{"title":"Design of Transplanting Machinery Automation Based on Position-Velocity PID Double Closed-Loop Control Algorithm","authors":"Jingjing Sun","doi":"10.3103/S0146411625700014","DOIUrl":"10.3103/S0146411625700014","url":null,"abstract":"<p>The continuous progress of modern science and technology pushes the development of agricultural machinery in the direction of automation, and the design of agricultural machinery has become an important means to improve the efficiency and quality of agricultural production. In order to achieve accurate and efficient transplanting operations, the study carried out a corresponding design of the seedling picking claw device of the transplanting machine, and at the same time, in view of the control requirements of the device, a double closed-loop control algorithm based on the position-velocity proportional-integral-derivative was introduced to achieve the precise positioning control of the opening and closing of the seedling picking claw. Results show that the motor plate of the seedling picking claw with the control strategy proposed by the Institute reaches and stabilizes at the desired displacement in about 0.1 s, which reduces the response time by 0.2 and 0.12 s, respectively, compared with the traditional PID control method and the fuzzy PID control method. It shows that the transplanting machine device designed by the Institute has a good effect of practical application, which helps to increase the transplanting precision as well as efficiency, and provides important technical support for the development of modern agriculture. Provide important technical support for the development of modern agriculture.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 1","pages":"1 - 12"},"PeriodicalIF":0.5,"publicationDate":"2025-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145144424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fixed-Time Observer-Based Sliding Mode Control of Air-Breathing Hypersonic Vehicles Subject to Multisource Uncertainties and Actuator Faults","authors":"Weiqiang Tang, Chengchao Jia, Wenke Shi, Tianpeng Xu, Haiyan Gao","doi":"10.3103/S0146411625700075","DOIUrl":"10.3103/S0146411625700075","url":null,"abstract":"<p>A composite control scheme is proposed for an air-breathing hypersonic vehicle at the presence of multisource uncertainties and actuator faults. Firstly, the dynamic model of the vehicle is transformed into five control-oriented subsystems. Then, the improved fixed-time sliding mode observer is used to estimate the uncertainties caused by elastic effects, external disturbances and actuator faults, these uncertainties are further compensated in the integral terminal sliding mode control laws. Finally, the stability of the closed-loop system is analyzed, the result shows that the designed control system is asymptotically stable. Compared with the disturbance observer-based robust backstepping control system, the designed control system has great advantages in settling time and control efforts, and has strong robustness to multisource disturbances and actuator faults.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 1","pages":"78 - 90"},"PeriodicalIF":0.5,"publicationDate":"2025-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145144425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ruiting Xu, Hui Hu, Fan Qu, Ying Chen, Long Peng, Jiande Yan, Peng Guo, Bozhi Chen
{"title":"Maximum Power Point Tracking Control of Wind Turbine Based on Neural Network Model Reference Adaptive Control","authors":"Ruiting Xu, Hui Hu, Fan Qu, Ying Chen, Long Peng, Jiande Yan, Peng Guo, Bozhi Chen","doi":"10.3103/S0146411625700038","DOIUrl":"10.3103/S0146411625700038","url":null,"abstract":"<p>To solve the problems of inaccurate wind speed, uncertainty, and interference in maximum power point tracking (MPPT), a novel MPPT control method according to neural network model reference adaptive control is put forward in this paper. First, under the premise of Betz’s theorem, the transmission chain model of a wind turbine is established, an effective wind velocity estimator is obtained by training the neural network through wind farm operation and maintenance data. Then, a composite controller composed of model reference adaptive controller (MRAC) and neural network controller is designed to make up for the uncertainties and disturbances in the system effectively. Finally, the update rate of the controller is adjusted according to Lyapunov stability theorem to ensure the asymptotic convergence of the variables in the system. MATLAB is used to simulate different wind speeds, and results show that compared with the traditional MRAC controller, the proposed method has better anti-interference ability and robustness, and can further enhance the wind energy utilization efficiency of the wind machine.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 1","pages":"27 - 38"},"PeriodicalIF":0.5,"publicationDate":"2025-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145144418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chunxiang Liu, Tianqi Cheng, Xinping Guo, YuWei Wang, Lei Wang
{"title":"An Effective Point Cloud Simplification Method Based on the Harris-SIFT Feature and Improved Voxel Filtering","authors":"Chunxiang Liu, Tianqi Cheng, Xinping Guo, YuWei Wang, Lei Wang","doi":"10.3103/S0146411625700051","DOIUrl":"10.3103/S0146411625700051","url":null,"abstract":"<p>The high time consumption and storage requirements are the main obstacles for the current applications of point cloud data, especially for high-density data. To alleviate the computational burden while preserving the important geometric features, an effective point cloud simplification method based on the Harris-SIFT feature and improved voxel filtering is proposed, which divides the point cloud points into strong feature points and weak feature points. Firstly, the key points are extracted by the improved Harris algorithm from the original point cloud data, and the SIFT algorithm is used to divide them into the strong feature points and weak feature points. Then, the weak feature points are further simplified via the improved voxel filtering by introducing the scale factor, and finally, the strong and weak feature points are integrated to be the new data according to the structure of the point cloud. Experimental results of three well-known methods under four models of point cloud demonstrate that not only the important geometric features will be well preserved, but also the higher simplification rate will be obtained in terms of the information entropy and average information entropy.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 1","pages":"52 - 62"},"PeriodicalIF":0.5,"publicationDate":"2025-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145144766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Steganalytical Module for Detecting Embeddings in Images with a Low Stego Container Filling","authors":"D. E. Vil’khovskii","doi":"10.3103/S0146411624700792","DOIUrl":"10.3103/S0146411624700792","url":null,"abstract":"<p>The study describes the business logic and results of the steganalysis software, a steganalytical complex that operates on the basis of the author’s image steganalysis algorithms, which make it possible to detect embeddings even with low filling of the stego container (10–25% of the total volume). This solution is aimed at increasing the information security of an organization by identifying media files (images) containing an embedding and preventing unauthorized forwarding of such files or viewing and extraction of the received hidden message, as well as preventing the installation of malicious programs, whose module is embedded in the image using a steganographic method. The software package works with embeddings performed using the Koch–Zhao and least-significant-bit substitution (LSB-substitution) methods.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1164 - 1168"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143621765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Synthesis of Cyber-Resilient Network Structures: Methods, Experiments, and Architecture Implementation","authors":"E. Yu. Pavlenko","doi":"10.3103/S0146411624700743","DOIUrl":"10.3103/S0146411624700743","url":null,"abstract":"<p>This paper studies issues related to the implementation of intellectual synthesis of cyber-resilient structures. Methods are proposed that implement synthesis both at the stage of designing the network structure and at the stage of its recovery during a cyberattack or failure. The experimental results confirming the efficiency of the proposed methods are presented. The architecture of the system for detecting cyberattacks and intellectual synthesis of cyber-resilient network structures is described.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1119 - 1131"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of a Method for Ensuring Data Integrity in Edge Computing Networks Based on Blockchain Technology","authors":"I. R. Fedorov, A. A. Kovalev","doi":"10.3103/S0146411624701219","DOIUrl":"10.3103/S0146411624701219","url":null,"abstract":"<p>In light of the rapid development of edge computing and the increase in the number of connected devices, this paper addresses the pressing issue of ensuring data integrity. The main focus is on the use of blockchain technology, which offers unique opportunities to solve this problem. This paper provides a brief overview of the existing methods and a new method for ensuring integrity based on blockchain technology. It is proposed to use the Hot Stuff consensus algorithm in the case of multiple active nodes, which ensures fast operation and scalability of the system. Particular attention is paid to the use of a secondary blockchain based on Ethereum to provide additional security and create checkpoints in large blockchain networks. This makes it possible to simplify the work of edge servers and ensure data integrity verification upon the user’s request using smart contracts. The proposed new approaches to ensure data integrity and use blockchain technology can be applied not only in the field of edge computing but also in various variations of the Internet of Things.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1422 - 1428"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Construction of Deterministic and Stochastic Mathematical Models of Information System Protection","authors":"O. V. Rybkina","doi":"10.3103/S0146411624700718","DOIUrl":"10.3103/S0146411624700718","url":null,"abstract":"<p>Mathematical models are proposed for protecting an information system (IS) from information security threats (ISTs) based on the classical model of the struggle between two opponents: the Lanchester model. Using the method of constructing systems of differential equations with the given set of invariants—first integrals—a deterministic model with invariant control and a stochastic model with Wiener perturbations, a model with programmed control with a probability 1, are constructed. The behavior of systems is assessed using mathematical modeling in the MathCad environment. The behavior of the constructed models depending on the initial conditions is considered. The existence of a stochastic model of protection of an IS from ISTs, protected with a probability 1, is established.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1100 - 1107"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Probability-Theoretical Models of Physical Random Number Generators","authors":"D. S. Bogdanov, A. S. Logachev, V. O. Mironkin","doi":"10.3103/S0146411624700962","DOIUrl":"10.3103/S0146411624700962","url":null,"abstract":"<p>This article presents the main probability-theoretic models that describe a wide class of physical random number generators and allow us to propose general approaches to their synthesis and analysis.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1303 - 1310"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Method of Searching for Clones of the Program Code in Binary Executive Files","authors":"E. V. Zavadskii, A. V. Bulat, N. A. Gribkov","doi":"10.3103/S0146411624700913","DOIUrl":"10.3103/S0146411624700913","url":null,"abstract":"<p>The modern trend of increasing labor productivity and business process efficiency entails the optimization of software development processes through the use of generative artificial intelligence models trained on various code bases and manual copying of code fragments. Given the growing number of registered vulnerabilities, methods for detecting clones of the software code are needed. A method for assessing the similarity of fragments of the program code of binary executable files, which is based on the representation of the code in the form of an FA-AAST tree and the apparatus of graph neural networks, is proposed. The results obtained during testing on open and closed source software demonstrate the correctness of the proposed method and higher accuracy compared to the solutions considered.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1263 - 1270"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}