Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (50)
  • Open Access

    ARTICLE

    Adaptive Fractional-Order PID Control for VSC-HVDC Systems via Cooperative Beetle Antennae Search with Offshore Wind Integration

    Pulin Cao, Haoran Fan, Zilong Cai*

    Energy Engineering, Vol.118, No.2, pp. 265-284, 2021, DOI:10.32604/EE.2021.014513 - 23 December 2020

    Abstract Since the voltage source converter based high voltage direct current (VSC-HVDC) systems owns the features of nonlinearity, strong coupling and multivariable, the classical proportional integral (PI) control is hard to obtain content control effect. Hence, a new perturbation observer based fractional-order PID (PoFoPID) control strategy is designed in this paper for (VSC-HVDC) systems with offshore wind integration, which can efficiently boost the robustness and control performance of entire system. Particularly, it employs a fractional-order PID (FoPID) framework for the sake of compensating the perturbation estimate, which dramatically boost the dynamical responds of the closed-loop system, More >

  • Open Access

    ARTICLE

    Design of an Observer-Based Controller for T-S Fuzzy Time-Delay Systems under Imperfect Premise Matching

    Zejian Zhang1, Dawei Wang2,*, Peng Li1, Xiao-Zhi Gao3

    Intelligent Automation & Soft Computing, Vol.26, No.5, pp. 905-915, 2020, DOI:10.32604/iasc.2020.010123

    Abstract In this paper, the stabilization problem of an observer-based T-S fuzzy time-delay system under imperfect premise matching is studied, in which the T-S fuzzy observer model with time-delay and the fuzzy controller do not share the same membership functions. The objective is to design a state observer and unmatching fuzzy controller such that the closed-loop system with time-delay is asymptotically stable. A sufficient condition for the stabilization via observerbased state feedback under imperfect premise matching is presented, and an observer-based state feedback controller under imperfect premise is also constructed. The proposed control scheme is well More >

  • Open Access

    ARTICLE

    A Secure Three-Factor Authenticated Key Agreement Scheme for Multi-Server Environment

    Meichen Xia1, *, Shiliang Li1,, Liu Liu2

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1673-1689, 2020, DOI:10.32604/cmc.2020.010177 - 30 June 2020

    Abstract Multi-server authenticated key agreement schemes have attracted great attention to both academia and industry in recent years. However, traditional authenticated key agreement schemes in the single-server environment are not suitable for the multi-server environment because the user has to register on each server when he/she wishes to log in various servers for different service. Moreover, it is unreasonable to consider all servers are trusted since the server in a multi-server environment may be a semi-trusted party. In order to overcome these difficulties, we designed a secure threefactor multi-server authenticated key agreement protocol based on elliptic More >

  • Open Access

    ARTICLE

    Efficient Hierarchical Multi-Server Authentication Protocol for Mobile Cloud Computing

    Jiangheng Kou1, Mingxing He1, *, Ling Xiong1, Zihang Ge2, Guangmin Xie1

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 297-312, 2020, DOI:10.32604/cmc.2020.09758 - 20 May 2020

    Abstract With the development of communication technologies, various mobile devices and different types of mobile services became available. The emergence of these services has brought great convenience to our lives. The multi-server architecture authentication protocols for mobile cloud computing were proposed to ensure the security and availability between mobile devices and mobile services. However, most of the protocols did not consider the case of hierarchical authentication. In the existing protocol, when a mobile user once registered at the registration center, he/she can successfully authenticate with all mobile service providers that are registered at the registration center, More >

  • Open Access

    ARTICLE

    Ameliorate Security by Introducing Security Server in Software Defined Network

    J. Vijila1, *, A. Albert Raj2

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1077-1096, 2020, DOI:10.32604/cmc.2020.08534

    Abstract Software Defined Network (SDN) deals with huge data processing units which possess network management. However, due to centralization behavior ensuring security in SDN is the major concern. In this work to ensure security, a security server has been at its aid to check the vulnerability of the networks and to keep an eye on the packet according to the screening policies. A Secure Shell Connection (SSH) is established by the security server which does a frequent inspection of the network’s logs. Malware detection and the Intrusion Detection System policies are also incorporated in the server More >

  • Open Access

    ARTICLE

    A Novel Privacy‐Preserving Multi‐Attribute Reverse Auction Scheme with Bidder Anonymity Using Multi‐Server Homomorphic Computation

    Wenbo Shi1, Jiaqi Wang2, Jinxiu Zhu3, YuPeng Wang4, Dongmin Choi5

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 171-181, 2019, DOI:10.31209/2018.100000053

    Abstract With the further development of Internet, the decision-making ability of the smart service is getting stronger and stronger, and the electronic auction is paid attention to as one of the ways of decision system. In this paper, a secure multi-attribute reverse auction protocol without the trusted third party is proposed. It uses the Paillier public key cryptosystem with homomorphism and combines with oblivious transfer and anonymization techniques. A single auction server easily collides with a bidder, in order to solve this problem, a single auction server is replaced with multiple auction servers. The proposed scheme More >

  • Open Access

    ARTICLE

    Synchronization of Robot Manipulators Actuated By Induction Motors with Velocity Estimator

    Felipe J. Torres1,*, Gerardo V. Guerrero2, Carlos D. García2, Ricardo Zavala-Yoe3, Mario A. García1, Adolfo R. López4

    CMES-Computer Modeling in Engineering & Sciences, Vol.121, No.2, pp. 609-630, 2019, DOI:10.32604/cmes.2019.07153

    Abstract A complete modeling (including the actuator dynamics) of a robot manipulator that uses three-phase induction motors is presented in this paper. A control scheme is designed to synchronize robot manipulators actuated by induction motors under a masterslave scheme in the case where the joint velocity of the slave robots is estimated. All of the research on the synchronization of robot manipulators assumes the use of ideal actuators to drive the joints; for that reason, in this work, a three-phase induction motor is considered to be a direct-drive actuator for each joint. An entire model of… More >

  • Open Access

    ARTICLE

    Integration of Peridynamic Theory and OpenSees for Solving Problems in Civil Engineering

    Quan Gu1, Lei Wang1, Surong Huang2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.120, No.3, pp. 471-489, 2019, DOI:10.32604/cmes.2019.05757

    Abstract Peridynamics (PD) is a powerful method to simulate the discontinuous problems in civil engineering. However, it may take a lot of effort to implement the material constitutive models into PD program for solving a broad range of problems. OpenSees is an open source software which includes a versatile material library and has been widely used by researchers and engineers in civil engineering. In this context, the paper presents a simple but effective approach to integrate PD with OpenSees by using a Client-Server (CS) software integration technique, such that the existing material constitutive models in OpenSees… More >

  • Open Access

    ARTICLE

    Server-Aided Multi-Secret Sharing Scheme for Weak Computational Devices

    En Zhang1,2, Xintao Duan1,2, Siuming Yiu3, Junbin Fang4, Zoe L. Jiang5,*, Tsz HonYuen6, Jie Peng1

    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 401-414, 2018, DOI:10.3970/cmc.2018.03733

    Abstract In the setting of (t, n) threshold secret sharing, at least t parties can reconstruct the secret, and fewer than t parties learn nothing about the secret. However, to achieve fairness, the existing secret sharing schemes either assume a trusted party exists or require running multi-round, which is not practical in a real application. In addition, the cost of verification grows dramatically with the number of participants and the communication complexity is O(t), if there is not a trusted combiner in the reconstruction phase. In this work, we propose a fair server-aided multi-secret sharing scheme for weak… More >

  • Open Access

    ARTICLE

    Interobserver variability in the classification of congenital coronary abnormalities: A substudy of the anomalous connections of the coronary arteries registry

    Athanasios Koutsoukis1, Xavier Halna du Fretay2, Patrick Dupouy3, Phalla Ou4, Jean-Pierre Laissy4, Jean-Michel Juliard5, Fabien Hyafil6, Pierre Aubry5

    Congenital Heart Disease, Vol.12, No.6, pp. 726-732, 2017, DOI:10.1111/chd.12504

    Abstract Objective: The diagnosis of anomalous connections of the coronary arteries (ANOCOR) requires an appropriate identification for the management of the patients involved. We studied the observer variability in the description and classification of ANOCOR between a nonexpert group of physicians and a group of expert physicians, using the ANOCOR cohort.
    Patients and design: Consecutive patients identified by 71 referring cardiologists were included in the ANOCOR cohort. Anomalous connection was diagnosed by invasive and/or computed tomography coronary angiography. Angiographic images were reviewed by an angiographic committee with experience in this field. Both investigators and angiographic committee filled out… More >

Displaying 41-50 on page 5 of 50. Per Page