Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (28)
  • Open Access

    ARTICLE

    Design and Implementation of a State-feedback Controller Using LQR Technique

    Aamir Shahzad1,*, Shadi Munshi2, Sufyan Azam2, Muhammad Nasir Khan3

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2897-2911, 2022, DOI:10.32604/cmc.2022.028441

    Abstract The main objective of this research is to design a state-feedback controller for the rotary inverted pendulum module utilizing the linear quadratic regulator (LQR) technique. The controller maintains the pendulum in the inverted (upright) position and is robust enough to reject external disturbance to maintain its stability. The research work involves three major contributions: mathematical modeling, simulation, and real-time implementation. To design a controller, mathematical modeling has been done by employing the Newton-Euler, Lagrange method. The resulting model was nonlinear so linearization was required, which has been done around a working point. For the estimation of the controller parameters, MATLAB… More >

  • Open Access

    ARTICLE

    Identification of Suitable Reference Genes for qRT-PCR Normalization in Tilia miqueliana Maxim

    Huanli Wang, Lingjun Yan, Xi Huang, Zhongwei Wang, Yuanhao Yue, Shijie Tang*

    Phyton-International Journal of Experimental Botany, Vol.91, No.10, pp. 2191-2210, 2022, DOI:10.32604/phyton.2022.020735

    Abstract Quantitative real-time polymerase chain reaction (qRT-PCR) is a rapid and effective approach toward detecting the expression patterns of target genes. The selection of a stable reference gene under specific test condition is essential for expressing levels of target genes accurately. Tilia miqueliana, considered endangered, is a prominent native ornamental and honey tree in East China. No study has evaluated the optimal endogenous reference gene for qRT-PCR analysis in T. miqueliana systematically. In this study, fifteen commonly used reference genes were selected as candidate genes, and the stabilities of their expressions were assessed using four algorithms (GeNorm, NormFiner, BestKeeper, and DeltaCt)… More >

  • Open Access

    ARTICLE

    Genome-wide analysis of microRNAs induced and regulated by colchicine in mulberry

    MENGMENG WU1,#, PENG GUO1,#, YISU SHI1,#, DANYAN ZHENG1, QIAONAN ZHANG1, XIN JIN1, YUHUA WANG1, QIANG LIN2, RONGJUN FANG1,*, WEIGUO ZHAO1,*

    BIOCELL, Vol.46, No.8, pp. 1935-1945, 2022, DOI:10.32604/biocell.2022.019223

    Abstract A variety of plants were colchicine treated to double their chromosome number. Chromosomes are genetic carriers that determine the individual traits of organisms. The doubling of chromosomes will lead to modifications in plant morphology, physiology and genetics. To determine the response of mulberry trees induced by colchicine, using mulberry variety Yu-711 leaves as research materials, two small RNA libraries (control and experimental groups) were constructed. It was found that 45 known miRNA genes and 78 predicted novel miRNA genes in the sequence results. A comparison of data between the control group and the experimental group revealed 37 differentially expressed miRNA… More >

  • Open Access

    ARTICLE

    Reversible Video Steganography Using Quick Response Codes and Modified ElGamal Cryptosystem

    Ramadhan J. Mstafa1,2,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3349-3368, 2022, DOI:10.32604/cmc.2022.025791

    Abstract The rapid transmission of multimedia information has been achieved mainly by recent advancements in the Internet's speed and information technology. In spite of this, advancements in technology have resulted in breaches of privacy and data security. When it comes to protecting private information in today's Internet era, digital steganography is vital. Many academics are interested in digital video because it has a great capability for concealing important data. There have been a vast number of video steganography solutions developed lately to guard against the theft of confidential data. The visual imperceptibility, robustness, and embedding capacity of these approaches are all… More >

  • Open Access

    ARTICLE

    A Distributed Secret Sharing Method with QR Code Based on Information Hiding

    Pengcheng Jiang, Yu Xue*

    Journal of Cyber Security, Vol.3, No.4, pp. 217-225, 2021, DOI:10.32604/jcs.2021.026022

    Abstract QR codes are applied widely on the Internet and mobile devices in recent years. Its open standards and the characteristics of easy to generate lead to anyone can generate their QR code easily. Also, the QR code does not have the ability of hiding information, which leads to everyone can get access to read the content in any QR code, including those hiding some secret content in the bytes of QR code. Therefore, in recent years, information tampering and information leakage cases caused by poor security of two-dimensional code occur frequently, especially in the financial field and multi-party verification scenarios.… More >

  • Open Access

    ARTICLE

    Selection of Stable Reference Genes for Quantitative Real-Time PCR on Paeonia ostii T. Hong et J. X. Zhang Leaves Exposed to Different Drought Stress Conditions

    Yuting Luan1, Cong Xu1, Xiaoxiao Wang1, Daqiu Zhao1, Jun Tao1,2,*

    Phyton-International Journal of Experimental Botany, Vol.91, No.5, pp. 1045-1059, 2022, DOI:10.32604/phyton.2022.018767

    Abstract The definition of relatively stable expressed internal reference genes is essential in both traditional blotting quantification and as a modern data quantitative strategy. Appropriate internal reference genes can accurately standardize the expression abundance of target genes to avoid serious experimental errors. In this study, the expression profiles of ten candidate genes, ACT1, ACT2, GAPDH, eIF1, eIF2, α-TUB, β-TUB, TBP, RNA Pol II and RP II, were calculated for a suitable reference gene selection in Paeonia ostii T. Hong et J. X. Zhang leaves under various drought stress conditions. Data were processed by the four regularly used evaluation software. A comprehensive… More >

  • Open Access

    ARTICLE

    Robust Watermarking Scheme for NIfTI Medical Images

    Abhishek Kumar1,5, Kamred Udham Singh2, Visvam Devadoss Ambeth Kumar3, Tapan Kant4, Abdul Khader Jilani Saudagar5,*, Abdullah Al Tameem5, Mohammed Al Khathami5, Muhammad Badruddin Khan5, Mozaherul Hoque Abul Hasanat5, Khalid Mahmood Malik6

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3107-3125, 2022, DOI:10.32604/cmc.2022.022817

    Abstract Computed Tomography (CT) scan and Magnetic Resonance Imaging (MRI) technologies are widely used in medical field. Within the last few months, due to the increased use of CT scans, millions of patients have had their CT scans done. So, as a result, images showing the Corona Virus for diagnostic purposes were digitally transmitted over the internet. The major problem for the world health care system is a multitude of attacks that affect copyright protection and other ethical issues as images are transmitted over the internet. As a result, it is important to apply a robust and secure watermarking technique to… More >

  • Open Access

    ARTICLE

    A QR Data Hiding Method Based on Redundant Region and BCH

    Ying Zhou*, Weiwei Luo

    Journal on Big Data, Vol.3, No.3, pp. 127-133, 2021, DOI:10.32604/jbd.2021.019236

    Abstract In recent years, QR code has been widely used in the Internet and mobile devices. It is based on open standards and easy to generate a code, which lead to that anyone can generate their own QR code. Because the QR code does not have the ability of information hiding, any device can access the content in QR code. Thus, hiding the secret data in QR code becomes a hot topic. Previously, the information hiding methods based on QR code all use the way of information hiding based on image, mostly using digital watermarking technology, and not using the coding… More >

  • Open Access

    ARTICLE

    A Novel COVID-19 Prediction Model with Optimal Control Rates

    Ashraf Ahmed1, Yousef AbuHour2,*, Ammar El-Hassan1

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 979-990, 2022, DOI:10.32604/iasc.2022.020726

    Abstract The Corona (COVID-19) epidemic has triggered interest in many fields of technology, medicine, science, and politics. Most of the mathematical research in this area focused on analyzing the dynamics of the spread of the virus. In this article, after a review of some current methodologies, a non-linear system of differential equations is developed to model the spread of COVID-19. In order to consider a wide spectrum of scenarios, we propose a susceptible-exposed-infected-quarantined-recovered (SEIQRS)-model which was analyzed to determine threshold conditions for its stability, and the number of infected cases that is an infected person will transmit on a virus to,… More >

  • Open Access

    ARTICLE

    Convolutional Neural Network-Based Identity Recognition Using ECG at Different Water Temperatures During Bathing

    Jianbo Xu, Wenxi Chen*

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1807-1819, 2022, DOI:10.32604/cmc.2022.021154

    Abstract This study proposes a convolutional neural network (CNN)-based identity recognition scheme using electrocardiogram (ECG) at different water temperatures (WTs) during bathing, aiming to explore the impact of ECG length on the recognition rate. ECG data was collected using non-contact electrodes at five different WTs during bathing. Ten young student subjects (seven men and three women) participated in data collection. Three ECG recordings were collected at each preset bathtub WT for each subject. Each recording is 18 min long, with a sampling rate of 200 Hz. In total, 150 ECG recordings and 150 WT recordings were collected. The R peaks were… More >

Displaying 11-20 on page 2 of 28. Per Page