AUTOMATIC CONTROL AND COMPUTER SCIENCES最新文献

筛选
英文 中文
Design of Transplanting Machinery Automation Based on Position-Velocity PID Double Closed-Loop Control Algorithm 基于位置-速度PID双闭环控制算法的移栽机械自动化设计
IF 0.5
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2025-06-22 DOI: 10.3103/S0146411625700014
Jingjing Sun
{"title":"Design of Transplanting Machinery Automation Based on Position-Velocity PID Double Closed-Loop Control Algorithm","authors":"Jingjing Sun","doi":"10.3103/S0146411625700014","DOIUrl":"10.3103/S0146411625700014","url":null,"abstract":"<p>The continuous progress of modern science and technology pushes the development of agricultural machinery in the direction of automation, and the design of agricultural machinery has become an important means to improve the efficiency and quality of agricultural production. In order to achieve accurate and efficient transplanting operations, the study carried out a corresponding design of the seedling picking claw device of the transplanting machine, and at the same time, in view of the control requirements of the device, a double closed-loop control algorithm based on the position-velocity proportional-integral-derivative was introduced to achieve the precise positioning control of the opening and closing of the seedling picking claw. Results show that the motor plate of the seedling picking claw with the control strategy proposed by the Institute reaches and stabilizes at the desired displacement in about 0.1 s, which reduces the response time by 0.2 and 0.12 s, respectively, compared with the traditional PID control method and the fuzzy PID control method. It shows that the transplanting machine device designed by the Institute has a good effect of practical application, which helps to increase the transplanting precision as well as efficiency, and provides important technical support for the development of modern agriculture. Provide important technical support for the development of modern agriculture.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 1","pages":"1 - 12"},"PeriodicalIF":0.5,"publicationDate":"2025-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145144424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fixed-Time Observer-Based Sliding Mode Control of Air-Breathing Hypersonic Vehicles Subject to Multisource Uncertainties and Actuator Faults 多源不确定性和执行器故障下吸气式高超声速飞行器的固定时间观测器滑模控制
IF 0.5
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2025-06-22 DOI: 10.3103/S0146411625700075
Weiqiang Tang, Chengchao Jia, Wenke Shi, Tianpeng Xu, Haiyan Gao
{"title":"Fixed-Time Observer-Based Sliding Mode Control of Air-Breathing Hypersonic Vehicles Subject to Multisource Uncertainties and Actuator Faults","authors":"Weiqiang Tang,&nbsp;Chengchao Jia,&nbsp;Wenke Shi,&nbsp;Tianpeng Xu,&nbsp;Haiyan Gao","doi":"10.3103/S0146411625700075","DOIUrl":"10.3103/S0146411625700075","url":null,"abstract":"<p>A composite control scheme is proposed for an air-breathing hypersonic vehicle at the presence of multisource uncertainties and actuator faults. Firstly, the dynamic model of the vehicle is transformed into five control-oriented subsystems. Then, the improved fixed-time sliding mode observer is used to estimate the uncertainties caused by elastic effects, external disturbances and actuator faults, these uncertainties are further compensated in the integral terminal sliding mode control laws. Finally, the stability of the closed-loop system is analyzed, the result shows that the designed control system is asymptotically stable. Compared with the disturbance observer-based robust backstepping control system, the designed control system has great advantages in settling time and control efforts, and has strong robustness to multisource disturbances and actuator faults.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 1","pages":"78 - 90"},"PeriodicalIF":0.5,"publicationDate":"2025-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145144425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maximum Power Point Tracking Control of Wind Turbine Based on Neural Network Model Reference Adaptive Control 基于神经网络模型参考自适应控制的风电机组最大功率点跟踪控制
IF 0.5
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2025-06-22 DOI: 10.3103/S0146411625700038
Ruiting Xu, Hui Hu, Fan Qu, Ying Chen, Long Peng, Jiande Yan, Peng Guo, Bozhi Chen
{"title":"Maximum Power Point Tracking Control of Wind Turbine Based on Neural Network Model Reference Adaptive Control","authors":"Ruiting Xu,&nbsp;Hui Hu,&nbsp;Fan Qu,&nbsp;Ying Chen,&nbsp;Long Peng,&nbsp;Jiande Yan,&nbsp;Peng Guo,&nbsp;Bozhi Chen","doi":"10.3103/S0146411625700038","DOIUrl":"10.3103/S0146411625700038","url":null,"abstract":"<p>To solve the problems of inaccurate wind speed, uncertainty, and interference in maximum power point tracking (MPPT), a novel MPPT control method according to neural network model reference adaptive control is put forward in this paper. First, under the premise of Betz’s theorem, the transmission chain model of a wind turbine is established, an effective wind velocity estimator is obtained by training the neural network through wind farm operation and maintenance data. Then, a composite controller composed of model reference adaptive controller (MRAC) and neural network controller is designed to make up for the uncertainties and disturbances in the system effectively. Finally, the update rate of the controller is adjusted according to Lyapunov stability theorem to ensure the asymptotic convergence of the variables in the system. MATLAB is used to simulate different wind speeds, and results show that compared with the traditional MRAC controller, the proposed method has better anti-interference ability and robustness, and can further enhance the wind energy utilization efficiency of the wind machine.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 1","pages":"27 - 38"},"PeriodicalIF":0.5,"publicationDate":"2025-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145144418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective Point Cloud Simplification Method Based on the Harris-SIFT Feature and Improved Voxel Filtering 基于Harris-SIFT特征和改进体素滤波的点云简化方法
IF 0.5
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2025-06-22 DOI: 10.3103/S0146411625700051
Chunxiang Liu, Tianqi Cheng, Xinping Guo, YuWei Wang, Lei Wang
{"title":"An Effective Point Cloud Simplification Method Based on the Harris-SIFT Feature and Improved Voxel Filtering","authors":"Chunxiang Liu,&nbsp;Tianqi Cheng,&nbsp;Xinping Guo,&nbsp;YuWei Wang,&nbsp;Lei Wang","doi":"10.3103/S0146411625700051","DOIUrl":"10.3103/S0146411625700051","url":null,"abstract":"<p>The high time consumption and storage requirements are the main obstacles for the current applications of point cloud data, especially for high-density data. To alleviate the computational burden while preserving the important geometric features, an effective point cloud simplification method based on the Harris-SIFT feature and improved voxel filtering is proposed, which divides the point cloud points into strong feature points and weak feature points. Firstly, the key points are extracted by the improved Harris algorithm from the original point cloud data, and the SIFT algorithm is used to divide them into the strong feature points and weak feature points. Then, the weak feature points are further simplified via the improved voxel filtering by introducing the scale factor, and finally, the strong and weak feature points are integrated to be the new data according to the structure of the point cloud. Experimental results of three well-known methods under four models of point cloud demonstrate that not only the important geometric features will be well preserved, but also the higher simplification rate will be obtained in terms of the information entropy and average information entropy.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 1","pages":"52 - 62"},"PeriodicalIF":0.5,"publicationDate":"2025-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145144766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Steganalytical Module for Detecting Embeddings in Images with a Low Stego Container Filling 用于检测低隐写容器填充图像中的嵌入的隐写分析模块
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2025-03-14 DOI: 10.3103/S0146411624700792
D. E. Vil’khovskii
{"title":"Steganalytical Module for Detecting Embeddings in Images with a Low Stego Container Filling","authors":"D. E. Vil’khovskii","doi":"10.3103/S0146411624700792","DOIUrl":"10.3103/S0146411624700792","url":null,"abstract":"<p>The study describes the business logic and results of the steganalysis software, a steganalytical complex that operates on the basis of the author’s image steganalysis algorithms, which make it possible to detect embeddings even with low filling of the stego container (10–25% of the total volume). This solution is aimed at increasing the information security of an organization by identifying media files (images) containing an embedding and preventing unauthorized forwarding of such files or viewing and extraction of the received hidden message, as well as preventing the installation of malicious programs, whose module is embedded in the image using a steganographic method. The software package works with embeddings performed using the Koch–Zhao and least-significant-bit substitution (LSB-substitution) methods.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1164 - 1168"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143621765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Synthesis of Cyber-Resilient Network Structures: Methods, Experiments, and Architecture Implementation 网络弹性网络结构的智能合成:方法、实验和体系结构实现
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2025-03-14 DOI: 10.3103/S0146411624700743
E. Yu. Pavlenko
{"title":"Intelligent Synthesis of Cyber-Resilient Network Structures: Methods, Experiments, and Architecture Implementation","authors":"E. Yu. Pavlenko","doi":"10.3103/S0146411624700743","DOIUrl":"10.3103/S0146411624700743","url":null,"abstract":"<p>This paper studies issues related to the implementation of intellectual synthesis of cyber-resilient structures. Methods are proposed that implement synthesis both at the stage of designing the network structure and at the stage of its recovery during a cyberattack or failure. The experimental results confirming the efficiency of the proposed methods are presented. The architecture of the system for detecting cyberattacks and intellectual synthesis of cyber-resilient network structures is described.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1119 - 1131"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of a Method for Ensuring Data Integrity in Edge Computing Networks Based on Blockchain Technology 基于区块链技术的边缘计算网络数据完整性保障方法研究
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2025-03-14 DOI: 10.3103/S0146411624701219
I. R. Fedorov, A. A. Kovalev
{"title":"Development of a Method for Ensuring Data Integrity in Edge Computing Networks Based on Blockchain Technology","authors":"I. R. Fedorov,&nbsp;A. A. Kovalev","doi":"10.3103/S0146411624701219","DOIUrl":"10.3103/S0146411624701219","url":null,"abstract":"<p>In light of the rapid development of edge computing and the increase in the number of connected devices, this paper addresses the pressing issue of ensuring data integrity. The main focus is on the use of blockchain technology, which offers unique opportunities to solve this problem. This paper provides a brief overview of the existing methods and a new method for ensuring integrity based on blockchain technology. It is proposed to use the Hot Stuff consensus algorithm in the case of multiple active nodes, which ensures fast operation and scalability of the system. Particular attention is paid to the use of a secondary blockchain based on Ethereum to provide additional security and create checkpoints in large blockchain networks. This makes it possible to simplify the work of edge servers and ensure data integrity verification upon the user’s request using smart contracts. The proposed new approaches to ensure data integrity and use blockchain technology can be applied not only in the field of edge computing but also in various variations of the Internet of Things.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1422 - 1428"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construction of Deterministic and Stochastic Mathematical Models of Information System Protection 信息系统保护的确定性和随机数学模型的构建
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2025-03-14 DOI: 10.3103/S0146411624700718
O. V. Rybkina
{"title":"Construction of Deterministic and Stochastic Mathematical Models of Information System Protection","authors":"O. V. Rybkina","doi":"10.3103/S0146411624700718","DOIUrl":"10.3103/S0146411624700718","url":null,"abstract":"<p>Mathematical models are proposed for protecting an information system (IS) from information security threats (ISTs) based on the classical model of the struggle between two opponents: the Lanchester model. Using the method of constructing systems of differential equations with the given set of invariants—first integrals—a deterministic model with invariant control and a stochastic model with Wiener perturbations, a model with programmed control with a probability 1, are constructed. The behavior of systems is assessed using mathematical modeling in the MathCad environment. The behavior of the constructed models depending on the initial conditions is considered. The existence of a stochastic model of protection of an IS from ISTs, protected with a probability 1, is established.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1100 - 1107"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Probability-Theoretical Models of Physical Random Number Generators 物理随机数发生器的概率理论模型
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2025-03-14 DOI: 10.3103/S0146411624700962
D. S. Bogdanov, A. S. Logachev, V. O. Mironkin
{"title":"Probability-Theoretical Models of Physical Random Number Generators","authors":"D. S. Bogdanov,&nbsp;A. S. Logachev,&nbsp;V. O. Mironkin","doi":"10.3103/S0146411624700962","DOIUrl":"10.3103/S0146411624700962","url":null,"abstract":"<p>This article presents the main probability-theoretic models that describe a wide class of physical random number generators and allow us to propose general approaches to their synthesis and analysis.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1303 - 1310"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method of Searching for Clones of the Program Code in Binary Executive Files 在二进制执行文件中搜索程序代码克隆的方法
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2025-03-14 DOI: 10.3103/S0146411624700913
E. V. Zavadskii, A. V. Bulat, N. A. Gribkov
{"title":"Method of Searching for Clones of the Program Code in Binary Executive Files","authors":"E. V. Zavadskii,&nbsp;A. V. Bulat,&nbsp;N. A. Gribkov","doi":"10.3103/S0146411624700913","DOIUrl":"10.3103/S0146411624700913","url":null,"abstract":"<p>The modern trend of increasing labor productivity and business process efficiency entails the optimization of software development processes through the use of generative artificial intelligence models trained on various code bases and manual copying of code fragments. Given the growing number of registered vulnerabilities, methods for detecting clones of the software code are needed. A method for assessing the similarity of fragments of the program code of binary executable files, which is based on the representation of the code in the form of an FA-AAST tree and the apparatus of graph neural networks, is proposed. The results obtained during testing on open and closed source software demonstrate the correctness of the proposed method and higher accuracy compared to the solutions considered.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1263 - 1270"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信