| |
| Issue |
Title |
| |
| Vol 25, No 6 (2025) |
Compound quality model for recommender system evaluation |
Abstract
PDF (Rus)
|
|
A. M. Tsyplov, A. V. Boukhanovsky |
| |
| Vol 25, No 6 (2025) |
Method of spatial countering an intruder in a swarm of unmanned aerial vehicles |
Abstract
PDF (Rus)
|
|
P. Yu. Shamray, D. A. Zakoldaev, A. M. Boyko |
| |
| Vol 25, No 6 (2025) |
ReflectivePrompt: Reflective evolution in autoprompting algorithms |
Abstract
PDF (Eng)
|
|
V. N. Zhuravlev, A. R. Khairullin, E. A. Dyagin, A. N. Sitkina, N. I. Kulin |
| |
| Vol 25, No 6 (2025) |
A method of collective analysis of the external environment by autonomous agents under incomplete data conditions based on the longhorn beetle algorithm |
Abstract
PDF (Rus)
|
|
Ju. A. Pavelina, I. Yu. Popov |
| |
| Vol 25, No 6 (2025) |
A multimodal approach for depression detection using semi-automatic data annotation and deterministic machine learning methods |
Abstract
PDF (Rus)
|
|
A. N. Velichko, A. A. Karpov |
| |
| Vol 25, No 6 (2025) |
Transformer-based automated coronary artery segmentation with domain-specific pretraining |
Abstract
PDF (Eng)
|
|
N. Ismail, A. S. Vatian, A. D. Beresnev, A. A. Zubanenko, N. F. Gusarova, I. A. Men’kov |
| |
| Vol 25, No 6 (2025) |
A weighted ensemble model combining ARIMA, LSTM, and GBM for robust time series prediction |
Abstract
PDF (Eng)
|
|
A. Vignesh, N. Vijayalakshmi |
| |
| Vol 25, No 5 (2025) |
A universal architecture model of a crowdsourcing medical data labeling system designed |
Abstract
PDF (Rus)
|
|
L. A. Kovalenko, I. S. Blekanov, F. V. Ezhov, E. S. Larin, G. I. Kim |
| |
| Vol 25, No 5 (2025) |
Vector embeddings compression using clustering with the ensemble of oblivious decision trees and separate centroids storage |
Abstract
PDF (Eng)
|
|
N. A. Tomilov |
| |
| Vol 25, No 5 (2025) |
Control of composition and determination of dosage of hydrate formation inhibitors by their infrared spectra |
Abstract
PDF (Rus)
|
|
Iu. S. Kozhevina, T. N. Nosenko |
| |
| Vol 25, No 5 (2025) |
Classification of human motor activity based on multisensory data analysis |
Abstract
PDF (Rus)
|
|
A. D. Obukhov |
| |
| Vol 25, No 5 (2025) |
Particle swarm optimization methods and local heuristics for solving the multiple traveling salesman problem |
Abstract
PDF (Rus)
|
|
E. N. Miftakhov, A. A. Akimov, Yu. A. Gnatenko |
| |
| Vol 25, No 5 (2025) |
Accelerating and analyzing performance of shortest path algorithms on GPU using CUDA platform: Bellman-Ford, Dijkstra, and Floyd-Warshall algorithms |
Abstract
PDF (Eng)
|
|
D. Bodra, S. Khairnar |
| |
| Vol 25, No 5 (2025) |
Anomaly detection for IIoT: analyzing Edge-IIoTset dataset with varied class distributions |
Abstract
PDF (Eng)
|
|
W. Ferhi, D. Moussaoui, M. Hadjila, A. B. Bouidaine |
| |
| Vol 25, No 5 (2025) |
Incorporating negative examples into Hidden Markov Model-based classification of peptide sequences |
Abstract
PDF (Eng)
|
|
V. A. Polezhaeva, D. A. Kleverov, A. A. Shalyto, M. Artyomov |
| |
| Vol 25, No 5 (2025) |
Enhanced detection of denial-of-service attacks in Kubernetes: a multi-framework machine learning approach integrating node and application metrics |
Abstract
PDF (Eng)
|
|
G. Darwesh, J. Hammoud, A. A. Vorobeva |
| |
| Vol 25, No 5 (2025) |
Experimental results of using AES-128 in LoRaWAN |
Abstract
PDF (Eng)
|
|
A. Nouar, M. Tahar Abbes, S. Boumerdassi, M. Chaib |
| |
| Vol 25, No 4 (2025) |
An improved authentication protocol for self-driving vehicles based on Diffie–Hellman algorithm |
Abstract
PDF (Eng)
|
|
Muhammad Salman Saeed, S. V. Bezzateev |
| |
| Vol 25, No 4 (2025) |
Comparative analysis method for time series data objects represented as sets of strings based on de Bruijn graphs |
Abstract
PDF (Rus)
|
|
A. B. Ivanov, A. A. Shalyto, V. I. Ulyantsev |
| |
| Vol 25, No 4 (2025) |
Application of modern methods for information security risks evaluation of a critical information infrastructure facility |
Abstract
PDF (Rus)
|
|
I. I. Livshitz |
| |
| Vol 25, No 4 (2025) |
Optimizing knowledge distillation models for language models |
Abstract
PDF (Rus)
|
|
T. M. Tatarnikova, N. S. Mokretsov |
| |
| Vol 25, No 4 (2025) |
Algorithm for human interaction with a model of an industrial cyber-physical system by means of neural interface |
Abstract
PDF (Rus)
|
|
M. S. Sizov, M. Ya. Marusina, K. V. Kipriianov, V. A. Arckhipov, Jiacheng Lou, Zh. V. Nagornova, N. V. Shemyakina |
| |
| Vol 25, No 4 (2025) |
A method for generating digital avatar animation with speech and non-verbal synchronization based on bimodal data |
Abstract
PDF (Rus)
|
|
A. A. Axyonov, E. V. Ryumina, D. A. Ryumin |
| |
| Vol 25, No 4 (2025) |
Leveraging machine learning for profiling IoT devices to identify malicious activities |
Abstract
PDF (Rus)
|
|
D. M. Legkodymov, D. S. Levshun, I. V. Kotenko |
| |
| Vol 25, No 4 (2025) |
Font generation based on style and character structure analysis using diffusion models |
Abstract
PDF (Rus)
|
|
M. I. Maslov, A. E. Avdyushina, M. A. Solodkaya, A. V. Kugaevskikh |
| |
| Vol 25, No 4 (2025) |
Anomaly detection under data scarcity and uncertainty using zero-shot and few-shot approaches |
Abstract
PDF (Rus)
|
|
S. A. Milantev, P. D. Mikhailova, I. A. Bessmertny |
| |
| Vol 25, No 4 (2025) |
The impact of adversarial attacks on a computer vision models perception of images Set intersection protocol with privacy preservation |
Abstract
PDF (Rus)
|
|
R. R. Bolozovskii, A. B. Levina, K. S. Krasov |
| |
| Vol 25, No 4 (2025) |
K-sparse encoder for efficient information retrieval |
Abstract
PDF (Rus)
|
|
V. Yu. Dobrynin |
| |
| Vol 25, No 4 (2025) |
Set intersection protocol with privacy preservation |
Abstract
PDF (Rus)
|
|
I. D. Ioganson |
| |
| Vol 25, No 3 (2025) |
A deep learning approach for adaptive electrocardiogram-based authentication in an internet of things enabled telehealth system |
Abstract
PDF (Eng)
|
|
M.A.E. Azab |
| |
| Vol 25, No 3 (2025) |
Two-stage algorithm for underwater image recovery for marine exploration |
Abstract
PDF (Rus)
|
|
I. V. Semernik, Ch. V. Samonova |
| |
| Vol 25, No 3 (2025) |
Analysis of the cryptographic strength of the SHA-256 hash function using the SAT approach |
Abstract
PDF (Rus)
|
|
V. V. Davydov, M. D. Pikhtovnikov, A. P. Kiryanova, O. S. Zaikin |
| |
| Vol 25, No 3 (2025) |
Investigation of the possibility of using evolutionary algorithms for conditional generation of attributed graphs |
Abstract
PDF (Rus)
|
|
I. Yu. Deeva, P. O. Andreeva, E. N. Shikov, A. V. Kalyuzhnaya |
| |
| Vol 25, No 3 (2025) |
Analysis of the applicability of existing secret separation schemes in the post-quaternary era |
Abstract
PDF (Rus)
|
|
E. F. Kustov, S. V. Bezzateev |
| |
| Vol 25, No 3 (2025) |
Deep learning-enhanced contour interpolation techniques for 3D carotid vessel wall segmentation |
Abstract
PDF (Eng)
|
|
N. Ismail, A. S. Vatian, T. A. Polevaya, A. A. Golubev, D. A. Dobrenko, A. A. Zubanenko, N. F. Gusarova, A. G. Vanyurkin, M. A. Chernyavskiy |
| |
| Vol 25, No 3 (2025) |
Detecting fraud activities in financial transactions using SMOTENN model |
Abstract
PDF (Eng)
|
|
I. Syamsuddin, S. Omsa, A. Rustam, D. Hasan |
| |
| Vol 25, No 2 (2025) |
Verification of the formal requirements for the system behavior based on automaton objects |
Abstract
PDF (Eng)
|
|
F. A. Novikov, I. V. Afanasieva, L. N. Fedorchenko, T. A. Kharisova |
| |
| Vol 25, No 2 (2025) |
Vector search using method of clustering using ensemble of oblivious trees |
Abstract
PDF (Eng)
|
|
N. A. Tomilov, V. P. Turov, A. A. Babayants, A. V. Platonov |
| |
| Vol 25, No 2 (2025) |
Integration of enhanced qualified electronic signature to the fast healthcare interoperability resources (FHIR RU-core) protocol |
Abstract
PDF (Eng)
|
|
N. A. Gorbunov, V. O. Kuleshova, V. M. Korzhuk |
| |
| Vol 25, No 2 (2025) |
Reference-based diffusion model for super-resolution |
Abstract
PDF (Rus)
|
|
A. K. Denisov, S. V. Bykovskii, P. V. Kustarev |
| |
| Vol 25, No 2 (2025) |
Clustering of spatial data with implicit polygonal structure based on topological approaches |
Abstract
PDF (Rus)
|
|
S. V. Eremeev |
| |
| Vol 25, No 2 (2025) |
Search for three-dimensional images using the contour comparison method in problems of geological reservoir modeling |
Abstract
PDF (Rus)
|
|
P. A. Litvinov, I. A. Bessmertny |
| |
| Vol 25, No 2 (2025) |
Development of a file system for storing data of an intelligent video surveillance system |
Abstract
PDF (Rus)
|
|
A. N. Subbotin, N. A. Zhukova |
| |
| Vol 25, No 2 (2025) |
Image structural analysis and adaptive resonance in artificial neural networks (Review paper) |
Abstract
PDF (Rus)
|
|
V. R. Lutsiv, M. A. Mikhalkova, V. O. Yachnaya |
| |
| Vol 25, No 2 (2025) |
Development of dense information sets for Gilbert codes and its extensions |
Abstract
PDF (Rus)
|
|
M. N. Isaeva |
| |
| Vol 25, No 2 (2025) |
Preprocessing of skeletal keypoints trajectories in the task of laboratory animal behavior recording automation |
Abstract
PDF (Rus)
|
|
D. I. Krasnov, M. A. Volynsky, A. A. Gusev |
| |
| Vol 25, No 1 (2025) |
Efficient sparse retrieval through embedding-based inverted index construction |
Abstract
PDF (Eng)
|
|
V. Yu. Dobrynin, R. K. Abramovich, A. V. Platonov |
| |
| Vol 25, No 1 (2025) |
Method of semantic segmentation of airborne laser scanning data of water protection zones |
Abstract
PDF (Rus)
|
|
S. V. Sai, A. V. Zinkevich |
| |
| Vol 25, No 1 (2025) |
Directional variance-based algorithm for digital image smoothing |
Abstract
PDF (Eng)
|
|
Al-Ameen Zohair |
| |
| Vol 25, No 1 (2025) |
Large language models in information security and penetration testing: a systematic review of application possibilities |
Abstract
PDF (Rus)
|
|
A. A. Konev, T. I. Payusova |
| |
| Vol 25, No 1 (2025) |
Usage of polar codes for fixed and random length error bursts correction |
Abstract
PDF (Eng)
|
|
A. A. Ovchinnikov |
| |
| Vol 25, No 1 (2025) |
DAS signal modeling using the generative adversarial neural network technique |
Abstract
PDF (Rus)
|
|
A. V. Timofeev |
| |
| Vol 25, No 1 (2025) |
Multidimensional trajectory planning algorithm for a 5D printer slicer |
Abstract
PDF (Rus)
|
|
M. Ya. Afanasiev, M. R. Solovev, A. A. Krylova, S. A. Shorokhov, Yu. V. Fedosov |
| |
| Vol 25, No 1 (2025) |
Scheduling distributed computations in non-deterministic systems |
Abstract
PDF (Rus)
|
|
N. V. Kolesov, E. G. Litunenko, M. V. Tolmacheva, V. S. Tiulnikov |
| |
| Vol 25, No 1 (2025) |
Enhancing and extending CatBoost for accurate detection and classification of DoS and DDoS attack subtypes in network traffic |
Abstract
PDF (Eng)
|
|
A. Hajjouz, E. Yu. Avksentieva |
| |
| Vol 25, No 1 (2025) |
Detection of L0-optimized attacks via anomaly scores distribution analysis |
Abstract
PDF (Eng)
|
|
D. A. Esipov, M. I. Basov, A. D. Kletenkova |
| |
| Vol 24, No 6 (2024) |
Application of Markov chain Monte Carlo and machine learning for identifying active modules in biological graphs |
Abstract
PDF (Rus)
|
|
D. A. Usoltsev, I. I. Molotkov, M. N. Artomov, A. A. Sergushichev, A. A. Shalyto |
| |
| Vol 24, No 6 (2024) |
Surface defect detection with limited data based on SSD detector and Siamese networks |
Abstract
PDF (Eng)
|
|
N. P. Novgorodcev, K. A. Baturina, V. A. Efimova, A. A. Shalyto |
| |
| Vol 24, No 6 (2024) |
Sentiment analysis of Arabic tweets using supervised machine learning |
Abstract
PDF (Eng)
|
|
A. Benabdallah, M. A. Abderrahim, M. Mokri |
| |
| Vol 24, No 6 (2024) |
Russian parametric corpus RuParam |
Abstract
PDF (Rus)
|
|
P. V. Grashchenkov, L. I. Pasko, K. A. Studenikina, M. M. Tikhomirov |
| |
| Vol 24, No 6 (2024) |
Comparative analysis of AI-generated and original abstracts of academic articles on philology |
Abstract
PDF (Rus)
|
|
M. V. Khokhlova, M. V. Koryshev |
| |
| Vol 24, No 6 (2024) |
Enhancing Kubernetes security with machine learning: а proactive approach to anomaly detection |
Abstract
PDF (Eng)
|
|
G. Darwesh, J. Hammoud, A. A. Vorobeva |
| |
| Vol 24, No 6 (2024) |
Prompt-based multi-task learning for robust text retrieval |
Abstract
PDF (Eng)
|
|
S. M. Masliukhin, P. A. Posokhov, S. S. Skrylnikov, O. V. Makhnytkina, T. Yu. Ivanovskaya |
| |
| Vol 24, No 6 (2024) |
Improving question answering in programming domain with pretrained language model finetuning using structured diverse online forum data |
Abstract
PDF (Eng)
|
|
A. V. Gorbatovski, A. D. Razin, A. A. Aliev, S. V. Kovalchuk |
| |
| Vol 24, No 6 (2024) |
Specification language for automatа-based objects cooperation |
Abstract
PDF (Eng)
|
|
F. A. Novikov, I. V. Afanasieva, L. N. Fedorchenko, T. A. Kharisova |
| |
| Vol 24, No 6 (2024) |
Aspects of organizing game interactions among asymmetric agents using graph neural networks |
Abstract
PDF (Rus)
|
|
A. O. Isakov, D. E. Peregorodiev, I. V. Tomilov, N. F. Gusarova, A. A. Golubev |
| |
| Vol 24, No 6 (2024) |
A model for ensuring the continuity of the safe functioning of the product quality traceability system in conditions of unstable communication |
Abstract
PDF (Rus)
|
|
V. H. Le, I. I. Komarov, A. A. Privalov, A. A. Pyrkin |
| |
| Vol 23, No 2 (2023) |
Voice based answer evaluation system for physically disabled students using natural language processing and machine learning |
Abstract
PDF (Eng)
|
|
M. Thalo, P. Mane |
| |
| Vol 23, No 2 (2023) |
Natural language based malicious domain detection using machine learning and deep learning |
Abstract
PDF (Eng)
|
|
Raja Saleem, G. Pradeepa, S. Mahalakshmi, M. Jayakumar |
| |
| Vol 23, No 2 (2023) |
Hybrid JAYA algorithm for workflow scheduling in cloud |
Abstract
PDF (Eng)
|
|
S. Bothra, S. Singhal, H. Goyal |
| |
| Vol 23, No 2 (2023) |
Methodology for the control of electric power distribution system components to ensure the quality of consumed electricity |
Abstract
PDF (Rus)
|
|
A. E. Mozokhin, V. N. Shvedenko |
| |
| Vol 22, No 6 (2022) |
Automated evaluation of ECG parameters during the COVID-19 pandemic |
Abstract
PDF (Rus)
|
|
A. S. Vatian, N. F. Gusarova, N. V. Dobrenko, D. A. Zmievsky, M. V. Kabyshev, T. A. Polevaya, A. A. Tatarinova, I. V. Tomilov |
| |
| Vol 22, No 6 (2022) |
Multi-agent adaptive routing by multi-head-attention-based twin agents using reinforcement learning |
Abstract
PDF (Rus)
|
|
T. A. Gribanov, A. A. Filchenkov, A. A. Azarov, A. A. Shalyto |
| |
| Vol 22, No 6 (2022) |
Joint learning of agents and graph embeddings in a conveyor belt control problem |
Abstract
PDF (Rus)
|
|
K. E. Rybkin, A. A. Filchenkov, A. A. Azarov, A. S. Zabashta, A. A. Shalyto |
| |
| Vol 24, No 3 (2024) |
Method for generating information sequence segments using the quality functional of processing models |
Abstract
PDF (Rus)
|
|
D. D. Tikhonov, I. S. Lebedev |
| |
| Vol 24, No 3 (2024) |
Smartphone video motion deblur order model |
Abstract
PDF (Eng)
|
|
R. А. Sallama |
| |
| Vol 24, No 3 (2024) |
An approach to detecting L0-optimized attacks on image processing neural networks via means of mathematical statistics |
Abstract
PDF (Eng)
|
|
D. А. Esipov |
| |
| Vol 23, No 2 (2023) |
Multiple context-free path querying by matrix multiplication |
Abstract
PDF (Eng)
|
|
I. V. Epelbaum, R. Sh. Azimov, S. V. Grigorev |
| |
| Vol 23, No 2 (2023) |
Predicting the results of the 16-factor R. Cattell test based on the analysis of text posts of social network users |
Abstract
PDF (Rus)
|
|
V. D. Oliseenko, M. V. Abramov |
| |
| Vol 22, No 6 (2022) |
A multi-path secure routing for the detection of node capturing attack in wireless sensor network |
Abstract
PDF (Eng)
|
|
J. Kolangiappan, A. K. Senthil |
| |
| Vol 22, No 6 (2022) |
A method for documenting architectural solutions of computing platforms |
Abstract
PDF (Rus)
|
|
Y. G. Gorbachev |
| |
| Vol 22, No 6 (2022) |
Improving out of vocabulary words recognition accuracy for an end-to-end Russian speech recognition system |
Abstract
PDF (Eng)
|
|
A. Yu. Andrusenko, A. N. Romanenko |
| |
| Vol 23, No 1 (2023) |
Computational methods to increase the speed of FPGA-based discrete wavelet transforms |
Abstract
PDF (Rus)
|
|
S Sai, A. V. Zinkevich |
| |
| Vol 23, No 1 (2023) |
Dialogue system based on spoken conversations with access to an unstructured knowledge base |
Abstract
PDF (Rus)
|
|
S. M. Masliukhin |
| |
| Vol 22, No 6 (2022) |
Method for monitoring the state of elements of cyber-physical systems based on time series analysis |
Abstract
PDF (Rus)
|
|
V. V. Semenov |
| |
| Vol 22, No 6 (2022) |
Application of the text wave model to the sentiment analysis problem |
Abstract
PDF (Rus)
|
|
A. S. Gruzdeva, R. N. Iurev, I. A. Bessmertny |
| |
| Vol 22, No 3 (2022) |
Efficient incremental hash chain with probabilistic filter-based method to update blockchain light nodes |
Abstract
PDF (Eng)
|
|
M. A. Maalla, S. V. Bezzateev |
| |
| Vol 22, No 3 (2022) |
Method for generating masks on face images and systems for their recognition |
Abstract
PDF (Rus)
|
|
G. A. Kukharev, E. V. Ryumina, N. A. Shulgin |
| |
| Vol 22, No 3 (2022) |
Improving sign language processing via few-shot machine learning |
Abstract
PDF (Eng)
|
|
G. F. Shovkoplias, D. A. Strokov, D. V. Kasantsev, A. S. Vatian, A. A. Asadulaev, I. V. Tomilov, A. A. Shalyto, N. F. Gusarova |
| |
| Vol 22, No 3 (2022) |
Quantum-probabilistic SVD: complex-valued factorization of matrix data |
Abstract
PDF (Eng)
|
|
Sh. Kozhisseri, I. A. Surov |
| |
| Vol 22, No 3 (2022) |
Modelling of basic Indonesian Sign Language translator based on Raspberry Pi technology |
Abstract
PDF (Eng)
|
|
U. Fadlilah, R.A.R. Prasetyo, A.K. Mahamad, B. Handaga, Sh. Saon, E. Sudarmilah |
| |
| Vol 22, No 3 (2022) |
A method of multimodal machine sign language translation for natural human-computer interaction |
Abstract
PDF (Rus)
|
|
A. A. Axyonov, I. A. Kagirov, D. A. Ryumin |
| |
| Vol 22, No 1 (2022) |
Dimensionality reduction of the attributes using fuzzy optimized independent component analysis for a Big Data Intrusion Detection System |
Abstract
PDF (Eng)
|
|
R. Aswanandini, Ch. Deepa |
| |
| Vol 22, No 3 (2022) |
Web app for quick evaluation of subjective answers using natural language processing |
Abstract
PDF (Eng)
|
|
Th. Meenakshi Anurag, M. Pradeep B., M. Vishaka |
| |
| Vol 22, No 1 (2022) |
An optimal swift key generation and distribution for QKD |
Abstract
PDF (Eng)
|
|
M. R. Suma, P. Madhumathy |
| |
| Vol 22, No 1 (2022) |
A study of vectorization methods for unstructured text documents in natural language according to their influence on the quality of work of various classifiers |
Abstract
PDF (Rus)
|
|
V. V. Shadsky, A. B. Sizonenko, M. A. Chekmarev, A. V. Shishkov, D. A. Isakin |
| |
| Vol 22, No 1 (2022) |
Recognition of the emotional state based on a convolutional neural network |
Abstract
PDF (Rus)
|
|
G. M. Soma, A. M. Kadnova |
| |
| Vol 22, No 1 (2022) |
Intellectualization of personnel development management in high-tech service-oriented companies |
Abstract
PDF (Rus)
|
|
A. D. Beresnev |
| |
| Vol 24, No 3 (2024) |
Enhancing healthcare data security in cloud environments with dual authentication and optimal key-tuned encryption Hema Ambiha Aravindakshan1, Pragaladan Rengasamy2 |
Abstract
PDF (Eng)
|
|
H. А. Aravindakshan, P. Rengasamy |
| |
| Vol 24, No 3 (2024) |
Elimination of distortions of weak images of astronomical objects on the example of Saturn, Jupiter and their satellites |
Abstract
PDF (Rus)
|
|
V. S. Sizikov, N. G. Rushchenko |
| |
| 1 - 100 of 180 Items |
1 2 > >>
|