Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,561)
  • Open Access

    ARTICLE

    Model of a Composite Energy Storage System for Urban Rail Trains

    Liang Jin1,*, Qinghui Meng1, Shuang Liang2

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1145-1152, 2022, DOI:10.32604/csse.2022.017744 - 24 September 2021

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    An Adaptive Fuzzy Control Model for Multi-Joint Manipulators

    Yanzan Han1,*, Huawen Zhang1, Zengfang Shi1, Shuang Liang2

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1043-1057, 2022, DOI:10.32604/csse.2022.017742 - 24 September 2021

    Abstract Multi-joint manipulator systems are subject to nonlinear influences such as frictional characteristics, random disturbances and load variations. To account for uncertain disturbances in the operation of manipulators, we propose an adaptive manipulator control method based on a multi-joint fuzzy system, in which the upper bound information of the fuzzy system is constant and the state variables of the manipulator control system are measurable. The control algorithm of the system is a MIMO (multi-input-multi-output) fuzzy system that can approximate system error by using a robust adaptive control law to eliminate the shadow caused by approximation error. More >

  • Open Access

    ARTICLE

    Adaptive Sliding Mode Control Method for Onboard Supercapacitors System

    Yanzan Han1,*, Hang Zhou1, Zengfang Shi1, Shuang Liang2

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1099-1108, 2022, DOI:10.32604/csse.2022.017741 - 24 September 2021

    Abstract Urban rail trains have undergone rapid development in recent years due to their punctuality, high capacity and energy efficiency. Urban trains require frequent start/stop operations and are, therefore, prone to high energy losses. As trains have high inertia, the energy that can be recovered from braking comes in short bursts of high power. To effectively recover such braking energy, an onboard supercapacitor system based on a radial basis function neural network-based sliding mode control system is proposed, which provides robust adaptive performance. The supercapacitor energy storage system is connected to a bidirectional DC/DC converter to More >

  • Open Access

    ARTICLE

    A CPK-Based Identity Authentication Scheme for IoT

    Mingming Zhang1, Jiaming Mao1,*, Yuanyuan Ma2, Liangjie Xu3, Chuanjun Wang1, Ran Zhao1, Zhihao Li3, Lu Chen4, Wenbing Zhao5

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1217-1231, 2022, DOI:10.32604/csse.2022.017657 - 24 September 2021

    Abstract As the power Internet of Things (IoT) enters the security construction stage, the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and practicality. The existing public key infrastructure (PKI)-based security authentication scheme is currently difficult to apply in many terminals in IoT. Its key distribution and management costs are high, which hinders the development of power IoT security construction. Combined Public Key (CPK) technology uses a small number of seeds to generate unlimited public keys. It is very suitable for identity authentication in the power Internet of… More >

  • Open Access

    ARTICLE

    Mining Syndrome Differentiating Principles from Traditional Chinese Medicine Clinical Data

    Jialin Ma1,*, Zhaojun Wang2, Hai Guo3, Qian Xie1,4, Tao Wang4, Bolun Chen5

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 979-993, 2022, DOI:10.32604/csse.2022.016759 - 24 September 2021

    Abstract Syndrome differentiation-based treatment is one of the key characteristics of Traditional Chinese Medicine (TCM). The process of syndrome differentiation is difficult and challenging due to its complexity, diversity and vagueness. Analyzing syndrome principles from historical records of TCM using data mining (DM) technology has been of high interest in recent years. Nevertheless, in most relevant studies, existing DM algorithms have been simply developed for TCM mining, while the combination of TCM theories or its characteristics with DM algorithms has rarely been reported. This paper presents a novel Symptom-Syndrome Topic Model (SSTM), which is a supervised probabilistic More >

  • Open Access

    ARTICLE

    VacChain: A Blockchain-Based EMR System to Manage Child Vaccination Records

    Azza Abdullah Alnssayan, Mohammad Mahdi Hassan*, Suliman A. Alsuhibany

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 927-945, 2022, DOI:10.32604/csse.2022.016734 - 24 September 2021

    Abstract The digitalization of healthcare-related information service systems has become a trend across the world. However, several crucial services are still provided manually due to a lack of trust in digital solutions. One such service is keeping records of children’s vaccination, which still relies on a paper-based file system in most parts of the world. This approach causes serious data integrity problems. Recently, healthcare has become a potential application area of the blockchain, as it can preserve and protect highly sensitive private medical records while sharing these records in a decentralized manner without losing personal ownership. More >

  • Open Access

    ARTICLE

    A Tradeoff Between Accuracy and Speed for K-Means Seed Determination

    Farzaneh Khorasani1, Morteza Mohammadi Zanjireh1,*, Mahdi Bahaghighat1, Qin Xin2

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1085-1098, 2022, DOI:10.32604/csse.2022.016003 - 24 September 2021

    Abstract With a sharp increase in the information volume, analyzing and retrieving this vast data volume is much more essential than ever. One of the main techniques that would be beneficial in this regard is called the Clustering method. Clustering aims to classify objects so that all objects within a cluster have similar features while other objects in different clusters are as distinct as possible. One of the most widely used clustering algorithms with the well and approved performance in different applications is the k-means algorithm. The main problem of the k-means algorithm is its performance… More >

  • Open Access

    ARTICLE

    Analyzing the Data of Software Security Life-Span: Quantum Computing Era

    Hashem Alyami1, Mohd Nadeem2, Wael Alosaimi3, Abdullah Alharbi3, Rajeev Kumar4,*, Bineet Kumar Gupta4, Alka Agrawal2, Raees Ahmad Khan2

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 707-716, 2022, DOI:10.32604/iasc.2022.020780 - 22 September 2021

    Abstract Software or web application security is the main objective in the era of Information Technology (IT) and Artificial Intelligence (AI). Distinguishing proof of security at the initial stage produces significant results to comprehend the administration of security relics for best potential outcomes. A security alternative gives several methods and algorithms to ensure the software security. Security estimation is the vital factor in assessing, administrating, controlling security to improve the nature of security. It is to be realized that assessment of security at early stage of development helps in identifying distinctive worms, dangers, weaknesses and threats.… More >

  • Open Access

    ARTICLE

    Constructing a Deep Image Analysis System Based on Self-Driving and AIoT

    Wen-Tsai Sung1, Sung-Jung Hsiao2,*, Chung-Yen Hsiao1

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 1223-1240, 2022, DOI:10.32604/iasc.2022.020746 - 22 September 2021

    Abstract This research is based on the system architecture of Edge Computing in the AIoT (Artificial Intelligence & Internet of Things) field. In terms of receiving data, the authors proposed approach employed the camera module as the video source, the ultrasound module as the distance measurement source, and then compile C++ with Raspberry Pi 4B for image lane analysis, while Jetson Nano uses the YOLOv3 algorithm for image object detection. The analysis results of the two single-board computers are transmitted to Motoduino U1 in binary form via GPIO, which is used for data integration and load… More >

  • Open Access

    ARTICLE

    Competitive Risk Aware Algorithm for k-min Search Problem

    Iftikhar Ahmad1,*, Abdulwahab Ali Almazroi2, Mohammed A. Alqarni3, Muhammad Kashif Nawaz1

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 1131-1142, 2022, DOI:10.32604/iasc.2022.020715 - 22 September 2021

    Abstract In a classical k-min search problem, an online player wants to buy k units of an asset with the objective of minimizing the total buying cost. The problem setting allows the online player to view only a single price quotation at each time step. A price quotation is the price of one unit of an asset. After receiving the price quotation, the online player has to decide on the number of units to buy. The objective of the online player is to buy the required k units in a fixed length investment horizon. Online algorithms are proposed More >

Displaying 16391-16400 on page 1640 of 31561. Per Page