Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22)
  • Open Access

    ARTICLE

    Influence of High-Robustness Polycarboxylate Superplasticizer on the Performances of Concrete Incorporating Fly Ash and Manufactured Sand

    Panpan Cao1,2, Xiulin Huang1,3,*, Shenxu Bao4, Jin Yang5,*

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.8, pp. 2041-2051, 2023, DOI:10.32604/fdmp.2023.027399

    Abstract Using ethylene glycol monovinyl polyoxyethylene ether, 2-acrylamido-2-methylpropane sulfonic acid (AMPS) and acrylic acid as the main synthetic monomers, a high robustness polycarboxylate superplasticizer was prepared. The effects of initial temperature, ratio of acid to ether, amount of chain transfer agent, and synthesis process on the properties of the superplasticizer were studied. The molecular structure was characterized by GPC (Gel Permeation Chromatography) and IR (Infrared Spectrometer). As shown by the results, when the initial reaction temperature is 15°C, the ratio of acid to ether is 3.4:1 and the acrylic acid pre-neutralization is 15%, The AMPS substitution is 10%, the amount of… More > Graphic Abstract

    Influence of High-Robustness Polycarboxylate Superplasticizer on the Performances of Concrete Incorporating Fly Ash and Manufactured Sand

  • Open Access

    ARTICLE

    AC-DC Fuzzy Linear Active Disturbance Rejection Control Strategy of Front Stage of Bidirectional Converter Based on V2G

    Guosheng Li1, Qingquan Lv2, Zhenzhen Zhang2, Haiying Dong1,*

    Energy Engineering, Vol.120, No.4, pp. 1045-1065, 2023, DOI:10.32604/ee.2023.023770

    Abstract Aiming at the problems of output voltage fluctuation and current total harmonic distortion (THD) in the front stage totem-pole bridgeless PFC of two-stage V2G (Vehicle to Grid) vehicle-mounted bi-directional converter, a fuzzy linear active disturbance rejection control strategy for V2G front-stage AC-DC power conversion system is proposed. Firstly, the topological working mode of the totem-pole bridgeless PFC is analyzed, and the mathematical model is established. Combined with the system model and the linear active disturbance rejection theory, a double closed-loop controller is designed with the second-order linear active disturbance rejection control as the voltage outer loop and PI control as… More > Graphic Abstract

    AC-DC Fuzzy Linear Active Disturbance Rejection Control Strategy of Front Stage of Bidirectional Converter Based on V2G

  • Open Access

    ARTICLE

    SRC: Superior Robustness of COVID-19 Detection from Noisy Cough Data Using GFCC

    Basanta Kumar Swain1, Mohammad Zubair Khan2,*, Chiranji Lal Chowdhary3, Abdullah Alsaeedi4

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2337-2349, 2023, DOI:10.32604/csse.2023.036192

    Abstract This research is focused on a highly effective and untapped feature called gammatone frequency cepstral coefficients (GFCC) for the detection of COVID-19 by using the nature-inspired meta-heuristic algorithm of deer hunting optimization and artificial neural network (DHO-ANN). The noisy crowdsourced cough datasets were collected from the public domain. This research work claimed that the GFCC yielded better results in terms of COVID-19 detection as compared to the widely used Mel-frequency cepstral coefficient in noisy crowdsourced speech corpora. The proposed algorithm's performance for detecting COVID-19 disease is rigorously validated using statistical measures, F1 score, confusion matrix, specificity, and sensitivity parameters. Besides,… More >

  • Open Access

    ARTICLE

    Zero Watermarking Algorithm for Medical Image Based on Resnet50-DCT

    Mingshuai Sheng1, Jingbing Li1,2,*, Uzair Aslam Bhatti1,2,3, Jing Liu4, Mengxing Huang1,5, Yen-Wei Chen6

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 293-309, 2023, DOI:10.32604/cmc.2023.036438

    Abstract Medical images are used as a diagnostic tool, so protecting their confidentiality has long been a topic of study. From this, we propose a Resnet50-DCT-based zero watermarking algorithm for use with medical images. To begin, we use Resnet50, a pre-training network, to draw out the deep features of medical images. Then the deep features are transformed by DCT transform and the perceptual hash function is used to generate the feature vector. The original watermark is chaotic scrambled to get the encrypted watermark, and the watermark information is embedded into the original medical image by XOR operation, and the logical key… More >

  • Open Access

    ARTICLE

    Robust and Reusable Fuzzy Extractors from Non-Uniform Learning with Errors Problem

    Joo Woo1, Jonghyun Kim1, Jong Hwan Park2,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1985-2003, 2023, DOI:10.32604/cmc.2023.033102

    Abstract A fuzzy extractor can extract an almost uniform random string from a noisy source with enough entropy such as biometric data. To reproduce an identical key from repeated readings of biometric data, the fuzzy extractor generates a helper data and a random string from biometric data and uses the helper data to reproduce the random string from the second reading. In 2013, Fuller et al. proposed a computational fuzzy extractor based on the learning with errors problem. Their construction, however, can tolerate a sub-linear fraction of errors and has an inefficient decoding algorithm, which causes the reproducing time to increase significantly. In 2016,… More >

  • Open Access

    ARTICLE

    A Multi-Watermarking Algorithm for Medical Images Using Inception V3 and DCT

    Yu Fan1,6, Jingbing Li1,2,*, Uzair Aslam Bhatti1,2, Chunyan Shao1, Cheng Gong1, Jieren Cheng3,5, Yenwei Chen4

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1279-1302, 2023, DOI:10.32604/cmc.2023.031445

    Abstract Medical images are a critical component of the diagnostic process for clinicians. Although the quality of medical photographs is essential to the accuracy of a physician’s diagnosis, they must be encrypted due to the characteristics of digital storage and information leakage associated with medical images. Traditional watermark embedding algorithm embeds the watermark information into the medical image, which reduces the quality of the medical image and affects the physicians’ judgment of patient diagnosis. In addition, watermarks in this method have weak robustness under high-intensity geometric attacks when the medical image is attacked and the watermarks are destroyed. This paper proposes… More >

  • Open Access

    ARTICLE

    TP-MobNet: A Two-pass Mobile Network for Low-complexity Classification of Acoustic Scene

    Soonshin Seo1, Junseok Oh2, Eunsoo Cho2, Hosung Park2, Gyujin Kim2, Ji-Hwan Kim2,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3291-3303, 2022, DOI:10.32604/cmc.2022.026259

    Abstract Acoustic scene classification (ASC) is a method of recognizing and classifying environments that employ acoustic signals. Various ASC approaches based on deep learning have been developed, with convolutional neural networks (CNNs) proving to be the most reliable and commonly utilized in ASC systems due to their suitability for constructing lightweight models. When using ASC systems in the real world, model complexity and device robustness are essential considerations. In this paper, we propose a two-pass mobile network for low-complexity classification of the acoustic scene, named TP-MobNet. With inverse residuals and linear bottlenecks, TP-MobNet is based on MobileNetV2, and following mobile blocks,… More >

  • Open Access

    ARTICLE

    Contourlet and Gould Transforms for Hybrid Image Watermarking in RGB Color Images

    Reena Thomas1,*, M. Sucharitha2

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 879-889, 2022, DOI:10.32604/iasc.2022.024070

    Abstract The major intention of this work is to introduce a novel hybrid image watermarking technique for RGB color images. This hybrid watermarking algorithm uses two transforms such as Contourlet and Gould transform. The Contourlet transform is used as first stage while the Gould transform is used as second stage. In the watermark embedding phase, the R, G and B channels are transformed using Contourlet transform. The bandpass directional sub band coefficients of Contourlet transformed image are then divided into sub-blocks. The sub-blocks are then transformed using Gould transform and the watermark information is embedded on the initial coefficients of each… More >

  • Open Access

    ARTICLE

    Robustness Convergence for Iterative Learning Tracking Control Applied to Repetitfs Systems

    Ben Attia Selma*, Ouerfelli Houssem Eddine, Salhi Salah

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 795-810, 2022, DOI:10.32604/iasc.2022.020435

    Abstract This study addressed sufficient conditions for the robust monotonic convergence of repetitive discrete-time linear parameter varying systems, with the parameter variation rate bound. The learning law under consideration is an anticipatory iterative learning control. Of particular interest in this study is that the iterations can eliminate the influence of disturbances. Based on a simple quadratic performance function, a sufficient condition for the proposed learning algorithm is presented in terms of linear matrix inequality (LMI) by imposing a polytopic structure on the Lyapunov matrix. The set of LMIs to be determined considers the bounds on the rate of variation of the… More >

  • Open Access

    ARTICLE

    Enhancing the Robustness of Visual Object Tracking via Style Transfer

    Abdollah Amirkhani1,*, Amir Hossein Barshooi1, Amir Ebrahimi2

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 981-997, 2022, DOI:10.32604/cmc.2022.019001

    Abstract The performance and accuracy of computer vision systems are affected by noise in different forms. Although numerous solutions and algorithms have been presented for dealing with every type of noise, a comprehensive technique that can cover all the diverse noises and mitigate their damaging effects on the performance and precision of various systems is still missing. In this paper, we have focused on the stability and robustness of one computer vision branch (i.e., visual object tracking). We have demonstrated that, without imposing a heavy computational load on a model or changing its algorithms, the drop in the performance and accuracy… More >

Displaying 1-10 on page 1 of 22. Per Page  

Share Link