Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (485)
  • Open Access

    ARTICLE

    Adaptive Fractional-Order PID Control for VSC-HVDC Systems via Cooperative Beetle Antennae Search with Offshore Wind Integration

    Pulin Cao, Haoran Fan, Zilong Cai*

    Energy Engineering, Vol.118, No.2, pp. 265-284, 2021, DOI:10.32604/EE.2021.014513 - 23 December 2020

    Abstract Since the voltage source converter based high voltage direct current (VSC-HVDC) systems owns the features of nonlinearity, strong coupling and multivariable, the classical proportional integral (PI) control is hard to obtain content control effect. Hence, a new perturbation observer based fractional-order PID (PoFoPID) control strategy is designed in this paper for (VSC-HVDC) systems with offshore wind integration, which can efficiently boost the robustness and control performance of entire system. Particularly, it employs a fractional-order PID (FoPID) framework for the sake of compensating the perturbation estimate, which dramatically boost the dynamical responds of the closed-loop system, More >

  • Open Access

    ARTICLE

    Fuzzy Adaptive Filtering-Based Energy Management for Hybrid Energy Storage System

    Xizheng Zhang1,2,*, Zhangyu Lu1, Chongzhuo Tan1, Zeyu Wang1

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 117-130, 2021, DOI:10.32604/csse.2021.014081 - 23 December 2020

    Abstract Regarding the problem of the short driving distance of pure electric vehicles, a battery, super-capacitor, and DC/DC converter are combined to form a hybrid energy storage system (HESS). A fuzzy adaptive filtering-based energy management strategy (FAFBEMS) is proposed to allocate the required power of the vehicle. Firstly, the state of charge (SOC) of the super-capacitor is limited according to the driving/braking mode of the vehicle to ensure that it is in a suitable working state, and fuzzy rules are designed to adaptively adjust the filtering time constant, to realize reasonable power allocation. Then, the positive… More >

  • Open Access

    ARTICLE

    Fish-Eye Image Distortion Correction Based on Adaptive Partition Fitting

    Yibin He1,2, Wenhao Xiong1, Hanxin Chen1,2,*, Yuchen Chen1, Qiaosen Dai1, Panpan Tu1, Gaorui Hu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.126, No.1, pp. 379-396, 2021, DOI:10.32604/cmes.2021.010771 - 22 December 2020

    Abstract The acquisition of images with a fish-eye lens can cause serious image distortion because of the short focal length of the lens. As a result, it is difficult to use the obtained image information. To make use of the effective information in the image, these distorted images must first be corrected into the perspective of projection images in accordance with the human eye’s observation abilities. To solve this problem, this study presents an adaptive classification fitting method for fish-eye image correction. The degree of distortion in the image is represented by the difference value of More >

  • Open Access

    ARTICLE

    A New Database Intrusion Detection Approach Based on Hybrid Meta-Heuristics

    Youseef Alotaibi*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1879-1895, 2021, DOI:10.32604/cmc.2020.013739 - 26 November 2020

    Abstract A new secured database management system architecture using intrusion detection systems (IDS) is proposed in this paper for organizations with no previous role mapping for users. A simple representation of Structured Query Language queries is proposed to easily permit the use of the worked clustering algorithm. A new clustering algorithm that uses a tube search with adaptive memory is applied to database log files to create users’ profiles. Then, queries issued for each user are checked against the related user profile using a classifier to determine whether or not each query is malicious. The IDS… More >

  • Open Access

    ARTICLE

    An Adaptive Vision Navigation Algorithm in Agricultural IoT System for Smart Agricultural Robots

    Zhibin Zhang1,2,*, Ping Li1,3, Shuailing Zhao1,2, Zhimin Lv1,2, Fang Du1,2, Yajian An1,2

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 1043-1056, 2021, DOI:10.32604/cmc.2020.012517 - 30 October 2020

    Abstract As the agricultural internet of things (IoT) technology has evolved, smart agricultural robots needs to have both flexibility and adaptability when moving in complex field environments. In this paper, we propose the concept of a vision-based navigation system for the agricultural IoT and a binocular vision navigation algorithm for smart agricultural robots, which can fuse the edge contour and the height information of rows of crop in images to extract the navigation parameters. First, the speeded-up robust feature (SURF) extracting and matching algorithm is used to obtain featuring point pairs from the green crop row… More >

  • Open Access

    ARTICLE

    Analysis of the Smart Player’s Impact on the Success of a Team Empowered with Machine Learning

    Muhammad Adnan Khan1,*, Mubashar Habib1, Shazia Saqib1, Tahir Alyas1, Khalid Masood Khan1, Mohammed A. Al Ghamdi2, Sultan H. Almotiri2

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 691-706, 2021, DOI:10.32604/cmc.2020.012542 - 30 October 2020

    Abstract The innovation and development in data science have an impact in all trades of life. The commercialization of sport has encouraged players, coaches, and other concerns to use technology to be in better position than r their opponents. In the past, the focus was on improved training techniques for better physical performance. These days, sports analytics identify the patterns in the performance and highlight strengths and weaknesses of potential players. Sports analytics not only predict the performance of players in the near future but it also performs predictive modeling for a particular behavior of a… More >

  • Open Access

    ARTICLE

    Random Forests Algorithm Based Duplicate Detection in On-Site Programming Big Data Environment

    Qianqian Li1, Meng Li2, Lei Guo3,*, Zhen Zhang4

    Journal of Information Hiding and Privacy Protection, Vol.2, No.4, pp. 199-205, 2020, DOI:10.32604/jihpp.2020.016299 - 07 January 2021

    Abstract On-site programming big data refers to the massive data generated in the process of software development with the characteristics of real-time, complexity and high-difficulty for processing. Therefore, data cleaning is essential for on-site programming big data. Duplicate data detection is an important step in data cleaning, which can save storage resources and enhance data consistency. Due to the insufficiency in traditional Sorted Neighborhood Method (SNM) and the difficulty of high-dimensional data detection, an optimized algorithm based on random forests with the dynamic and adaptive window size is proposed. The efficiency of the algorithm can be More >

  • Open Access

    ARTICLE

    Improving POI Recommendation via Non-Convex Regularized Tensor Completion

    Ming Zhao*, Tao Liu

    Journal of Information Hiding and Privacy Protection, Vol.2, No.3, pp. 125-134, 2020, DOI:10.32604/jihpp.2020.010211 - 18 December 2020

    Abstract The problem of low accuracy of POI (Points of Interest) recommendation in LBSN (Location-Based Social Networks) has not been effectively solved. In this paper, a POI recommendation algorithm based on nonconvex regularized tensor completion is proposed. The fourth-order tensor is constructed by using the current location category, the next location category, time and season, the regularizer is added to the objective function of tensor completion to prevent over-fitting and reduce the error of the model. The proximal algorithm is used to solve the objective function, and the adaptive momentum is introduced to improve the efficiency More >

  • Open Access

    ARTICLE

    A Data-Aware Remote Procedure Call Method for Big Data Systems

    Jin Wang1,2, Yaqiong Yang1, Jingyu Zhang1,3,*, Xiaofeng Yu4, Osama Alfarraj5, Amr Tolba5,6

    Computer Systems Science and Engineering, Vol.35, No.6, pp. 523-532, 2020, DOI:10.32604/csse.2020.35.523

    Abstract In recent years, big data has been one of the hottest development directions in the information field. With the development of artificial intelligence technology, mobile smart terminals and high-bandwidth wireless Internet, various types of data are increasing exponentially. Huge amounts of data contain a lot of potential value, therefore how to effectively store and process data efficiently becomes very important. Hadoop Distributed File System (HDFS) has emerged as a typical representative of dataintensive distributed big data file systems, and it has features such as high fault tolerance, high throughput, and can be deployed on low-cost… More >

  • Open Access

    ARTICLE

    A Position Self-Adaptive Method to Detect Fake Access Points

    Ping Lu1,2,*

    Journal of Quantum Computing, Vol.2, No.2, pp. 119-127, 2020, DOI:10.32604/jqc.2020.09433 - 19 October 2020

    Abstract In recent years, with the maturity and popularity of Wi-Fi technology, wireless hotspots have been deployed on a large scale in public places. But at the same time, it brings many security issues that cannot be ignored. Among them, the fake access point attack is a very serious threat in wireless local area network. In this paper, we propose a method to detect fake access points in wireless local area network. First, our detection method is passive, which means there is almost no additional traffic will be generated during the program’s operation. Second, different from More >

Displaying 351-360 on page 36 of 485. Per Page