Home / Journals / CMC / Vol.70, No.3, 2022
Special lssues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Polygonal Finite Element for Two-Dimensional Lid-Driven Cavity Flow

    T. Vu-Huu1, C. Le-Thanh2, H. Nguyen-Xuan3,4, M. Abdel-Wahab3,5,*
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4217-4239, 2022, DOI:10.32604/cmc.2022.020889
    Abstract This paper investigates a polygonal finite element (PFE) to solve a two-dimensional (2D) incompressible steady fluid problem in a cavity square. It is a well-known standard benchmark (i.e., lid-driven cavity flow)-to evaluate the numerical methods in solving fluid problems controlled by the Navier–Stokes (N–S) equation system. The approximation solutions provided in this research are based on our developed equal-order mixed PFE, called Pe1Pe1. It is an exciting development based on constructing the mixed scheme method of two equal-order discretisation spaces for both fluid pressure and velocity fields of flows and our proposed stabilisation technique. In this research, to handle the… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-Step Detection of Simplex and Duplex Wormhole Attacks over Wireless Sensor Networks

    Abrar M. Alajlan*
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4241-4259, 2022, DOI:10.32604/cmc.2022.020585
    Abstract Detection of the wormhole attacks is a cumbersome process, particularly simplex and duplex over the wireless sensor networks (WSNs). Wormhole attacks are characterized as distributed passive attacks that can destabilize or disable WSNs. The distributed passive nature of these attacks makes them enormously challenging to detect. The main objective is to find all the possible ways in which how the wireless sensor network’s broadcasting character and transmission medium allows the attacker to interrupt network within the distributed environment. And further to detect the serious routing-disruption attack “Wormhole Attack” step by step through the different network mechanisms. In this paper, a… More >

  • Open AccessOpen Access

    ARTICLE

    Fuzzy Based Latent Dirichlet Allocation for Intrusion Detection in Cloud Using ML

    S. Ranjithkumar1,*, S. Chenthur Pandian2
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4261-4277, 2022, DOI:10.32604/cmc.2022.019031
    Abstract The growth of cloud in modern technology is drastic by provisioning services to various industries where data security is considered to be common issue that influences the intrusion detection system (IDS). IDS are considered as an essential factor to fulfill security requirements. Recently, there are diverse Machine Learning (ML) approaches that are used for modeling effectual IDS. Most IDS are based on ML techniques and categorized as supervised and unsupervised. However, IDS with supervised learning is based on labeled data. This is considered as a common drawback and it fails to identify the attack patterns. Similarly, unsupervised learning fails to… More >

  • Open AccessOpen Access

    ARTICLE

    Automatic Detection and Classification of Human Knee Osteoarthritis Using Convolutional Neural Networks

    Mohamed Yacin Sikkandar1,*, S. Sabarunisha Begum2, Abdulaziz A. Alkathiry3, Mashhor Shlwan N. Alotaibi1, Md Dilsad Manzar4
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4279-4291, 2022, DOI:10.32604/cmc.2022.020571
    Abstract Knee Osteoarthritis (KOA) is a degenerative knee joint disease caused by ‘wear and tear’ of ligaments between the femur and tibial bones. Clinically, KOA is classified into four grades ranging from 1 to 4 based on the degradation of the ligament in between these two bones and causes suffering from impaired movement. Identifying this space between bones through the anterior view of a knee X-ray image is solely subjective and challenging. Automatic classification of this process helps in the selection of suitable treatment processes and customized knee implants. In this research, a new automatic classification of KOA images based on… More >

  • Open AccessOpen Access

    ARTICLE

    An Efficient Proxy Blind Signcryption Scheme for IoT

    Aamer Khan1, Insaf Ullah2,*, Fahad Algarni3, Muhammad Naeem1, M. Irfan Uddin4, Muhammad Asghar Khan2
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4293-4306, 2022, DOI:10.32604/cmc.2022.017318
    (This article belongs to this Special Issue: Deep Learning and Parallel Computing for Intelligent and Efficient IoT)
    Abstract Recent years have witnessed growing scientific research interest in the Internet of Things (IoT) technologies, which supports the development of a variety of applications such as health care, Industry 4.0, agriculture, ecological data management, and other various domains. IoT utilizes the Internet as a prime medium of communication for both single documents as well as multi-digital messages. However, due to the wide-open nature of the Internet, it is important to ensure the anonymity, untraceably, confidentiality, and unforgeability of communication with efficient computational complexity and low bandwidth. We designed a light weight and secure proxy blind signcryption for multi-digital messages based… More >

  • Open AccessOpen Access

    An Access Control Scheme Using Heterogeneous Signcryption for IoT Environments

    Insaf Ullah1,*, Hira Zahid2 , Fahad Algarni3, Muhammad Asghar Khan1
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4307-4321, 2022, DOI:10.32604/cmc.2022.017380
    (This article belongs to this Special Issue: Machine Learning for Data Analytics)
    Abstract

    When the Wireless Sensor Network (WSN) is combined with the Internet of Things (IoT), it can be employed in a wide range of applications, such as agriculture, industry 4.0, health care, smart homes, among others. Accessing the big data generated by these applications in Cloud Servers (CSs), requires higher levels of authenticity and confidentiality during communication conducted through the Internet. Signcryption is one of the most promising approaches nowadays for overcoming such obstacles, due to its combined nature, i.e., signature and encryption. A number of researchers have developed schemes to address issues related to access control in the IoT literature,… More >

  • Open AccessOpen Access

    ARTICLE

    An Intent-Driven Closed-Loop Platform for 5G Network Service Orchestration

    Talha Ahmed Khan, Khizar Abbas, Afaq Muhammad, Wang-Cheol Song*
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4323-4340, 2022, DOI:10.32604/cmc.2022.017118
    (This article belongs to this Special Issue: Intelligent Software-defined Networking (SDN) Technologies for Future Generation Networks)
    Abstract The scope of the 5G network is not only limited to the enhancements in the form of the quality of service (QoS), but it also includes a wide range of services with various requirements. Besides this, many approaches and platforms are under the umbrella of 5G to achieve the goals of end-to-end service provisioning. However, the management of multiple services over heterogeneous platforms is a complex task. Each platform and service have various requirements to be handled by domain experts. Still, if the next-generation network management is dependent on manual updates, it will become impossible to provide seamless service provisioning… More >

  • Open AccessOpen Access

    ARTICLE

    Simulation of Non-Isothermal Turbulent Flows Through Circular Rings of Steel

    Abid. A. Memon1, M. Asif Memon1, Kaleemullah Bhatti1, Kamsing Nonlaopon2,*, Ilyas Khan3
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4341-4355, 2022, DOI:10.32604/cmc.2022.019407
    (This article belongs to this Special Issue: Role of Computer in Modelling & Solving Real-World Problems)
    Abstract This article is intended to examine the fluid flow patterns and heat transfer in a rectangular channel embedded with three semi-circular cylinders comprised of steel at the boundaries. Such an organization is used to generate the heat exchangers with tube and shell because of the production of more turbulence due to zigzag path which is in favor of rapid heat transformation. Because of little maintenance, the heat exchanger of such type is extensively used. Here, we generate simulation of flow and heat transfer using non-isothermal flow interface in the Comsol multiphysics 5.4 which executes the Reynolds averaged Navier stokes equation… More >

  • Open AccessOpen Access

    ARTICLE

    Ensembles of Deep Learning Framework for Stomach Abnormalities Classification

    Talha Saeed, Chu Kiong Loo*, Muhammad Shahreeza Safiruz Kassim
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4357-4372, 2022, DOI:10.32604/cmc.2022.019076
    (This article belongs to this Special Issue: Recent Advances in Deep Learning for Medical Image Analysis)
    Abstract

    Abnormalities of the gastrointestinal tract are widespread worldwide today. Generally, an effective way to diagnose these life-threatening diseases is based on endoscopy, which comprises a vast number of images. However, the main challenge in this area is that the process is time-consuming and fatiguing for a gastroenterologist to examine every image in the set. Thus, this led to the rise of studies on designing AI-based systems to assist physicians in the diagnosis. In several medical imaging tasks, deep learning methods, especially convolutional neural networks (CNNs), have contributed to the state-of-the-art outcomes, where the complicated nonlinear relation between target classes and… More >

  • Open AccessOpen Access

    ARTICLE

    Efficient Deep CNN Model for COVID-19 Classification

    Walid El-Shafai1,2,*, Amira A. Mahmoud1, El-Sayed M. El-Rabaie1, Taha E. Taha1, Osama F. Zahran1, Adel S. El-Fishawy1, Mohammed Abd-Elnaby3, Fathi E. Abd El-Samie1,4
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4373-4391, 2022, DOI:10.32604/cmc.2022.019354
    Abstract Coronavirus (COVID-19) infection was initially acknowledged as a global pandemic in Wuhan in China. World Health Organization (WHO) stated that the COVID-19 is an epidemic that causes a 3.4% death rate. Chest X-Ray (CXR) and Computerized Tomography (CT) screening of infected persons are essential in diagnosis applications. There are numerous ways to identify positive COVID-19 cases. One of the fundamental ways is radiology imaging through CXR, or CT images. The comparison of CT and CXR scans revealed that CT scans are more effective in the diagnosis process due to their high quality. Hence, automated classification techniques are required to facilitate… More >

  • Open AccessOpen Access

    ARTICLE

    An Efficient CNN-Based Hybrid Classification and Segmentation Approach for COVID-19 Detection

    Abeer D. Algarni1,*, Walid El-Shafai2, Ghada M. El Banby3, Fathi E. Abd El-Samie1,2, Naglaa F. Soliman1,4
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4393-4410, 2022, DOI:10.32604/cmc.2022.020265
    Abstract COVID-19 remains to proliferate precipitously in the world. It has significantly influenced public health, the world economy, and the persons’ lives. Hence, there is a need to speed up the diagnosis and precautions to deal with COVID-19 patients. With this explosion of this pandemic, there is a need for automated diagnosis tools to help specialists based on medical images. This paper presents a hybrid Convolutional Neural Network (CNN)-based classification and segmentation approach for COVID-19 detection from Computed Tomography (CT) images. The proposed approach is employed to classify and segment the COVID-19, pneumonia, and normal CT images. The classification stage is… More >

  • Open AccessOpen Access

    ARTICLE

    Prediction of Extremist Behaviour and Suicide Bombing from Terrorism Contents Using Supervised Learning

    Nasir Mahmood*, Muhammad Usman Ghani Khan
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4411-4428, 2022, DOI:10.32604/cmc.2022.013956
    (This article belongs to this Special Issue: Machine Learning-based Intelligent Systems: Theories, Algorithms, and Applications)
    Abstract This study proposes an architecture for the prediction of extremist human behaviour from projected suicide bombings. By linking ‘dots’ of police data comprising scattered information of people, groups, logistics, locations, communication, and spatiotemporal characters on different social media groups, the proposed architecture will spawn beneficial information. This useful information will, in turn, help the police both in predicting potential terrorist events and in investigating previous events. Furthermore, this architecture will aid in the identification of criminals and their associates and handlers. Terrorism is psychological warfare, which, in the broadest sense, can be defined as the utilisation of deliberate violence for… More >

  • Open AccessOpen Access

    ARTICLE

    Blockchain and Machine Learning for Intelligent Multiple Factor-Based Ride-Hailing Services

    Zeinab Shahbazi, Yung-Cheol Byun*
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4429-4446, 2022, DOI:10.32604/cmc.2022.019755
    (This article belongs to this Special Issue: Advancements in Lightweight AI for Constrained Internet of Things Devices for Smart Cities)
    Abstract One of the common transportation systems in Korea is calling taxis through online applications, which is more convenient for passengers and drivers in the modern area. However, the driver's passenger taxi request can be rejected based on the driver's location and distance. Therefore, there is a need to specify driver's acceptance and rejection of the received request. The security of this system is another main core to save the transaction information and safety of passengers and drivers. In this study, the origin and destination of the Jeju island South Korea were captured from T-map and processed based on machine learning… More >

  • Open AccessOpen Access

    ARTICLE

    A Hybrid Model for Reliability Aware and Energy-Efficiency in Multicore Systems

    Samar Nour1,*, Sameh A. Salem1,2, Shahira M. Habashy1
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4447-4466, 2022, DOI:10.32604/cmc.2022.020775
    Abstract Recently, Multicore systems use Dynamic Voltage/Frequency Scaling (DV/FS) technology to allow the cores to operate with various voltage and/or frequencies than other cores to save power and enhance the performance. In this paper, an effective and reliable hybrid model to reduce the energy and makespan in multicore systems is proposed. The proposed hybrid model enhances and integrates the greedy approach with dynamic programming to achieve optimal Voltage/Frequency (Vmin/F) levels. Then, the allocation process is applied based on the available workloads. The hybrid model consists of three stages. The first stage gets the optimum safe voltage while the second stage sets… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Neural Artificial Intelligence for IoT Based Tele Health Data Analytics

    Nithya Rekha Sivakumar1,*, Ahmed Zohair Ibrahim2
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4467-4483, 2022, DOI:10.32604/cmc.2022.019041
    Abstract

    Tele health utilizes information and communication mechanisms to convey medical information for providing clinical and educational assistances. It makes an effort to get the better of issues of health service delivery involving time factor, space and laborious terrains, validating cost-efficiency and finer ingress in both developed and developing countries. Tele health has been categorized into either real-time electronic communication, or store-and-forward communication. In recent years, a third-class has been perceived as remote healthcare monitoring or tele health, presuming data obtained via Internet of Things (IOT). Although, tele health data analytics and machine learning have been researched in great depth, there… More >

  • Open AccessOpen Access

    ARTICLE

    Distributed Secure Storage Scheme Based on Sharding Blockchain

    Jin Wang1,2, Chenchen Han1, Xiaofeng Yu3,*, Yongjun Ren4, R. Simon Sherratt5
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4485-4502, 2022, DOI:10.32604/cmc.2022.020648
    Abstract Distributed storage can store data in multiple devices or servers to improve data security. However, in today's explosive growth of network data, traditional distributed storage scheme is faced with some severe challenges such as insufficient performance, data tampering, and data lose. A distributed storage scheme based on blockchain has been proposed to improve security and efficiency of traditional distributed storage. Under this scheme, the following improvements have been made in this paper. This paper first analyzes the problems faced by distributed storage. Then proposed to build a new distributed storage blockchain scheme with sharding blockchain. The proposed scheme realizes the… More >

  • Open AccessOpen Access

    A Global Training Model for Beat Classification Using Basic Electrocardiogram Morphological Features

    Shubha Sumesh1, John Yearwood1, Shamsul Huda1 and Shafiq Ahmad2,*
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4503-4521, 2022, DOI:10.32604/cmc.2022.015474
    (This article belongs to this Special Issue: Deep Learning and Parallel Computing for Intelligent and Efficient IoT)
    Abstract

    Clinical Study and automatic diagnosis of electrocardiogram (ECG) data always remain a challenge in diagnosing cardiovascular activities. The analysis of ECG data relies on various factors like morphological features, classification techniques, methods or models used to diagnose and its performance improvement. Another crucial factor in the methodology is how to train the model for each patient. Existing approaches use standard training model which faces challenges when training data has variation due to individual patient characteristics resulting in a lower detection accuracy. This paper proposes an adaptive approach to identify performance improvement in building a training model that analyze global training… More >

  • Open AccessOpen Access

    ARTICLE

    Medical Data Clustering and Classification Using TLBO and Machine Learning Algorithms

    Ashutosh Kumar Dubey1,*, Umesh Gupta2, Sonal Jain2
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4523-4543, 2022, DOI:10.32604/cmc.2022.021148
    (This article belongs to this Special Issue: Role of Machine Learning and Evolutionary Algorithms for Cancer Detection and Prediction)
    Abstract This study aims to empirically analyze teaching-learning-based optimization (TLBO) and machine learning algorithms using k-means and fuzzy c-means (FCM) algorithms for their individual performance evaluation in terms of clustering and classification. In the first phase, the clustering (k-means and FCM) algorithms were employed independently and the clustering accuracy was evaluated using different computational measures. During the second phase, the non-clustered data obtained from the first phase were preprocessed with TLBO. TLBO was performed using k-means (TLBO-KM) and FCM (TLBO-FCM) (TLBO-KM/FCM) algorithms. The objective function was determined by considering both minimization and maximization criteria. Non-clustered data obtained from the first phase… More >

  • Open AccessOpen Access

    ARTICLE

    Novel Quantum Algorithms to Minimize Switching Functions Based on Graph Partitions

    Peng Gao*, Marek Perkowski, Yiwei Li, Xiaoyu Song
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4545-4561, 2022, DOI:10.32604/cmc.2022.020483
    Abstract After Google reported its realization of quantum supremacy, Solving the classical problems with quantum computing is becoming a valuable research topic. Switching function minimization is an important problem in Electronic Design Automation (EDA) and logic synthesis, most of the solutions are based on heuristic algorithms with a classical computer, it is a good practice to solve this problem with a quantum processer. In this paper, we introduce a new hybrid classic quantum algorithm using Grover’s algorithm and symmetric functions to minimize small Disjoint Sum of Product (DSOP) and Sum of Product (SOP) for Boolean switching functions. Our method is based… More >

  • Open AccessOpen Access

    ARTICLE

    Convolutional Neural Network Based Intelligent Handwritten Document Recognition

    Sagheer Abbas1, Yousef Alhwaiti2, Areej Fatima3, Muhammad A. Khan4, Muhammad Adnan Khan5,*, Taher M. Ghazal6,7, Asma Kanwal1,8, Munir Ahmad1, Nouh Sabri Elmitwally2,9
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4563-4581, 2022, DOI:10.32604/cmc.2022.021102
    Abstract This paper presents a handwritten document recognition system based on the convolutional neural network technique. In today’s world, handwritten document recognition is rapidly attaining the attention of researchers due to its promising behavior as assisting technology for visually impaired users. This technology is also helpful for the automatic data entry system. In the proposed system prepared a dataset of English language handwritten character images. The proposed system has been trained for the large set of sample data and tested on the sample images of user-defined handwritten documents. In this research, multiple experiments get very worthy recognition results. The proposed system… More >

  • Open AccessOpen Access

    ARTICLE

    Dual-Port Content Addressable Memory for Cache Memory Applications

    Allam Abumwais1,*, Adil Amirjanov1, Kaan Uyar1, Mujahed Eleyat2
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4583-4597, 2022, DOI:10.32604/cmc.2022.020529
    (This article belongs to this Special Issue: Application of Big Data Analytics in the Management of Business)
    Abstract Multicore systems oftentimes use multiple levels of cache to bridge the gap between processor and memory speed. This paper presents a new design of a dedicated pipeline cache memory for multicore processors called dual port content addressable memory (DPCAM). In addition, it proposes a new replacement algorithm based on hardware which is called a near-far access replacement algorithm (NFRA) to reduce the cost overhead of the cache controller and improve the cache access latency. The experimental results indicated that the latency for write and read operations are significantly less in comparison with a set-associative cache memory. Moreover, it was shown… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Learning Based Modeling of Groundwater Storage Change

    Mohd Anul Haq1,*, Abdul Khadar Jilani1, P. Prabu2
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4599-4617, 2022, DOI:10.32604/cmc.2022.020495
    Abstract The understanding of water resource changes and a proper projection of their future availability are necessary elements of sustainable water planning. Monitoring GWS change and future water resource availability are crucial, especially under changing climatic conditions. Traditional methods for in situ groundwater well measurement are a significant challenge due to data unavailability. The present investigation utilized the Long Short Term Memory (LSTM) networks to monitor and forecast Terrestrial Water Storage Change (TWSC) and Ground Water Storage Change (GWSC) based on Gravity Recovery and Climate Experiment (GRACE) datasets from 2003–2025 for five basins of Saudi Arabia. An attempt has been made… More >

  • Open AccessOpen Access

    ARTICLE

    EEG-Based Neonatal Sleep Stage Classification Using Ensemble Learning

    Saadullah Farooq Abbasi1,2, Harun Jamil3, Wei Chen2,*
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4619-4633, 2022, DOI:10.32604/cmc.2022.020318
    (This article belongs to this Special Issue: Advancements in Lightweight AI for Constrained Internet of Things Devices for Smart Cities)
    Abstract Sleep stage classification can provide important information regarding neonatal brain development and maturation. Visual annotation, using polysomnography (PSG), is considered as a gold standard for neonatal sleep stage classification. However, visual annotation is time consuming and needs professional neurologists. For this reason, an internet of things and ensemble-based automatic sleep stage classification has been proposed in this study. 12 EEG features, from 9 bipolar channels, were used to train and test the base classifiers including convolutional neural network, support vector machine, and multilayer perceptron. Bagging and stacking ensembles are then used to combine the outputs for final classification. The proposed… More >

  • Open AccessOpen Access

    ARTICLE

    Mechanical Properties of All MoS2 Monolayer Heterostructures: Crack Propagation and Existing Notch Study

    Reza Khademi Zahedi1, Naif Alajlan2, Hooman Khademi Zahedi3, Timon Rabczuk2,*
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4635-4655, 2022, DOI:10.32604/cmc.2022.017682
    Abstract The outstanding thermal, optical, electrical and mechanical properties of molybdenum disolphide (MoS2) heterostructures make them exceptional candidates for an extensive area of applications. Nevertheless, despite considerable technological and academic interest, there is presently a few information regarding the mechanical properties of these novel two-dimensional (2D) materials in the presence of the defects. In this manuscript, we performed extensive molecular dynamics simulations on pre-cracked and pre-notched all-molybdenum disolphide (MoS2) heterostructure systems using ReaxFF force field. Therefore, we study the influence of several central-crack lengths and notch diameters on the mechanical response of 2H phase, 1T phase and composite 2H /1T MoS2More >

  • Open AccessOpen Access

    ARTICLE

    Analytic Beta-Wavelet Transform-Based Digital Image Watermarking for Secure Transmission

    Hesham Alhumyani1,*, Ibrahim Alrube1, Sameer Alsharif1, Ashraf Afifi1, Chokri Ben Amar1, Hala S. El-Sayed2, Osama S. Faragallah3
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4657-4673, 2022, DOI:10.32604/cmc.2022.020338
    Abstract The rapid development in the information technology field has introduced digital watermark technologies as a solution to prevent unauthorized copying and redistribution of data. This article introduces a self-embedded image verification and integrity scheme. The images are firstly split into dedicated segments of the same block sizes. Then, different Analytic Beta-Wavelet (ABW) orthogonal filters are utilized for embedding a self-segment watermark for image segment using a predefined method. ABW orthogonal filter coefficients are estimated to improve image reconstruction under different block sizes. We conduct a comparative study comparing the watermarked images using three kinds of ABW filters for block sizes… More >

  • Open AccessOpen Access

    ARTICLE

    Dynamic Hand Gesture Recognition Using 3D-CNN and LSTM Networks

    Muneeb Ur Rehman1, Fawad Ahmed1, Muhammad Attique Khan2, Usman Tariq3, Faisal Abdulaziz Alfouzan4, Nouf M. Alzahrani5, Jawad Ahmad6,*
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4675-4690, 2022, DOI:10.32604/cmc.2022.019586
    (This article belongs to this Special Issue: Recent Advances in Deep Learning, Information Fusion, and Features Selection for Video Surveillance Application)
    Abstract Recognition of dynamic hand gestures in real-time is a difficult task because the system can never know when or from where the gesture starts and ends in a video stream. Many researchers have been working on vision-based gesture recognition due to its various applications. This paper proposes a deep learning architecture based on the combination of a 3D Convolutional Neural Network (3D-CNN) and a Long Short-Term Memory (LSTM) network. The proposed architecture extracts spatial-temporal information from video sequences input while avoiding extensive computation. The 3D-CNN is used for the extraction of spectral and spatial features which are then given to… More >

  • Open AccessOpen Access

    ARTICLE

    Position Control of Flexible Joint Carts Using Adaptive Generalized Dynamics Inversion

    Ibrahim M. Mehedi1,2,*, Mohd Heidir Mohd Shah1 , Soon Xin Ng3 , Abdulah Jeza Aljohani1,2, Mohammed El-Hajjar3, Muhammad Moinuddin1,2
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4691-4705, 2022, DOI:10.32604/cmc.2022.020954
    (This article belongs to this Special Issue: Recent Advances in Metaheuristic Techniques and Their Real-World Applications)
    Abstract

    This paper presents the design and implementation of Adaptive Generalized Dynamic Inversion (AGDI) to track the position of a Linear Flexible Joint Cart (LFJC) system along with vibration suppression of the flexible joint. The proposed AGDI control law will be comprised of two control elements. The baseline (continuous) control law is based on principle of conventional GDI approach and is established by prescribing the constraint dynamics of controlled state variables that reflect the control objectives. The control law is realized by inverting the prescribed dynamics using dynamically scaled Moore-Penrose generalized inversion. To boost the robust attributes against system nonlinearities, parametric… More >

  • Open AccessOpen Access

    ARTICLE

    Ontology Based Ocean Knowledge Representation for Semantic Information Retrieval

    Anitha Velu*, Menakadevi Thangavelu
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4707-4724, 2022, DOI:10.32604/cmc.2022.020095
    Abstract The drastic growth of coastal observation sensors results in copious data that provide weather information. The intricacies in sensor-generated big data are heterogeneity and interpretation, driving high-end Information Retrieval (IR) systems. The Semantic Web (SW) can solve this issue by integrating data into a single platform for information exchange and knowledge retrieval. This paper focuses on exploiting the SW base system to provide interoperability through ontologies by combining the data concepts with ontology classes. This paper presents a 4-phase weather data model: data processing, ontology creation, SW processing, and query engine. The developed Oceanographic Weather Ontology helps to enhance data… More >

  • Open AccessOpen Access

    ARTICLE

    A Non-Destructive Time Series Model for the Estimation of Cherry Coffee Production

    Jhonn Pablo Rodríguez1,*, David Camilo Corrales1,2, David Griol3, Zoraida Callejas3, Juan Carlos Corrales1
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4725-4743, 2022, DOI:10.32604/cmc.2022.019135
    (This article belongs to this Special Issue: Artificial Intelligence based Smart precision agriculture with analytic pattern in sustainable environments using IoT)
    Abstract Coffee plays a key role in the generation of rural employment in Colombia. More than 785,000 workers are directly employed in this activity, which represents the 26% of all jobs in the agricultural sector. Colombian coffee growers estimate the production of cherry coffee with the main aim of planning the required activities, and resources (number of workers, required infrastructures), anticipating negotiations, estimating, price, and foreseeing losses of coffee production in a specific territory. These important processes can be affected by several factors that are not easy to predict (e.g., weather variability, diseases, or plagues.). In this paper, we propose a… More >

  • Open AccessOpen Access

    ARTICLE

    Reactions’ Descriptors Selection and Yield Estimation Using Metaheuristic Algorithms and Voting Ensemble

    Olutomilayo Olayemi Petinrin1, Faisal Saeed2, Xiangtao Li1, Fahad Ghabban2, Ka-Chun Wong1,3,*
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4745-4762, 2022, DOI:10.32604/cmc.2022.020523
    (This article belongs to this Special Issue: Recent Advances in Metaheuristic Techniques and Their Real-World Applications)
    Abstract Bioactive compounds in plants, which can be synthesized using N-arylation methods such as the Buchwald-Hartwig reaction, are essential in drug discovery for their pharmacological effects. Important descriptors are necessary for the estimation of yields in these reactions. This study explores ten metaheuristic algorithms for descriptor selection and model a voting ensemble for evaluation. The algorithms were evaluated based on computational time and the number of selected descriptors. Analyses show that robust performance is obtained with more descriptors, compared to cases where fewer descriptors are selected. The essential descriptor was deduced based on the frequency of occurrence within the 50 extracted… More >

  • Open AccessOpen Access

    ARTICLE

    BERT for Conversational Question Answering Systems Using Semantic Similarity Estimation

    Abdulaziz Al-Besher1, Kailash Kumar1, M. Sangeetha2,*, Tinashe Butsa3
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4763-4780, 2022, DOI:10.32604/cmc.2022.021033
    Abstract Most of the questions from users lack the context needed to thoroughly understand the problem at hand, thus making the questions impossible to answer. Semantic Similarity Estimation is based on relating user’s questions to the context from previous Conversational Search Systems (CSS) to provide answers without requesting the user's context. It imposes constraints on the time needed to produce an answer for the user. The proposed model enables the use of contextual data associated with previous Conversational Searches (CS). While receiving a question in a new conversational search, the model determines the question that refers to more past CS. The… More >

  • Open AccessOpen Access

    ARTICLE

    Error Detection and Pattern Prediction Through Phase II Process Monitoring

    Azam Zaka1, Riffat Jabeen2,*, Kanwal Iqbal Khan3
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4781-4802, 2022, DOI:10.32604/cmc.2022.020316
    (This article belongs to this Special Issue: Emerging Trends and Real-World Applications of Intelligent Computing Techniques)
    Abstract The continuous monitoring of the machine is beneficial in improving its process reliability through reflected power function distribution. It is substantial for identifying and removing errors at the early stages of production that ultimately benefit the firms in cost-saving and quality improvement. The current study introduces control charts that help the manufacturing concerns to keep the production process in control. It presents an exponentially weighted moving average and extended exponentially weighted moving average and then compared their performance. The percentiles estimator and the modified maximum likelihood estimator are used to constructing the control charts. The findings suggest that an extended… More >

  • Open AccessOpen Access

    ARTICLE

    IRKO: An Improved Runge-Kutta Optimization Algorithm for Global Optimization Problems

    R. Manjula Devi1, M. Premkumar2, Pradeep Jangir3, Mohamed Abdelghany Elkotb4,5, Rajvikram Madurai Elavarasan6, Kottakkaran Sooppy Nisar7,*
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4803-4827, 2022, DOI:10.32604/cmc.2022.020847
    Abstract Optimization is a key technique for maximizing or minimizing functions and achieving optimal cost, gains, energy, mass, and so on. In order to solve optimization problems, metaheuristic algorithms are essential. Most of these techniques are influenced by collective knowledge and natural foraging. There is no such thing as the best or worst algorithm; instead, there are more effective algorithms for certain problems. Therefore, in this paper, a new improved variant of a recently proposed metaphorless Runge-Kutta Optimization (RKO) algorithm, called Improved Runge-Kutta Optimization (IRKO) algorithm, is suggested for solving optimization problems. The IRKO is formulated using the basic RKO and… More >

  • Open AccessOpen Access

    A Hybrid Neural Network and Box-Jenkins Models for Time Series Forecasting

    Mohammad Hadwan1,2,3,*, Basheer M. Al-Maqaleh4 , Fuad N. Al-Badani5 , Rehan Ullah Khan1,3, Mohammed A. Al-Hagery6
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4829-4845, 2022, DOI:10.32604/cmc.2022.017824
    Abstract

    Time series forecasting plays a significant role in numerous applications, including but not limited to, industrial planning, water consumption, medical domains, exchange rates and consumer price index. The main problem is insufficient forecasting accuracy. The present study proposes a hybrid forecasting methods to address this need. The proposed method includes three models. The first model is based on the autoregressive integrated moving average (ARIMA) statistical model; the second model is a back propagation neural network (BPNN) with adaptive slope and momentum parameters; and the third model is a hybridization between ARIMA and BPNN (ARIMA/BPNN) and artificial neural networks and ARIMA… More >

  • Open AccessOpen Access

    ARTICLE

    Improved Software Implementation for Montgomery Elliptic Curve Cryptosystem

    Mohammad Al-Khatib*, Wafaa Saif
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4847-4865, 2022, DOI:10.32604/cmc.2022.021483
    Abstract The last decade witnessed rapid increase in multimedia and other applications that require transmitting and protecting huge amount of data streams simultaneously. For such applications, a high-performance cryptosystem is compulsory to provide necessary security services. Elliptic curve cryptosystem (ECC) has been introduced as a considerable option. However, the usual sequential implementation of ECC and the standard elliptic curve (EC) form cannot achieve required performance level. Moreover, the widely used Hardware implementation of ECC is costly option and may be not affordable. This research aims to develop a high-performance parallel software implementation for ECC. To achieve this, many experiments were performed… More >

  • Open AccessOpen Access

    ARTICLE

    Defocus Blur Segmentation Using Genetic Programming and Adaptive Threshold

    Muhammad Tariq Mahmood*
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4867-4882, 2022, DOI:10.32604/cmc.2022.019544
    (This article belongs to this Special Issue: Security and Privacy issues for various Emerging Technologies and Future Trends)
    Abstract Detection and classification of the blurred and the non-blurred regions in images is a challenging task due to the limited available information about blur type, scenarios and level of blurriness. In this paper, we propose an effective method for blur detection and segmentation based on transfer learning concept. The proposed method consists of two separate steps. In the first step, genetic programming (GP) model is developed that quantify the amount of blur for each pixel in the image. The GP model method uses the multi-resolution features of the image and it provides an improved blur map. In the second phase,… More >

  • Open AccessOpen Access

    ARTICLE

    Optimal Confidential Mechanisms in Smart City Healthcare

    R. Gopi1,*, P. Muthusamy2, P. Suresh3, C. G. Gabriel Santhosh Kumar4, Irina V. Pustokhina5, Denis A. Pustokhin6, K. Shankar7
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4883-4896, 2022, DOI:10.32604/cmc.2022.019442
    Abstract Smart City Healthcare (SHC2) system is applied in monitoring the patient at home while it is also expected to react to their needs in a timely manner. The system also concedes the freedom of a patient. IoT is a part of this system and it helps in providing care to the patients. IoT-based healthcare devices are trustworthy since it almost certainly recognizes the potential intensifications at very early stage and alerts the patients and medical experts to such an extent that they are provided with immediate care. Existing methodologies exhibit few shortcomings in terms of computational complexity, cost and data… More >

  • Open AccessOpen Access

    ARTICLE

    Towards Securing Machine Learning Models Against Membership Inference Attacks

    Sana Ben Hamida1,2, Hichem Mrabet3,4, Sana Belguith5,*, Adeeb Alhomoud6, Abderrazak Jemai7
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4897-4919, 2022, DOI:10.32604/cmc.2022.019709
    (This article belongs to this Special Issue: AI for Wearable Sensing--Smartphone / Smartwatch User Identification / Authentication)
    Abstract From fraud detection to speech recognition, including price prediction, Machine Learning (ML) applications are manifold and can significantly improve different areas. Nevertheless, machine learning models are vulnerable and are exposed to different security and privacy attacks. Hence, these issues should be addressed while using ML models to preserve the security and privacy of the data used. There is a need to secure ML models, especially in the training phase to preserve the privacy of the training datasets and to minimise the information leakage. In this paper, we present an overview of ML threats and vulnerabilities, and we highlight current progress… More >

  • Open AccessOpen Access

    ARTICLE

    Machine Learning Approaches to Detect DoS and Their Effect on WSNs Lifetime

    Raniyah Wazirali1, Rami Ahmad2,*
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4922-4946, 2022, DOI:10.32604/cmc.2022.020044
    (This article belongs to this Special Issue: Advanced IoT Industrial Solutions and Cyber Security Threats in Communication Networks)
    Abstract Energy and security remain the main two challenges in Wireless Sensor Networks (WSNs). Therefore, protecting these WSN networks from Denial of Service (DoS) and Distributed DoS (DDoS) is one of the WSN networks security tasks. Traditional packet deep scan systems that rely on open field inspection in transport layer security packets and the open field encryption trend are making machine learning-based systems the only viable choice for these types of attacks. This paper contributes to the evaluation of the use machine learning algorithms in WSN nodes traffic and their effect on WSN network life time. We examined the performance metrics… More >

  • Open AccessOpen Access

    ARTICLE

    Personality Detection Using Context Based Emotions in Cognitive Agents

    Nouh Sabri Elmitwally1,2, Asma Kanwal3,4, Sagheer Abbas3, Muhammad A. Khan5, Muhammad Adnan Khan6,*, Munir Ahmad3, Saad Alanazi1
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4947-4964, 2022, DOI:10.32604/cmc.2022.021104
    Abstract Detection of personality using emotions is a research domain in artificial intelligence. At present, some agents can keep the human’s profile for interaction and adapts themselves according to their preferences. However, the effective method for interaction is to detect the person’s personality by understanding the emotions and context of the subject. The idea behind adding personality in cognitive agents begins an attempt to maximize adaptability on the basis of behavior. In our daily life, humans socially interact with each other by analyzing the emotions and context of interaction from audio or visual input. This paper presents a conceptual personality model… More >

  • Open AccessOpen Access

    ARTICLE

    Hybrid Sensor Selection Technique for Lifetime Extension of Wireless Sensor Networks

    Khaled M. Fouad1 , Basma M. Hassan2,*, Omar M. Salim3
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4965-4985, 2022, DOI:10.32604/cmc.2022.020926
    (This article belongs to this Special Issue: Role of Computer in Modelling & Solving Real-World Problems)
    Abstract

    Energy conservation is a crucial issue to extend the lifetime of wireless sensor networks (WSNs) where the battery capacity and energy sources are very restricted. Intelligent energy-saving techniques can help designers overcome this issue by reducing the number of selected sensors that report environmental measurements by eliminating all replicated and unrelated features. This paper suggests a Hybrid Sensor Selection (HSS) technique that combines filter-wrapper method to acquire a rich-informational subset of sensors in a reasonable time. HSS aims to increase the lifetime of WSNs by using the optimal number of sensors. At the same time, HSS maintains the desired level… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Auto-Annotation Technique for Aspect Level Sentiment Analysis

    Muhammad Aasim Qureshi1,*, Muhammad Asif1, Mohd Fadzil Hassan2, Ghulam Mustafa1, Muhammad Khurram Ehsan1, Aasim Ali1, Unaza Sajid1
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4987-5004, 2022, DOI:10.32604/cmc.2022.020544
    (This article belongs to this Special Issue: Machine Learning Empowered Secure Computing for Intelligent Systems)
    Abstract In machine learning, sentiment analysis is a technique to find and analyze the sentiments hidden in the text. For sentiment analysis, annotated data is a basic requirement. Generally, this data is manually annotated. Manual annotation is time consuming, costly and laborious process. To overcome these resource constraints this research has proposed a fully automated annotation technique for aspect level sentiment analysis. Dataset is created from the reviews of ten most popular songs on YouTube. Reviews of five aspects—voice, video, music, lyrics and song, are extracted. An N-Gram based technique is proposed. Complete dataset consists of 369436 reviews that took 173.53… More >

  • Open AccessOpen Access

    ARTICLE

    Alzheimer Disease Detection Empowered with Transfer Learning

    Taher M. Ghazal1,2, Sagheer Abbas3, Sundus Munir3,4, M. A. Khan5, Munir Ahmad3, Ghassan F. Issa2, Syeda Binish Zahra4, Muhammad Adnan Khan6,*, Mohammad Kamrul Hasan1
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5005-5019, 2022, DOI:10.32604/cmc.2022.020866
    Abstract Alzheimer's disease is a severe neuron disease that damages brain cells which leads to permanent loss of memory also called dementia. Many people die due to this disease every year because this is not curable but early detection of this disease can help restrain the spread. Alzheimer's is most common in elderly people in the age bracket of 65 and above. An automated system is required for early detection of disease that can detect and classify the disease into multiple Alzheimer classes. Deep learning and machine learning techniques are used to solve many medical problems like this. The proposed system… More >

  • Open AccessOpen Access

    ARTICLE

    Semantic Information Extraction from Multi-Corpora Using Deep Learning

    Sunil Kumar1, Hanumat G. Sastry1, Venkatadri Marriboyina2, Hammam Alshazly3,*, Sahar Ahmed Idris4, Madhushi Verma5, Manjit Kaur5
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5021-5038, 2022, DOI:10.32604/cmc.2022.021149
    (This article belongs to this Special Issue: Recent Advances in Metaheuristic Techniques and Their Real-World Applications)
    Abstract Information extraction plays a vital role in natural language processing, to extract named entities and events from unstructured data. Due to the exponential data growth in the agricultural sector, extracting significant information has become a challenging task. Though existing deep learning-based techniques have been applied in smart agriculture for crop cultivation, crop disease detection, weed removal, and yield production, still it is difficult to find the semantics between extracted information due to unswerving effects of weather, soil, pest, and fertilizer data. This paper consists of two parts. An initial phase, which proposes a data preprocessing technique for removal of ambiguity… More >

  • Open AccessOpen Access

    ARTICLE

    Local-Tetra-Patterns for Face Recognition Encoded on Spatial Pyramid Matching

    Khuram Nawaz Khayam1, Zahid Mehmood2,*, Hassan Nazeer Chaudhry3, Muhammad Usman Ashraf4, Usman Tariq5, Mohammed Nawaf Altouri6, Khalid Alsubhi7
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5039-5058, 2022, DOI:10.32604/cmc.2022.019975
    Abstract Face recognition is a big challenge in the research field with a lot of problems like misalignment, illumination changes, pose variations, occlusion, and expressions. Providing a single solution to solve all these problems at a time is a challenging task. We have put some effort to provide a solution to solving all these issues by introducing a face recognition model based on local tetra patterns and spatial pyramid matching. The technique is based on a procedure where the input image is passed through an algorithm that extracts local features by using spatial pyramid matching and max-pooling. Finally, the input image… More >

  • Open AccessOpen Access

    ARTICLE

    Convolutional Neural Network-Based Regression for Predicting the Chloride Ion Diffusion Coefficient of Concrete

    Hyun Kyu Shin1, Ha Young Kim2, Sang Hyo Lee3,*
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5059-5071, 2022, DOI:10.32604/cmc.2022.017262
    Abstract The durability performance of reinforced concrete (RC) building structures is significantly affected by the corrosion of the steel reinforcement due to chloride penetration, thus, the chloride ion diffusion coefficient should be investigated through experiments or theoretical equations to assess the durability of an RC structure. This study aims to predict the chloride ion diffusion coefficient of concrete, a heterogeneous material. A convolutional neural network (CNN)-based regression model that learns the condition of the concrete surface through deep learning, is developed to efficiently obtain the chloride ion diffusion coefficient. For the model implementation to determine the chloride ion diffusion coefficient, concrete… More >

  • Open AccessOpen Access

    ARTICLE

    Controller Placement in Software Defined Internet of Things Using Optimization Algorithm

    Sikander Hans1, Smarajit Ghosh1, Aman Kataria2, Vinod Karar2,*, Sarika Sharma3
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5073-5089, 2022, DOI:10.32604/cmc.2022.019971
    Abstract The current and future status of the internet is represented by the upcoming Internet of Things (IoT). The internet can connect the huge amount of data, which contains lot of processing operations and efforts to transfer the pieces of information. The emerging IoT technology in which the smart ecosystem is enabled by the physical object fixed with software electronics, sensors and network connectivity. Nowadays, there are two trending technologies that take the platform i.e., Software Defined Network (SDN) and IoT (SD-IoT). The main aim of the IoT network is to connect and organize different objects with the internet, which is… More >

  • Open AccessOpen Access

    ARTICLE

    Forecasting E-Commerce Adoption Based on Bidirectional Recurrent Neural Networks

    Abdullah Ali Salamai1,*, Ather Abdulrahman Ageeli1, El-Sayed M. El-kenawy2
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5091-5106, 2022, DOI:10.32604/cmc.2022.021268
    (This article belongs to this Special Issue: Artificial Intelligence and Machine Learning Algorithms in Real-World Applications and Theories)
    Abstract E-commerce refers to a system that allows individuals to purchase and sell things online. The primary goal of e-commerce is to offer customers the convenience of not going to a physical store to make a purchase. They will purchase the item online and have it delivered to their home within a few days. The goal of this research was to develop machine learning algorithms that might predict e-commerce platform sales. A case study has been designed in this paper based on a proposed continuous Stochastic Fractal Search (SFS) based on a Guided Whale Optimization Algorithm (WOA) to optimize the parameter… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-View Multi-Modal Head-Gaze Estimation for Advanced Indoor User Interaction

    Jung-Hwa Kim1, Jin-Woo Jeong2,*
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5107-5132, 2022, DOI:10.32604/cmc.2022.021107
    Abstract Gaze estimation is one of the most promising technologies for supporting indoor monitoring and interaction systems. However, previous gaze estimation techniques generally work only in a controlled laboratory environment because they require a number of high-resolution eye images. This makes them unsuitable for welfare and healthcare facilities with the following challenging characteristics: 1) users’ continuous movements, 2) various lighting conditions, and 3) a limited amount of available data. To address these issues, we introduce a multi-view multi-modal head-gaze estimation system that translates the user’s head orientation into the gaze direction. The proposed system captures the user using multiple cameras with… More >

  • Open AccessOpen Access

    ARTICLE

    Fractional Order Linear Active Disturbance Rejection Control for Linear Flexible Joint System

    Ibrahim M. Mehedi1,2,*, Rachid Mansouri3, Ubaid M. Al-Saggaf1,2, Ahmed I. M. Iskanderani1, Maamar Bettayeb4, Abdulah Jeza Aljohani1,2, Thangam Palaniswamy1, Shaikh Abdul Latif5, Abdul Latif6
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5133-5142, 2022, DOI:10.32604/cmc.2022.021018
    (This article belongs to this Special Issue: Recent Advances in Metaheuristic Techniques and Their Real-World Applications)
    Abstract A linear flexible joint system using fractional order linear active disturbance rejection control is studied in this paper. With this control scheme, the performance against disturbances, uncertainties, and attenuation is enhanced. Linear active disturbance rejection control (LADRC) is mainly based on an extended state observer (ESO) technology. A fractional integral (FOI) action is combined with the LADRC technique which proposes a hybrid control scheme like FO-LADRC. Incorporating this FOI action improves the robustness of the standard LADRC. The set-point tracking of the proposed FO-LADRC scheme is designed by Bode's ideal transfer function (BITF) based robust closed-loop concept, an appropriate pole… More >

Per Page:

Share Link