Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (46)
  • Open Access

    ARTICLE

    The Non-Singular Fast Terminal Sliding Mode Control of Interior Permanent Magnet Synchronous Motor Based on Deep Flux Weakening Switching Point Tracking

    Xiangfei Li, Yang Yin, Yang Zhou, Wenchang Liu, Kaihui Zhao*

    Energy Engineering, Vol.120, No.2, pp. 277-297, 2023, DOI:10.32604/ee.2023.022461

    Abstract This paper presents a novel non-singular fast terminal sliding mode control (NFTSMC) based on the deep flux weakening switching point tracking method in order to improve the control performance of permanent interior magnet synchronous motor (IPMSM) drive systems. The mathematical model of flux weakening (FW) control is established, and the deep flux weakening switching point is calculated accurately by analyzing the relationship between the torque curve and voltage decline curve. Next, a second-order NFTSMC is designed for the speed loop controller to ensure that the system converges to the equilibrium state in finite time. Then, More > Graphic Abstract

    The Non-Singular Fast Terminal Sliding Mode Control of Interior Permanent Magnet Synchronous Motor Based on Deep Flux Weakening Switching Point Tracking

  • Open Access

    ARTICLE

    Load Balancing Based on Multi-Agent Framework to Enhance Cloud Environment

    Shrouk H. Hessen1,2,*, Hatem M. Abdul-kader1, Ayman E. Khedr3, Rashed K. Salem1

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3015-3028, 2023, DOI:10.32604/cmc.2023.033212

    Abstract According to the advances in users’ service requirements, physical hardware accessibility, and speed of resource delivery, Cloud Computing (CC) is an essential technology to be used in many fields. Moreover, the Internet of Things (IoT) is employed for more communication flexibility and richness that are required to obtain fruitful services. A multi-agent system might be a proper solution to control the load balancing of interaction and communication among agents. This paper proposes a multi-agent load balancing framework that consists of two phases to optimize the workload among different servers with large-scale CC power with various… More >

  • Open Access

    ARTICLE

    Observer-Based Control for a Cable-Driven Aerial Manipulator under Lumped Disturbances

    Li Ding, Yong Yao*, Rui Ma

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.2, pp. 1539-1558, 2023, DOI:10.32604/cmes.2022.023003

    Abstract With the increasing demand for interactive aerial operations, the application of aerial manipulators is becoming more promising. However, there are a few critical problems on how to improve the energetic efficiency and pose control of the aerial manipulator for practical application. In this paper, a novel cable-driven aerial manipulator used for remote water sampling is proposed and then its rigid-flexible coupling dynamics model is constructed which takes joint flexibility into account. To achieve high precision joint position tracking under lumped disturbances, a newly controller, which consists of three parts: linear extended state observer, adaptive super-twisting More >

  • Open Access

    ARTICLE

    Optimal Joint Space Control of a Cable-Driven Aerial Manipulator

    Li Ding1,*, Rui Ma1, Zhengtian Wu2, Rongzhi Qi1, Wenrui Ruan1

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 441-464, 2023, DOI:10.32604/cmes.2022.022642

    Abstract This article proposes a novel method for maintaining the trajectory of an aerial manipulator by utilizing a fast nonsingular terminal sliding mode (FNTSM) manifold and a linear extended state observer (LESO). The developed control method applies an FNTSM to ensure the tracking performance’s control accuracy, and an LESO to estimate the system’s unmodeled dynamics and external disturbances. Additionally, an improved salp swarm algorithm (ISSA) is employed to parameter tune the suggested controller by integrating the salp swarm technique with a cloud model. This approach also uses a model-free scheme to reduce the complexity of controller More >

  • Open Access

    ARTICLE

    Multiway Relay Based Framework for Network Coding in Multi-Hop WSNs

    Vinod Kumar Menaria1, Anand Nayyar2, Sandeep Kumar3, Ketan Kotecha4,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1199-1216, 2023, DOI:10.32604/cmc.2023.032162

    Abstract In today’s information technology (IT) world, the multi-hop wireless sensor networks (MHWSNs) are considered the building block for the Internet of Things (IoT) enabled communication systems for controlling everyday tasks of organizations and industry to provide quality of service (QoS) in a stipulated time slot to end-user over the Internet. Smart city (SC) is an example of one such application which can automate a group of civil services like automatic control of traffic lights, weather prediction, surveillance, etc., in our daily life. These IoT-based networks with multi-hop communication and multiple sink nodes provide efficient communication… More >

  • Open Access

    ARTICLE

    Active Authentication Protocol for IoV Environment with Distributed Servers

    Saravanan Manikandan1, Mosiur Rahaman1, Yu-Lin Song1,2,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5789-5808, 2022, DOI:10.32604/cmc.2022.031490

    Abstract The Internet of Vehicles (IoV) has evolved as an advancement over the conventional Vehicular Ad-hoc Networks (VANETs) in pursuing a more optimal intelligent transportation system that can provide various intelligent solutions and enable a variety of applications for vehicular traffic. Massive volumes of data are produced and communicated wirelessly among the different relayed entities in these vehicular networks, which might entice adversaries and endanger the system with a wide range of security attacks. To ensure the security of such a sensitive network, we proposed a distributed authentication mechanism for IoV based on blockchain technology as… More >

  • Open Access

    ARTICLE

    A Secure Multiparty Quantum Homomorphic Encryption Scheme

    Jing-Wen Zhang1, Xiu-Bo Chen1,*, Gang Xu2,3, Heng-Ji Li4, Ya-Lan Wang5, Li-Hua Miao6, Yi-Xian Yang1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2835-2848, 2022, DOI:10.32604/cmc.2022.029125

    Abstract The significant advantage of the quantum homomorphic encryption scheme is to ensure the perfect security of quantum private data. In this paper, a novel secure multiparty quantum homomorphic encryption scheme is proposed, which can complete arbitrary quantum computation on the private data of multiple clients without decryption by an almost dishonest server. Firstly, each client obtains a secure encryption key through the measurement device independent quantum key distribution protocol and encrypts the private data by using the encryption operator and key. Secondly, with the help of the almost dishonest server, the non-maximally entangled states are… More >

  • Open Access

    ARTICLE

    Rider Optimization Algorithm Based Optimal Cloud Server Selection in E-Learning

    R. Soundhara Raja Pandian*, C. Christopher Columbus

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1749-1762, 2023, DOI:10.32604/csse.2023.028014

    Abstract Currently, e-learning is one of the most prevalent educational methods because of its need in today’s world. Virtual classrooms and web-based learning are becoming the new method of teaching remotely. The students experience a lack of access to resources commonly the educational material. In remote locations, educational institutions face significant challenges in accessing various web-based materials due to bandwidth and network infrastructure limitations. The objective of this study is to demonstrate an optimization and queueing technique for allocating optimal servers and slots for users to access cloud-based e-learning applications. The proposed method provides the optimization… More >

  • Open Access

    ARTICLE

    An Efficient Framework for Utilizing Underloaded Servers in Compute Cloud

    M. Hema1,*, S. Kanaga Suba Raja2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 143-156, 2023, DOI:10.32604/csse.2023.024895

    Abstract In cloud data centers, the consolidation of workload is one of the phases during which the available hosts are allocated tasks. This phenomenon ensures that the least possible number of hosts is used without compromise in meeting the Service Level Agreement (SLA). To consolidate the workloads, the hosts are segregated into three categories: normal hosts, under-loaded hosts, and overloaded hosts based on their utilization. It is to be noted that the identification of an extensively used host or underloaded host is challenging to accomplish. Threshold values were proposed in the literature to detect this scenario.… More >

  • Open Access

    ARTICLE

    Phish Block: A Blockchain Framework for Phish Detection in Cloud

    R. N. Karthika*, C. Valliyammai, M. Naveena

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 777-795, 2023, DOI:10.32604/csse.2023.024086

    Abstract The data in the cloud is protected by various mechanisms to ensure security aspects and user’s privacy. But, deceptive attacks like phishing might obtain the user’s data and use it for malicious purposes. In Spite of much technological advancement, phishing acts as the first step in a series of attacks. With technological advancements, availability and access to the phishing kits has improved drastically, thus making it an ideal tool for the hackers to execute the attacks. The phishing cases indicate use of foreign characters to disguise the original Uniform Resource Locator (URL), typosquatting the popular… More >

Displaying 11-20 on page 2 of 46. Per Page