Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (169)
  • Open Access

    ARTICLE

    Indirect Vector Control of Linear Induction Motors Using Space Vector Pulse Width Modulation

    Arjmand Khaliq1, Syed Abdul Rahman Kashif1, Fahad Ahmad2, Muhammad Anwar3,*, Qaisar Shaheen4, Rizwan Akhtar5, Muhammad Arif Shah5, Abdelzahir Abdelmaboud6

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6263-6287, 2023, DOI:10.32604/cmc.2023.033027

    Abstract Vector control schemes have recently been used to drive linear induction motors (LIM) in high-performance applications. This trend promotes the development of precise and efficient control schemes for individual motors. This research aims to present a novel framework for speed and thrust force control of LIM using space vector pulse width modulation (SVPWM) inverters. The framework under consideration is developed in four stages. To begin, MATLAB Simulink was used to develop a detailed mathematical and electromechanical dynamic model. The research presents a modified SVPWM inverter control scheme. By tuning the proportional-integral (PI) controller with a transfer function, optimized values for… More >

  • Open Access

    ARTICLE

    Social Engineering Attack Classifications on Social Media Using Deep Learning

    Yichiet Aun1,*, Ming-Lee Gan1, Nur Haliza Binti Abdul Wahab2, Goh Hock Guan1

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4917-4931, 2023, DOI:10.32604/cmc.2023.032373

    Abstract In defense-in-depth, humans have always been the weakest link in cybersecurity. However, unlike common threats, social engineering poses vulnerabilities not directly quantifiable in penetration testing. Most skilled social engineers trick users into giving up information voluntarily through attacks like phishing and adware. Social Engineering (SE) in social media is structurally similar to regular posts but contains malicious intrinsic meaning within the sentence semantic. In this paper, a novel SE model is trained using a Recurrent Neural Network Long Short Term Memory (RNN-LSTM) to identify well-disguised SE threats in social media posts. We use a custom dataset crawled from hundreds of… More >

  • Open Access

    ARTICLE

    Efficient Heuristic Replication Techniques for High Data Availability in Cloud

    H. L. Chandrakala1,*, R. Loganathan2

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3151-3164, 2023, DOI:10.32604/csse.2022.027873

    Abstract Most social networks allow connections amongst many people based on shared interests. Social networks have to offer shared data like videos, photos with minimum latency to the group, which could be challenging as the storage cost has to be minimized and hence entire data replication is not a solution. The replication of data across a network of read-intensive can potentially lead to increased savings in cost and energy and reduce the end-user’s response time. Though simple and adaptive replication strategies exist, the solution is non-deterministic; the replicas of the data need to be optimized to the data usability, performance, and… More >

  • Open Access

    ARTICLE

    Tricube Weighted Linear Regression and Interquartile for Cloud Infrastructural Resource Optimization

    Neema George1,*, B. K. Anoop1, Vinodh P. Vijayan2

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2281-2297, 2023, DOI:10.32604/csse.2023.028117

    Abstract Cloud infrastructural resource optimization is the process of precisely selecting the allocating the correct resources either to a workload or application. When workload execution, accuracy, and cost are accurately stabilized in opposition to the best possible framework in real-time, efficiency is attained. In addition, every workload or application required for the framework is characteristic and these essentials change over time. But, the existing method was failed to ensure the high Quality of Service (QoS). In order to address this issue, a Tricube Weighted Linear Regression-based Inter Quartile (TWLR-IQ) for Cloud Infrastructural Resource Optimization is introduced. A Tricube Weighted Linear Regression… More >

  • Open Access

    ARTICLE

    Control of Distributed Generation Using Non-Sinusoidal Pulse Width Modulation

    Mehrdad Ahmadi Kamarposhti1,*, Phatiphat Thounthong2, Ilhami Colak3, Kei Eguchi4

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4149-4164, 2023, DOI:10.32604/cmc.2023.033405

    Abstract The islanded mode is one of the connection modes of the grid distributed generation resources. In this study, a distributed generation resource is connected to linear and nonlinear loads via a three-phase inverter where a control method needing no current sensors or compensator elements is applied to the distribute generation system in the islanded mode. This control method has two main loops in each phase. The first loop controls the voltage control loops that adjust the three-phase point of common coupling, the amplitude of the non-sinusoidal reference waveform and the near-state pulse width modulation (NSPWM) method. The next loop compensatesthe… More >

  • Open Access

    ARTICLE

    An Intelligence Computational Approach for the Fractional 4D Chaotic Financial Model

    Wajaree Weera1, Thongchai Botmart1,*, Charuwat Chantawat1, Zulqurnain Sabir2,3, Waleed Adel4,5, Muhammad Asif Zahoor Raja6, Muhammad Kristiawan7

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2711-2724, 2023, DOI:10.32604/cmc.2023.033233

    Abstract The main purpose of the study is to present a numerical approach to investigate the numerical performances of the fractional 4-D chaotic financial system using a stochastic procedure. The stochastic procedures mainly depend on the combination of the artificial neural network (ANNs) along with the Levenberg-Marquardt Backpropagation (LMB) i.e., ANNs-LMB technique. The fractional-order term is defined in the Caputo sense and three cases are solved using the proposed technique for different values of the fractional order α. The values of the fractional order derivatives to solve the fractional 4-D chaotic financial system are used between 0 and 1. The data… More >

  • Open Access

    ARTICLE

    Developing a Secure Framework Using Feature Selection and Attack Detection Technique

    Mahima Dahiya*, Nitin Nitin

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4183-4201, 2023, DOI:10.32604/cmc.2023.032430

    Abstract Intrusion detection is critical to guaranteeing the safety of the data in the network. Even though, since Internet commerce has grown at a breakneck pace, network traffic kinds are rising daily, and network behavior characteristics are becoming increasingly complicated, posing significant hurdles to intrusion detection. The challenges in terms of false positives, false negatives, low detection accuracy, high running time, adversarial attacks, uncertain attacks, etc. lead to insecure Intrusion Detection System (IDS). To offset the existing challenge, the work has developed a secure Data Mining Intrusion detection system (DataMIDS) framework using Functional Perturbation (FP) feature selection and Bengio Nesterov Momentum-based… More >

  • Open Access

    ARTICLE

    Fractional Order Nonlinear Bone Remodeling Dynamics Using the Supervised Neural Network

    Narongsak Yotha1, Qusain Hiader2, Zulqurnain Sabir3, Muhammad Asif Zahoor Raja4, Salem Ben Said5, Qasem Al-Mdallal5, Thongchai Botmart6, Wajaree Weera6,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2415-2430, 2023, DOI:10.32604/cmc.2023.031352

    Abstract This study aims to solve the nonlinear fractional-order mathematical model (FOMM) by using the normal and dysregulated bone remodeling of the myeloma bone disease (MBD). For the more precise performance of the model, fractional-order derivatives have been used to solve the disease model numerically. The FOMM is preliminarily designed to focus on the critical interactions between bone resorption or osteoclasts (OC) and bone formation or osteoblasts (OB). The connections of OC and OB are represented by a nonlinear differential system based on the cellular components, which depict stable fluctuation in the usual bone case and unstable fluctuation through the MBD.… More >

  • Open Access

    ARTICLE

    An Artificial Approach for the Fractional Order Rape and Its Control Model

    Wajaree Weera1, Zulqurnain Sabir2, Muhammad Asif Zahoor Raja3, Salem Ben Said4, Maria Emilia Camargo5, Chantapish Zamart1, Thongchai Botmart1,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3421-3438, 2023, DOI:10.32604/cmc.2023.030996

    Abstract The current investigations provide the solutions of the nonlinear fractional order mathematical rape and its control model using the strength of artificial neural networks (ANNs) along with the Levenberg-Marquardt backpropagation approach (LMBA), i.e., artificial neural networks-Levenberg-Marquardt backpropagation approach (ANNs-LMBA). The fractional order investigations have been presented to find more realistic results of the mathematical form of the rape and its control model. The differential mathematical form of the nonlinear fractional order mathematical rape and its control model has six classes: susceptible native girls, infected immature girls, susceptible knowledgeable girls, infected knowledgeable girls, susceptible rapist population and infective rapist population. The… More >

  • Open Access

    ARTICLE

    Numerical Procedure for Fractional HBV Infection with Impact of Antibody Immune

    Sakda Noinang1, Zulqurnain Sabir2, Muhammad Asif Zahoor Raja3, Soheil Salahshour4, Wajaree Weera5,*, Thongchai Botmart5

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2575-2588, 2023, DOI:10.32604/cmc.2023.029046

    Abstract The current investigations are presented to solve the fractional order HBV differential infection system (FO-HBV-DIS) with the response of antibody immune using the optimization based stochastic schemes of the Levenberg-Marquardt backpropagation (LMB) neural networks (NNs), i.e., LMBNNs. The FO-HBV-DIS with the response of antibody immune is categorized into five dynamics, healthy hepatocytes (H), capsids (D), infected hepatocytes (I), free virus (V) and antibodies (W). The investigations for three different FO variants have been tested numerically to solve the nonlinear FO-HBV-DIS. The data magnitudes are implemented 75% for training, 10% for certification and 15% for testing to solve the FO-HBV-DIS with… More >

Displaying 41-50 on page 5 of 169. Per Page