Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (212)
  • Open Access

    ARTICLE

    Output Linearization of Single-Input Single-Output Fuzzy System to Improve Accuracy and Performance

    Salah-ud-din Khokhar1,2,*, QinKe Peng1, Muhammad Yasir Noor3

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2413-2427, 2023, DOI:10.32604/cmc.2023.036148

    Abstract For fuzzy systems to be implemented effectively, the fuzzy membership function (MF) is essential. A fuzzy system (FS) that implements precise input and output MFs is presented to enhance the performance and accuracy of single-input single-output (SISO) FSs and introduce the most applicable input and output MFs protocol to linearize the fuzzy system’s output. Utilizing a variety of non-linear techniques, a SISO FS is simulated. The results of FS experiments conducted in comparable conditions are then compared. The simulated results and the results of the experimental setup agree fairly well. The findings of the suggested model demonstrate that the relative… More >

  • Open Access

    REVIEW

    Interleukin-1 receptor antagonist: From synthesis to therapeutic applications

    KANWAL REHMAN1, AMMARA AFZAAL2, MUHAMMAD SAJID HAMID AKASH2,*, MUHAMMAD IMRAN3,4, MOHAMMED A. ASSIRI3,4

    BIOCELL, Vol.47, No.4, pp. 809-823, 2023, DOI:10.32604/biocell.2023.025850

    Abstract The cytokine channel’s mechanism for self-regulation involves the application of antagonistic cytokines that are synthesized to connect to the receptors and release soluble cytokine receptors. The very first receptor antagonist of cytokine that was naturally present was interleukin-1 receptor antagonist (IL-1Ra). The IL-1Ra protein forms are disinfected from supernatants of cultured monocytes on stacked IgG. The family of IL-1 consists of IL-1α, IL-1β and IL-1Ra. Human monocytes regulate the production of IL-Ra. IL-Ra takes part in normal physiological functions by using specific antibodies, and acts as an anti-inflammatory agent. IL-Ra is synthesized in the tissues during the period of active… More >

  • Open Access

    ARTICLE

    An Improved Bald Eagle Search Algorithm with Cauchy Mutation and Adaptive Weight Factor for Engineering Optimization

    Wenchuan Wang1,*, Weican Tian1, Kwok-wing Chau2, Yiming Xue1, Lei Xu3, Hongfei Zang1

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1603-1642, 2023, DOI:10.32604/cmes.2023.026231

    Abstract The Bald Eagle Search algorithm (BES) is an emerging meta-heuristic algorithm. The algorithm simulates the hunting behavior of eagles, and obtains an optimal solution through three stages, namely selection stage, search stage and swooping stage. However, BES tends to drop-in local optimization and the maximum value of search space needs to be improved. To fill this research gap, we propose an improved bald eagle algorithm (CABES) that integrates Cauchy mutation and adaptive optimization to improve the performance of BES from local optima. Firstly, CABES introduces the Cauchy mutation strategy to adjust the step size of the selection stage, to select… More >

  • Open Access

    ARTICLE

    The Influence of Saturated and Bilinear Incidence Functions on the Dynamical Behavior of HIV Model Using Galerkin Scheme Having a Polynomial of Order Two

    Attaullah1,*, Kamil Zeb1, Abdullah Mohamed2

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1661-1685, 2023, DOI:10.32604/cmes.2023.023059

    Abstract Mathematical modelling has been extensively used to measure intervention strategies for the control of contagious conditions. Alignment between different models is pivotal for furnishing strong substantiation for policymakers because the differences in model features can impact their prognostications. Mathematical modelling has been widely used in order to better understand the transmission, treatment, and prevention of infectious diseases. Herein, we study the dynamics of a human immunodeficiency virus (HIV) infection model with four variables: S (t), I (t), C (t), and A (t) the susceptible individuals; HIV infected individuals (with no clinical symptoms of AIDS); HIV infected individuals (under ART with… More >

  • Open Access

    ARTICLE

    Adaptive Partial Task Offloading and Virtual Resource Placement in SDN/NFV-Based Network Softwarization

    Prohim Tam1, Sa Math1, Seokhoon Kim1,2,*

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2141-2154, 2023, DOI:10.32604/csse.2023.030984

    Abstract Edge intelligence brings the deployment of applied deep learning (DL) models in edge computing systems to alleviate the core backbone network congestions. The setup of programmable software-defined networking (SDN) control and elastic virtual computing resources within network functions virtualization (NFV) are cooperative for enhancing the applicability of intelligent edge softwarization. To offer advancement for multi-dimensional model task offloading in edge networks with SDN/NFV-based control softwarization, this study proposes a DL mechanism to recommend the optimal edge node selection with primary features of congestion windows, link delays, and allocatable bandwidth capacities. Adaptive partial task offloading policy considered the DL-based recommendation to… More >

  • Open Access

    ARTICLE

    Machine Learning-Based Channel State Estimators for 5G Wireless Communication Systems

    Mohamed Hassan Essai Ali1,*, Fahad Alraddady2, Mo’ath Y. Al-Thunaibat3, Shaima Elnazer2

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 755-778, 2023, DOI:10.32604/cmes.2022.022246

    Abstract For a 5G wireless communication system, a convolutional deep neural network (CNN) is employed to synthesize a robust channel state estimator (CSE). The proposed CSE extracts channel information from transmit-and-receive pairs through offline training to estimate the channel state information. Also, it utilizes pilots to offer more helpful information about the communication channel. The proposed CNN-CSE performance is compared with previously published results for Bidirectional/long short-term memory (BiLSTM/LSTM) NNs-based CSEs. The CNN-CSE achieves outstanding performance using sufficient pilots only and loses its functionality at limited pilots compared with BiLSTM and LSTM-based estimators. Using three different loss function-based classification layers and… More >

  • Open Access

    ARTICLE

    The Class of Atomic Exponential Basis Functions EFupn(x,ω)-Development and Application

    Nives Brajčić Kurbaša*, Blaž Gotovac, Vedrana Kozulić

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 65-90, 2023, DOI:10.32604/cmes.2022.021940

    Abstract The purpose of this paper is to present the class of atomic basis functions (ABFs) which are of exponential type and are denoted by . While ABFs of the algebraic type are already represented in the numerical modeling of various problems in mathematical physics and computational mechanics, ABFs of the exponential type have not yet been sufficiently researched. These functions, unlike the ABFs of the algebraic type , contain the tension parameter , which gives them additional approximation properties. Exponential monomials up to the th degree can be described exactly by the linear combination of the functions . The function… More >

  • Open Access

    ARTICLE

    Activation Functions Effect on Fractal Coding Using Neural Networks

    Rashad A. Al-Jawfi*

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 957-965, 2023, DOI:10.32604/iasc.2023.031700

    Abstract Activation functions play an essential role in converting the output of the artificial neural network into nonlinear results, since without this nonlinearity, the results of the network will be less accurate. Nonlinearity is the mission of all nonlinear functions, except for polynomials. The activation function must be differentiable for backpropagation learning. This study’s objective is to determine the best activation functions for the approximation of each fractal image. Different results have been attained using Matlab and Visual Basic programs, which indicate that the bounded function is more helpful than other functions. The non-linearity of the activation function is important when… More >

  • Open Access

    ARTICLE

    Distortion Evaluation of EMP Sensors Using Associated-Hermite Functions

    Rupo Ma1,2,*, Siping Gao3

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1093-1105, 2023, DOI:10.32604/cmc.2023.030979

    Abstract Electromagnetic pulse (EMP) is a kind of transient electromagnetic phenomenon with short rise time of the leading edge and wide spectrum, which usually disrupts communications and damages electronic equipment and system. It is challenging for an EMP sensor to measure a wideband electromagnetic pulse without distortion for the whole spectrum. Therefore, analyzing the distortion of EMP measurement is crucial to evaluating the sensor distortion characteristics and correcting the measurement results. Waveform fidelity is usually employed to evaluate the distortion of an antenna. However, this metric depends on specific signal waveforms, thus is unsuitable for evaluating and analyzing the distortion of… More >

  • Open Access

    ARTICLE

    Towards Fully Secure 5G Ultra-Low Latency Communications: A Cost-Security Functions Analysis

    Borja Bordel1,*, Ramón Alcarria1, Joaquin Chung2, Rajkumar Kettimuthu2, Tomás Robles1, Iván Armuelles3

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 855-880, 2023, DOI:10.32604/cmc.2023.026787

    Abstract Future components to enhance the basic, native security of 5G networks are either complex mechanisms whose impact in the requiring 5G communications are not considered, or lightweight solutions adapted to ultra-reliable low-latency communications (URLLC) but whose security properties remain under discussion. Although different 5G network slices may have different requirements, in general, both visions seem to fall short at provisioning secure URLLC in the future. In this work we address this challenge, by introducing cost-security functions as a method to evaluate the performance and adequacy of most developed and employed non-native enhanced security mechanisms in 5G networks. We categorize those… More >

Displaying 1-10 on page 1 of 212. Per Page  

Share Link