Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3,115)
  • Open Access

    ARTICLE

    Stability Analysis of Cyber-Physical Micro Grid Load Frequency Control System with Time-Varying Delay and Non-Linear Load Perturbations

    D. Vijeswaran1,*, V. Manikandan2

    CMES-Computer Modeling in Engineering & Sciences, Vol.121, No.3, pp. 801-813, 2019, DOI:10.32604/cmes.2019.07793

    Abstract In a cyber-physical micro-grid system, wherein the control functions are executed through open communication channel, stability is an important issue owing to the factors related to the time-delay encountered in the data transfer. Transfer of feedback variable as discrete data packets in communication network invariably introduces inevitable time-delays in closed loop control systems. This delay, depending upon the network traffic condition, inherits a time-varying characteristic; nevertheless, it adversely impacts the system performance and stability. The load perturbations in a micro-grid system are considerably influenced by the presence of fluctuating power generators like wind and solar… More >

  • Open Access

    ARTICLE

    A Novel Method for Vibration Mitigation of Complex Mechanical Systems

    Cheng Hu*

    Sound & Vibration, Vol.53, No.5, pp. 199-206, 2019, DOI:10.32604/sv.2019.07712

    Abstract Taking the complex mechanical systems as the research project, a theoretical multi-degree-of-freedom (MDOF) model was established. Based on the vibration characteristics analysis of this system, a novel method of vibration mitigation was proposed, which can be applied to most of the complex mechanical systems. Through this method, limited grounding stiffness was made use of and added to certain degree of freedom (DOF) discretely. Thus, the root-meansquare (RMS) of the systems amplitude can be reduced to ideal level. The MATLAB code based on this method was attached, which was tested on the theoretical model. Consider that More >

  • Open Access

    ARTICLE

    Some Remarks on the Method of Fundamental Solutions for Two Dimensional Elasticity

    M. R. Hematiyan1,*, M. Arezou1, N. Koochak Dezfouli1, M. Khoshroo1

    CMES-Computer Modeling in Engineering & Sciences, Vol.121, No.2, pp. 661-686, 2019, DOI:10.32604/cmes.2019.08275

    Abstract In this paper, some remarks for more efficient analysis of two-dimensional elastostatic problems using the method of fundamental solutions are made. First, the effects of the distance between pseudo and main boundaries on the solution are investigated and by a numerical study a lower bound for the distance of each source point to the main boundary is suggested. In some cases, the resulting system of equations becomes ill-conditioned for which, the truncated singular value decomposition with a criterion based on the accuracy of the imposition of boundary conditions is used. Moreover, a procedure for normalizing More >

  • Open Access

    ARTICLE

    Optimization of Face Recognition System Based on Azure IoT Edge

    Shen Li1, Fang Liu1,*, Jiayue Liang1, Zhenhua Cai1, Zhiyao Liang2

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1377-1389, 2019, DOI:10.32604/cmc.2019.06402

    Abstract With the rapid development of artificial intelligence, face recognition systems are widely used in daily lives. Face recognition applications often need to process large amounts of image data. Maintaining the accuracy and low latency is critical to face recognition systems. After analyzing the two-tier architecture “client-cloud” face recognition systems, it is found that these systems have high latency and network congestion when massive recognition requirements are needed to be responded, and it is very inconvenient and inefficient to deploy and manage relevant applications on the edge of the network. This paper proposes a flexible and… More >

  • Open Access

    ARTICLE

    Pipeline Defect Detection Cloud System Using Role Encryption and Hybrid Information

    Ce Li1,2,*, Xinyu Shang2, Liguo Zhang3,4, Feng Yang1,2, Jing Zheng1,5, Xianlei Xu1

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1245-1260, 2019, DOI:10.32604/cmc.2019.06159

    Abstract Pipeline defect detection systems collect the videos from cameras of pipeline robots, however the systems always analyzed these videos by offline systems or humans to detect the defects of potential security threats. The existing systems tend to reach the limit in terms of data access anywhere, access security and video processing on cloud. There is in need of studying on a pipeline defect detection cloud system for automatic pipeline inspection. In this paper, we deploy the framework of a cloud based pipeline defect detection system, including the user management module, pipeline robot control module, system More >

  • Open Access

    ARTICLE

    Security Analysis of Smart Speaker: Security Attacks and Mitigation

    Youngseok Park1, Hyunsang Choi1, Sanghyun Cho1, Young-Gab Kim2,*

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1075-1090, 2019, DOI:10.32604/cmc.2019.08520

    Abstract The speech recognition technology has been increasingly common in our lives. Recently, a number of commercial smart speakers containing the personal assistant system using speech recognition came out. While the smart speaker vendors have been concerned about the intelligence and the convenience of their assistants, but there have been little mentions of the smart speakers in security aspects. As the smart speakers are becoming the hub for home automation, its security vulnerabilities can cause critical problems. In this paper, we categorize attack vectors and classify them into hardware-based, network-based, and software-based. With the attack vectors, More >

  • Open Access

    ARTICLE

    Automated Negotiation in E Commerce: Protocol Relevance and Improvement Techniques

    S. R. Vij1,*, D. Mukhopadhyay2, A. J. Agrawal3

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1009-1024, 2019, DOI:10.32604/cmc.2019.08417

    Abstract We all negotiate, formally or informally, in jobs, in day today lives and outcomes of negotiations affect those processes of life. Although negotiation is an intrinsic nature of human psyche, it is very complex phenomenon to implement using computing and internet for the various purposes in E Commerce. Automation of negotiation process poses unique challenges for computer scientists and researchers, so here we study how negotiation can be modeled and analyzed mathematically, what can be different techniques and strategies or set of rules/protocols to be implemented and how they can be relevantly implemented. We are… More >

  • Open Access

    ARTICLE

    XML-Based Information Fusion Architecture Based on Cloud Computing Ecosystem

    I-Ching Hsu1,*

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 929-950, 2019, DOI:10.32604/cmc.2019.07876

    Abstract Considering cloud computing from an organizational and end user computing point of view, it is a new paradigm for deploying, managing and offering services through a shared infrastructure. Current development of cloud computing applications, however, are the lack of a uniformly approach to cope with the heterogeneous information fusion. This leads cloud computing to inefficient development and a low potential reuse. This study addresses these issues to propose a novel Web 2.0 Mashups as a Service, called WMaaS, which is a fundamental cloud service model. The WMaaS is developed based on a XML-based Mashups Architecture More >

  • Open Access

    ABSTRACT

    The Rate of Fluid Shear Stress is a Potent Regulator for Lineage Commitment of Mesenchymal Stem Cells Through Modulating [Ca2+]i, F-actin and Lamin A

    Danyang Yue1, Yijuan Fan1, Juan Lu1, Mengxue Zhang1, Jin Zhou1, Yuying Bai1, Jun Pan1,*

    Molecular & Cellular Biomechanics, Vol.16, Suppl.2, pp. 144-144, 2019, DOI:10.32604/mcb.2019.07084

    Abstract Mesenchymal Stem Cells (MSCs) are recruited to the musculoskeletal system following trauma [1] or chemicals stimulation [2]. The regulation of their differentiation into either bone or cartilage cells is a key question. The fluid shear stress (FSS) is of pivotal importance to the development, function and even the repair of all tissues in the musculoskeletal system [3]. We previously found that MSCs are sensitive enough to distinguish a slight change of FSS stimulation during their differentiation commitment to bone or cartilage cells, and the internal mechanisms. In detail, MSCs were exposed to laminar FSS linearly… More >

  • Open Access

    ABSTRACT

    The Importance of Niches-Dimensionality in Regulating the Bone Marrow Hematopoietic Stem Progenitor Cells Pool

    Pan Zhang1,2, Chen Zhang1,2, Jiyang Han1,2, Xiru Liu1,2, Qishan Wang3, Hui Yang1,2,4,*

    Molecular & Cellular Biomechanics, Vol.16, Suppl.2, pp. 132-132, 2019, DOI:10.32604/mcb.2019.06839

    Abstract Research in stem cell biology relies on the knowledge of the cell microenvironment in vivo, known as “stem cell niche”, where stem cells are nurtured by the niche signals. Hematopoietic stem cells (HSCs) are capable of continuously generating and maintaining the body’s full immune and hematopoietic systems. In adult, a pool of hematopoietic cells, including HSCs, primarily reside in the bone marrow (BM) niches that plays critical roles on cell fate. Niche supporting cells, cytokines, extracellular matrix proteins and other biochemical cues associated with HSCs behaviors (quiescence, self-renewal, proliferation, differentiation, mobilization, homing, and apoptosis) has… More >

Displaying 2571-2580 on page 258 of 3115. Per Page