Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (41)
  • Open Access

    ARTICLE

    Takagi–Sugeno Fuzzy Modeling and Control for Effective Robotic Manipulator Motion

    Izzat Al-Darraji1,2, Ayad A. Kakei2, Ayad Ghany Ismaeel3, Georgios Tsaramirsis4, Fazal Qudus Khan5, Princy Randhawa6, Muath Alrammal4, Sadeeq Jan7,*

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1011-1024, 2022, DOI:10.32604/cmc.2022.022451

    Abstract Robotic manipulators are widely used in applications that require fast and precise motion. Such devices, however, are prompt to nonlinear control issues due to the flexibility in joints and the friction in the motors within the dynamics of their rigid part. To address these issues, the Linear Matrix Inequalities (LMIs) and Parallel Distributed Compensation (PDC) approaches are implemented in the Takagy–Sugeno Fuzzy Model (T-SFM). We propose the following methodology; initially, the state space equations of the nonlinear manipulator model are derived. Next, a Takagy–Sugeno Fuzzy Model (T-SFM) technique is used for linearizing the state space equations of the nonlinear manipulator.… More >

  • Open Access

    Preserving Privacy of User Identity Based on Pseudonym Variable in 5G

    Mamoon M. Saeed1, Mohammad Kamrul Hasan2,*, Rosilah Hassan2 , Rania Mokhtar3 , Rashid A. Saeed3,4, Elsadig Saeid1, Manoj Gupta5

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5551-5568, 2022, DOI:10.32604/cmc.2022.017338

    Abstract

    The fifth generation (5G) system is the forthcoming generation of the mobile communication system. It has numerous additional features and offers an extensively high data rate, more capacity, and low latency. However, these features and applications have many problems and issues in terms of security, which has become a great challenge in the telecommunication industry. This paper aimed to propose a solution to preserve the user identity privacy in the 5G system that can identify permanent identity by using Variable Mobile Subscriber Identity, which randomly changes and does not use the permanent identity between the user equipment and home network.… More >

  • Open Access

    ARTICLE

    Automatic Classification of Superimposed Modulations for 5G MIMO Two-Way Cognitive Relay Networks

    Haithem Ben Chikha, Ahmad Almadhor*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1799-1814, 2022, DOI:10.32604/cmc.2022.018819

    Abstract To promote reliable and secure communications in the cognitive radio network, the automatic modulation classification algorithms have been mainly proposed to estimate a single modulation. In this paper, we address the classification of superimposed modulations dedicated to 5G multiple-input multiple-output (MIMO) two-way cognitive relay network in realistic channels modeled with Nakagami- distribution. Our purpose consists of classifying pairs of users modulations from superimposed signals. To achieve this goal, we apply the higher-order statistics in conjunction with the MultiBoostAB classifier. We use several efficiency metrics including the true positive (TP) rate, false positive (FP) rate, precision, recall, F-Measure and receiver operating… More >

  • Open Access

    ARTICLE

    Model Predictive Control of H7 Transformerless Inverter Powered by PV

    Ibrahim Atawi1, Sherif Zaid1,2,3,*

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 449-469, 2022, DOI:10.32604/iasc.2022.019959

    Abstract Transformerless inverters have become an important integration of the modern photovoltaic (PV) grid-tied systems. Unfortunately, it has a general safety problem regarding the earth leakage current that must be less than the recommended standards. Lately, the H7 transformerless inverter, which is a three-phase inverter with an additional switch on the DC side, is introduced to mitigate the earth leakage current. Different modulation techniques and controllers are proposed to optimize its performance. This paper proposed the application of model predictive control (MPC) to grid-connected H7 transformerless inverter supplied by the PV power system. In modeling the system, the grid inductance has… More >

  • Open Access

    ARTICLE

    Pseudonym Mutable Based Privacy for 5G User Identity

    Rashid A. Saeed1, Mamoon M. Saeed2,3, Rania A. Mokhtar1, Hesham Alhumyani1, S. Abdel-Khalek4,*

    Computer Systems Science and Engineering, Vol.39, No.1, pp. 1-14, 2021, DOI:10.32604/csse.2021.015593

    Abstract Privacy, identity preserving and integrity have become key problems for telecommunication standards. Significant privacy threats are expected in 5G networks considering the large number of devices that will be deployed. As Internet of Things (IoT) and long-term evolution for machine type (LTE-m) are growing very fast with massive data traffic the risk of privacy attacks will be greatly increase. For all the above issues standards’ bodies should ensure users’ identity and privacy in order to gain the trust of service providers and industries. Against such threats, 5G specifications require a rigid and robust privacy procedure. Many research studies have addressed… More >

  • Open Access

    ARTICLE

    Fluid-Structure Interaction in Problems of Patient Specific Transcatheter Aortic Valve Implantation with and Without Paravalvular Leakage Complication

    Adi Azriff Basri1,6,*, Mohammad Zuber2, Ernnie Illyani Basri1, Muhammad Shukri Zakaria5, Ahmad Fazli Abd Aziz3, Masaaki Tamagawa4, Kamarul Arifin Ahmad1,6

    FDMP-Fluid Dynamics & Materials Processing, Vol.17, No.3, pp. 531-553, 2021, DOI:10.32604/fdmp.2021.010925

    Abstract Paravalvular Leakage (PVL) has been recognized as one of the most dangerous complications in relation to Transcathether Aortic Valve Implantation (TAVI) activities. However, data available in the literature about Fluid Structure Interaction (FSI) for this specific problem are relatively limited. In the present study, the fluid and structure responses of the hemodynamics along the patient aorta model and the aortic wall deformation are studied with the aid of numerical simulation taking into account PVL and 100% TAVI valve opening. In particular, the aorta without valve (AWoV) is assumed as the normal condition, whereas an aorta with TAVI 26 mm for… More >

  • Open Access

    ARTICLE

    A New Generalized Weibull Model: Classical and Bayesian Estimation

    Mi Zichuan1, Saddam Hussain1, Zubair Ahmad2,*, Omid Kharazmi3, Zahra Almaspoor2

    Computer Systems Science and Engineering, Vol.38, No.1, pp. 79-92, 2021, DOI:10.32604/csse.2021.015146

    Abstract Statistical distributions play a prominent role in applied sciences, particularly in biomedical sciences. The medical data sets are generally skewed to the right, and skewed distributions can be used quite effectively to model such kind of data sets. In the present study, therefore, we propose a new family of distributions suitable for modeling right-skewed medical data sets. The proposed family may be called a new generalized-X family. A special sub-model of the proposed family called a new generalized-Weibull distribution is discussed in detail. The maximum likelihood estimators of the model parameters are obtained. A brief Monte Carlo simulation study is… More >

  • Open Access

    ARTICLE

    Windowing Techniques, the Welch Method for Improvement of Power Spectrum Estimation

    Dah-Jing Jwo1,*, Wei-Yeh Chang1, I-Hua Wu2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3983-4003, 2021, DOI:10.32604/cmc.2021.014752

    Abstract This paper revisits the characteristics of windowing techniques with various window functions involved, and successively investigates spectral leakage mitigation utilizing the Welch method. The discrete Fourier transform (DFT) is ubiquitous in digital signal processing (DSP) for the spectrum analysis and can be efficiently realized by the fast Fourier transform (FFT). The sampling signal will result in distortion and thus may cause unpredictable spectral leakage in discrete spectrum when the DFT is employed. Windowing is implemented by multiplying the input signal with a window function and windowing amplitude modulates the input signal so that the spectral leakage is evened out. Therefore,… More >

  • Open Access

    REVIEW

    A Review of Leakage and Dispersion of LNG on the Ground

    Shi-er Dong1, Yiqing He1,*, Jingya Dong2, Zhouyu Peng3, Guohua Fu3

    Energy Engineering, Vol.118, No.1, pp. 103-118, 2021, DOI:10.32604/EE.2020.012362

    Abstract Based on the analysis of the whole process of LNG spill on land, the research methods of LNG pool expansion and heavy gas diffusion are summarized and analyzed. This paper reviews the experimental and analytical work performed to data on spill of LNG. Specifically, experiments on the spill of LNG onshore, as well as experiments and numerical study on heavy gas dispersion. Pool boiling and turbulence model are described and discussed, as well as models used to predict dispersion. Although there have been significant progress in understanding the behavior of LNG spills, technical knowledge gaps to improve hazard prediction are… More >

  • Open Access

    ARTICLE

    Detecting Android Inter-App Data Leakage Via Compositional Concolic Walking

    Tianjun Wu, Yuexiang Yang

    Intelligent Automation & Soft Computing, Vol.25, No.4, pp. 755-766, 2019, DOI:10.31209/2019.100000079

    Abstract While many research efforts have been around auditing individual android apps, the security issues related to the interaction among multiple apps are less studied. Due to the hidden nature of Inter-App communications, few existing security tools are able to detect such related vulnerable behaviors. This paper proposes to perform overall security auditing using dynamic analysis techniques. We focus on data leakage as it is one of the most common vulnerabilities for Android applications. We present an app auditing system AppWalker, which uses concolic execution on a set of apps. We use static Inter-App taint analysis to guide the dynamic auditing… More >

Displaying 21-30 on page 3 of 41. Per Page