEG Image Encryption Yingwei Gao OriginalPaper 06 May 2024 Pages: 216 - 225
Clustering of Image Covariance Matrixes on Lie Group Manifold Mingliang Zheng OriginalPaper 06 May 2024 Pages: 209 - 215
Performance Evaluation of Machine Learning Models for Multiple Chronic Disease Diagnosis Using Symptom Data Kulvinder SinghSanjeev DhawanDeepanshu Mehla OriginalPaper 06 May 2024 Pages: 195 - 208
Diesel Engine Fault Diagnosis Based on Convolutional Autoencoder Using Vibration Signals Feng XuShuli JiaLiyong Ma OriginalPaper 06 May 2024 Pages: 185 - 194
Localization in Wireless Sensor Networks by Hybridization between Optimization Algorithms of Particle Swarms and Fruit Flies S. RabhiF. SemchedineN. Mbarek OriginalPaper 06 May 2024 Pages: 177 - 184
BCNN: An Effective Multifocus Image fusion Method Based on the Hierarchical Bayesian and Convolutional Neural Networks ChunXiang LiuYuwei WangXinping Guo OriginalPaper 06 May 2024 Pages: 166 - 176
Secure and Efficient Traffic Obfuscation Scheme for Deduplicated Cloud Storage Jay DaveNikumani Choudhury OriginalPaper 06 May 2024 Pages: 153 - 165
Speed Control of Permanent Magnet Synchronous Motor Using Xilinx System Generator Chafa MohamedMessaoudi KamelLouze Lamri OriginalPaper 06 May 2024 Pages: 142 - 152
Unanticipated Fault Detection and Isolation of Telescope Drive System Based on Luenberger Observer and Axes Transformation Zhuangzhuang DengShihai YangRuiqiang Liu OriginalPaper 06 May 2024 Pages: 131 - 141
Model-Based Faults Diagnostics of Single Shaft Gas Turbine Using Fuzzy Faults Tolerant Control Hakim BaguaBelgacem Said KhaldiIlhami Colak OriginalPaper 06 May 2024 Pages: 117 - 130
Extraction and Analysis of Semantic Features of English Texts under Intelligent Algorithms Shuangshuang Yu OriginalPaper 07 March 2024 Pages: 109 - 115
Monostatic Pulsed Ultrawideband Radar Antenna for Studying Biological Rhythms of the Human Body and Internal Inhomogeneities of Dielectric Objects V. Aristov OriginalPaper 07 March 2024 Pages: 101 - 108
Research on GDR Obstacle Detection Method Based on Stereo Vision Jing HouMeimei ChenBin Hong OriginalPaper 07 March 2024 Pages: 90 - 100
Research and Design of an Intelligent Street Lamp Control System Based on NB-IoT Yijun MaiMingjing LiZhenyao Su OriginalPaper 07 March 2024 Pages: 78 - 89
Eamlm: Enhanced Automated Machine Learning Model for IoT Based Water Quality Analysis with Real-Time Dataset D. Senthil KumarS. S. ArumugamDaisy Merina R. OriginalPaper 07 March 2024 Pages: 66 - 77
Analysis of Employment Information of University Graduates through Data Mining Lihui Hu OriginalPaper 07 March 2024 Pages: 58 - 65
Fixed Time Adaptive Fuzzy Control of Nonlinear Systems with Time-Varying State Constraints Kexin DingXueliang ZhangMin Zhuang OriginalPaper 07 March 2024 Pages: 43 - 57
Sensors and Machine Learning Algorithms for Location and POSTURE Activity Recognition in Smart Environments Zhoe Comas-GonzálezJohan MardiniDaniela Ospino-Balcázar OriginalPaper 07 March 2024 Pages: 33 - 42
Research on Multisensor Data Fusion Model for Monitoring Animal Breeding Environment Hanhua Yang OriginalPaper 07 March 2024 Pages: 23 - 32
Numerical Analysis of Pneumatic Regenerative Braking System Yongcun Zhu OriginalPaper 07 March 2024 Pages: 11 - 22
Elaborated Analysis of a Nonreplenishable Queue with Erlang Distribution of the Service Time Alexander M. AndronovKristina Mahareva OriginalPaper 07 March 2024 Pages: 1 - 10
Application of Machine Learning Methods to the Problem of Searching for a Region of Interest for Biometric Identification Based on the Pattern of Palm Veins A. I. AlmuhamedovV. S. Kolomoitcev OriginalPaper 29 February 2024 Pages: 1126 - 1134
A Method of Network Access Control for Ensuring Network Infrastructure Security Based on Severing Superfluous Network Connectivity A. D. ShilovaA. A. Vorob’eva OriginalPaper 29 February 2024 Pages: 1116 - 1125
Probabilistic Approach to Estimate the Cyber Resistance of Mobile Networks Based on Their Connectivity D. S. LavrovaV. M. BoginaE. Yu. Pavlenko OriginalPaper 29 February 2024 Pages: 1103 - 1115
Data Modeling in Big Data Systems Including Polystore and Heterogeneous Information Processing Components M. A. Poltavtseva OriginalPaper 29 February 2024 Pages: 1096 - 1102
Analysis and Forecasting of States of Industrial Networks with Adaptive Topology Based on Network Motifs E. Yu. Pavlenko OriginalPaper 29 February 2024 Pages: 1084 - 1095
Method for the Adaptive Neutralization of Structural Breaches in Cyber-Physical Systems Based on Graph Artificial Neural Networks E. B. AleksandrovaA. A. Shtyrkina OriginalPaper 29 February 2024 Pages: 1076 - 1083
Improving the Quality of the Identification of the Information Security State Based on Sample Segmentation M. E. SukhoparovI. S. Lebedev OriginalPaper 29 February 2024 Pages: 1071 - 1075
Framework for Modeling Security Policies of Big Data Processing Systems M. A. PoltavtsevaD. V. IvanovE. V. Zavadskii OriginalPaper 29 February 2024 Pages: 1063 - 1070
Graph-Based Self-Regulation for Different Types of Networks with Adaptive Topology E. Yu. PavlenkoM. A. Pakhomov OriginalPaper 29 February 2024 Pages: 1055 - 1062
Early Detection of Network Attacks Based on Weight-Insensitive Neural Networks D. S. LavrovaO. A. Izotova OriginalPaper 29 February 2024 Pages: 1047 - 1054
Cyberattack Detection in the Industrial Internet of Things Based on the Computation Model of Hierarchical Temporal Memory V. M. KrundyshevG. A. MarkovA. G. Busygin OriginalPaper 29 February 2024 Pages: 1040 - 1046
Stability Analysis of the Architecture of Messaging Systems with a Decentralized Node Structure E. M. OrelD. A. MoskvinI. A. Anoshkin OriginalPaper 29 February 2024 Pages: 1033 - 1039
A Decentralized Approach to Intrusion Detection in Dynamic Networks of the Internet of Things Based on Multiagent Reinforcement Learning with Interagent Interaction M. O. KalininE. I. Tkacheva OriginalPaper 29 February 2024 Pages: 1025 - 1032
Application of a Neocortex Model to Identify Contextual Anomalies in the Industrial Internet of Things Network Traffic G. A. Markov OriginalPaper 29 February 2024 Pages: 1018 - 1024
Improving the Efficiency of Multiagent Information Security Systems by Post-Quantum Cryptography Methods S. V. BezzateevS. G. FomichevaA. F. Suprun OriginalPaper 29 February 2024 Pages: 1005 - 1017
Protection of Computational Machine Learning Models against Extraction Threat M. O. KalininM. D. SoshnevA. S. Konoplev OriginalPaper 29 February 2024 Pages: 996 - 1004
Defense against Adversarial Attacks on Image Recognition Systems Using an Autoencoder V. V. PlatonovN. M. Grigorjeva OriginalPaper 29 February 2024 Pages: 989 - 995
Hybrid Method for the Detection of Evasion Attacks Aimed at Machine Learning Systems M. O. KalininA. F. SuprunO. D. Ivanova OriginalPaper 29 February 2024 Pages: 983 - 988
Confidentiality of Machine Learning Models M. A. PoltavtsevaE. A. Rudnitskaya OriginalPaper 29 February 2024 Pages: 975 - 982
Features of Detecting Malicious Installation Files Using Machine Learning Algorithms P. E. YugaiE. V. ZhukovskiiP. O. Semenov OriginalPaper 29 February 2024 Pages: 968 - 974
The Polynomial Algorithm of Finding the Shortest Path in a Divisible Multiple Graph A. V. Smirnov OriginalPaper 27 February 2024 Pages: 841 - 853
Analysis of Decompiled Program Code Using Abstract Syntax Trees N. A. GribkovT. D. OvasapyanD. A. Moskvin OriginalPaper 29 February 2024 Pages: 958 - 967
Text Model for the Automatic Scoring of Business Letter Writing D. D. ZafievskyN. S. LagutinaA. Y. Poletaev OriginalPaper 27 February 2024 Pages: 828 - 840
Genre Classification of Russian Texts Based on Modern Embeddings and Rhythm K. V. Lagutina OriginalPaper 27 February 2024 Pages: 817 - 827
Searching for Software Vulnerabilities Using an Ensemble of Algorithms for the Analysis of a Graph Representation of the Code G. S. KubrinD. P. Zegzhda OriginalPaper 29 February 2024 Pages: 947 - 957
Risk Assessment of Using Open Source Projects: Analysis of the Existing Approaches M. A. EremeevI. I. Zakharchuk OriginalPaper 29 February 2024 Pages: 938 - 946
Transformation of C Programming Language Memory Model into Object-Oriented Representation of EO Language A. I. LegalovY. G. BugayenkoA. N. Kamenskiy OriginalPaper 27 February 2024 Pages: 803 - 816
Empirical Study of the Stability of a Linear Filter Based on the Neyman–Pearson Criterion to Changes in the Average Values R. A. OgnevD. P. Zegzhda OriginalPaper 29 February 2024 Pages: 933 - 937
Testing Dependencies and Inference Rules in Databases S. V. Zykin OriginalPaper 27 February 2024 Pages: 788 - 802