Securing Post-Quantum Resistance for Quantum-Protected Communication SystemsAutomatic Control and Computer Sciences - Tập 54 - Trang 949-951 - 2021
E. N. Shkorkina, E. B. Aleksandrova
Methodology for protecting the systems of quantum-protected communication based on postquantum crypto-algorithm usage at all stages of operation is presented. Authenticated encryption and postquantum signcryption makes it possible to reduce the number of keys in a quantum-protected system and to increase the number of interacting devices.
Comparison of Metrocar System with Dual-Mode Transit SystemsAutomatic Control and Computer Sciences - Tập 56 - Trang 546-552 - 2023
Mehmet Bozuyla, Abdullah T. Tola
Smart city researches and corresponding solutions increased progressively over the last two decades. Particularly smart mobility, which is an important part of the smart city philosophy, solution to multifaceted transportation problem gained relatively importance due to the traffic congestion. MetroCar System (MCS) is one of the new dual-mode transit (DMT) system, i.e., part of smart mobility, was...... hiện toàn bộ
Research an indirect method of calculating complex antenna impedanceAutomatic Control and Computer Sciences - Tập 48 - Trang 375-380 - 2015
M. Greitans, E. Hermanis, V. Aristov
In this paper, we research an indirect method of measuring the complex impedance at the end of a long line, in particular the feed impedance of wideband antennas. The method is based on a spectral analysis of incident and reflected pulses. The method is shown to be useful for certain restrictions on measuring active and reactive components in a band up to several gigahertzes.
Neural Translation System of Meta-Domain Transfer Based on Self-Ensemble and Self-DistillationAutomatic Control and Computer Sciences - Tập 56 - Trang 109-119 - 2022
Yupeng Liu, Yanan Zhang, Xiaochen Zhang
In order to address the shortcoming that feature representation limitation in machine translation (MT) system, this paper presents a transfer method for features in MT. Its main aim is to solve knowledge transfer of different training corpus in the decoding process. In this paper, the meta domain is modeled. A model agnostic self-ensemble and self-distillation training framework is proposed. The t...... hiện toàn bộ
Distributed control and speed sensorless for the synchronisation of multi-robot systemsAutomatic Control and Computer Sciences - Tập 50 - Trang 306-317 - 2016
Yassine Bouteraa, Ismail Ben Abdallah
This paper investigates a synchronization approach to trajectory tracking of networked robotic systems while maintaining time-varying formations. The objective is to control networked robots to track a desired trajectory while synchronizing their behaviors. Combining trajectory tracking and synchronization algorithms, the developed approach uses a cross-coupling technical to create interconnection...... hiện toàn bộ
Steps in the creation of energy-conservation control systems on a set of operating statesAutomatic Control and Computer Sciences - - 2008
D. Yu. Muromtsev, N. G. Chernyshov
Problems related to the creation of energy-conservation systems used in control of dynamic objects are considered, in particular, the formalization of the optimal control problem, the set of the object’s operating states, analysis and synthesis of the optimal control, techniques of increasing the efficiency of energy-conservation control systems, and the introduction and maintenance of energy-cons...... hiện toàn bộ
Automatic security management of computer systemsAutomatic Control and Computer Sciences - Tập 49 - Trang 665-672 - 2016
P. D. Zegzhda, M. O. Kalinin
The problem of fulfilling the security requirements of computer systems within the specified range of impacts (sustainable security) is considered. A method of adaptive security management based on the logic simulation of systems has been proposed that makes it possible to detect security breaches on the set of security settings. The architecture of the automated system of adaptive security manage...... hiện toàn bộ
Decimation of M Sequences As a Way of Obtaining Primitive PolynomialsAutomatic Control and Computer Sciences - - 2024
D. V. Kushnir, S. N. Shemyakin
One approach to obtain a cryptographically strong encryption gamma is to use linear-feedback shift registers defined by primitive polynomials. The ability to quickly select the appropriate polynomial can provide the required degree of security of the stream cipher. Currently, primitive polynomials for sufficiently large degrees are known, but usually these are so-called sparse polynomials. To incr...... hiện toàn bộ