Special Issue "Selected Papers from the 1st International Symposium on Computer Science and Intelligent Control (ISCSIC 2017)"

A special issue of Computers (ISSN 2073-431X).

Deadline for manuscript submissions: closed (1 January 2018)

Special Issue Editor

Guest Editor
Prof. Dr. Wenbing Zhao

Department of Electrical Engineering and Computer Science, Cleveland State University, Cleveland, OH 44011, USA
Website | E-Mail
Interests: human motion tracking; rehabilitation; computer vision; distributed systems

Special Issue Information

Dear Colleagues,

The 1st International Symposium on Computer Science and Intelligent Control (ISCSIC 2017) will be held at Budapest, Hungary, on 20-22 October 2017. For more information about the conference please use this link: http://www.iscsic.org/.

Selected papers that presented at the conference are invited to submit their extended versions to this Special Issue of the journal Computers after the conference and, at the latest, by 1st January 2018. Submitted papers should be extended to the size of regular research or review articles with 40% extension of new results. All submitted papers will undergo our standard peer-review procedure. Accepted papers will be published in Open Access format in Computers and collected together in this Special Issue website.

Please prepare and format your paper according to the Instructions for Authors. Use the LaTeX or Microsoft Word template file of the journal (both are available from the Instructions for Authors page). Manuscripts should be submitted online via our susy.mdpi.com editorial system.

Prof. Dr. Wenbing Zhao

Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Computers is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 350 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cyber-physical systems
  • Internet of Things
  • intelligent control
  • human–machine systems
  • distributed systems
  • cybersecurity

Published Papers (3 papers)

View options order results:
result details:
Displaying articles 1-3
Export citation of selected articles as:

Research

Open AccessArticle Failure Detection of Composites with Control System Corrective Response in Drone System Applications
Received: 4 March 2018 / Revised: 5 April 2018 / Accepted: 6 April 2018 / Published: 9 April 2018
PDF Full-text (5564 KB) | HTML Full-text | XML Full-text
Abstract
The paper describes a novel method for the detection of damage in carbon composites as used in drone frames. When damage is detected a further novel corrective response is initiated in the quadcopter flight controller to switch from a four-arm control system to
[...] Read more.
The paper describes a novel method for the detection of damage in carbon composites as used in drone frames. When damage is detected a further novel corrective response is initiated in the quadcopter flight controller to switch from a four-arm control system to a three-arm control system. This is made possible as a symmetrical frame is utilized, which allows for a balanced weight distribution between both the undamaged quadcopter and the fallback tri-copter layout. The resulting work allows for continued flight where this was not previously possible. Further developing work includes improved flight stability with the aid of an underslung load model. This is beneficial to the quadcopter as a damaged arm attached to the main body by the motor wires behaves as an underslung load. The underslung load works are also transferable in a dual master and slave drone system where the master drone transports a smaller slave drone by a tether, which acts as an underslung load. Full article
Figures

Figure 1

Open AccessArticle High-Precision Control of a Piezo-Driven Nanopositioner Using Fuzzy Logic Controllers
Received: 18 December 2017 / Revised: 16 January 2018 / Accepted: 18 January 2018 / Published: 22 January 2018
PDF Full-text (1351 KB) | HTML Full-text | XML Full-text
Abstract
This paper presents single- and dual-loop fuzzy control schemes to precisely control the piezo-driven nanopositioner in the x- and y-axis directions. Various issues are associated with this control problem, such as low stability margin due to the sharp resonant peak, nonlinear
[...] Read more.
This paper presents single- and dual-loop fuzzy control schemes to precisely control the piezo-driven nanopositioner in the x- and y-axis directions. Various issues are associated with this control problem, such as low stability margin due to the sharp resonant peak, nonlinear dynamics, parameter uncertainty, etc. As such, damping controllers are often utilised to damp the mechanical resonance of the nanopositioners. The Integral Resonant Controller (IRC) is used in this paper as a damping controller to damp the mechanical resonance. A further inherent problem is the hysteresis phenomenon (disturbance), which leads to degrading the positioning performance (accuracy) of the piezo-driven stage. The common approach to treat this disturbance is to invoke tracking controllers in a closed-loop feedback scheme in conjunction with the damping controllers. The traditional approach uses the Integral Controller (I) or Proportional Integral (PI) as a tracking controller, whereas this paper introduces the Proportional and Integral (PI)-like Fuzzy Logic Controller (FLC) as a tracking controller. The effectiveness of the proposed control schemes over conventional schemes is confirmed through comparative simulation studies, and results are presented. The stability boundaries of the proposed control schemes are determined in the same way as with a conventional controller. Robustness against variations in the resonant frequency of the proposed control schemes is verified. Full article
Figures

Figure 1

Open AccessArticle An Improvement on Remote User Authentication Schemes Using Smart Cards
Received: 4 December 2017 / Revised: 8 January 2018 / Accepted: 12 January 2018 / Published: 15 January 2018
PDF Full-text (737 KB) | HTML Full-text | XML Full-text
Abstract
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their claims were such that their schemes defended against ID-theft attacks, reply attacks, undetectable on-line password guessing attacks, off-line password guessing attacks, user impersonation attack, server counterfeit attack
[...] Read more.
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their claims were such that their schemes defended against ID-theft attacks, reply attacks, undetectable on-line password guessing attacks, off-line password guessing attacks, user impersonation attack, server counterfeit attack and man-in-the-middle attack. In this paper, we show that Yeh et al.’s schemes are still vulnerable to ID-theft attack, off-line password guessing attacks, undetectable on-line password guessing attacks and user impersonation attack. Notably, problems remain in situations where the user lost a smart card or the malicious legal user. To remedy these flaws, this paper proposes an improvement on Yeh et al.’s remote user authentication schemes using smart cards. Full article
Figures

Figure 1

Back to Top