Selected Papers from the 1st International Symposium on Computer Science and Intelligent Control (ISCSIC 2017)

A special issue of Computers (ISSN 2073-431X).

Deadline for manuscript submissions: closed (1 January 2018) | Viewed by 19987

Special Issue Editor

Department of Electrical Engineering and Computer Science, Cleveland State University, Cleveland, OH 44115, USA
Interests: fault-tolerant computing; computer and network security; peer-to-peer and grid computing; performance evaluation of distributed systems
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The 1st International Symposium on Computer Science and Intelligent Control (ISCSIC 2017) will be held at Budapest, Hungary, on 20-22 October 2017. For more information about the conference please use this link: http://www.iscsic.org/.

Selected papers that presented at the conference are invited to submit their extended versions to this Special Issue of the journal Computers after the conference and, at the latest, by 1st January 2018. Submitted papers should be extended to the size of regular research or review articles with 40% extension of new results. All submitted papers will undergo our standard peer-review procedure. Accepted papers will be published in Open Access format in Computers and collected together in this Special Issue website.

Please prepare and format your paper according to the Instructions for Authors. Use the LaTeX or Microsoft Word template file of the journal (both are available from the Instructions for Authors page). Manuscripts should be submitted online via our susy.mdpi.com editorial system.

Prof. Dr. Wenbing Zhao

Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Computers is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cyber-physical systems
  • Internet of Things
  • intelligent control
  • human–machine systems
  • distributed systems
  • cybersecurity

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

18 pages, 5564 KiB  
Article
Failure Detection of Composites with Control System Corrective Response in Drone System Applications
by Mark Bowkett, Kary Thanapalan and Ewen Constant
Computers 2018, 7(2), 23; https://doi.org/10.3390/computers7020023 - 09 Apr 2018
Cited by 8 | Viewed by 6802
Abstract
The paper describes a novel method for the detection of damage in carbon composites as used in drone frames. When damage is detected a further novel corrective response is initiated in the quadcopter flight controller to switch from a four-arm control system to [...] Read more.
The paper describes a novel method for the detection of damage in carbon composites as used in drone frames. When damage is detected a further novel corrective response is initiated in the quadcopter flight controller to switch from a four-arm control system to a three-arm control system. This is made possible as a symmetrical frame is utilized, which allows for a balanced weight distribution between both the undamaged quadcopter and the fallback tri-copter layout. The resulting work allows for continued flight where this was not previously possible. Further developing work includes improved flight stability with the aid of an underslung load model. This is beneficial to the quadcopter as a damaged arm attached to the main body by the motor wires behaves as an underslung load. The underslung load works are also transferable in a dual master and slave drone system where the master drone transports a smaller slave drone by a tether, which acts as an underslung load. Full article
Show Figures

Figure 1

17 pages, 1351 KiB  
Article
High-Precision Control of a Piezo-Driven Nanopositioner Using Fuzzy Logic Controllers
by Mohammed Altaher and Sumeet S. Aphale
Computers 2018, 7(1), 10; https://doi.org/10.3390/computers7010010 - 22 Jan 2018
Cited by 12 | Viewed by 6649
Abstract
This paper presents single- and dual-loop fuzzy control schemes to precisely control the piezo-driven nanopositioner in the x- and y-axis directions. Various issues are associated with this control problem, such as low stability margin due to the sharp resonant peak, nonlinear [...] Read more.
This paper presents single- and dual-loop fuzzy control schemes to precisely control the piezo-driven nanopositioner in the x- and y-axis directions. Various issues are associated with this control problem, such as low stability margin due to the sharp resonant peak, nonlinear dynamics, parameter uncertainty, etc. As such, damping controllers are often utilised to damp the mechanical resonance of the nanopositioners. The Integral Resonant Controller (IRC) is used in this paper as a damping controller to damp the mechanical resonance. A further inherent problem is the hysteresis phenomenon (disturbance), which leads to degrading the positioning performance (accuracy) of the piezo-driven stage. The common approach to treat this disturbance is to invoke tracking controllers in a closed-loop feedback scheme in conjunction with the damping controllers. The traditional approach uses the Integral Controller (I) or Proportional Integral (PI) as a tracking controller, whereas this paper introduces the Proportional and Integral (PI)-like Fuzzy Logic Controller (FLC) as a tracking controller. The effectiveness of the proposed control schemes over conventional schemes is confirmed through comparative simulation studies, and results are presented. The stability boundaries of the proposed control schemes are determined in the same way as with a conventional controller. Robustness against variations in the resonant frequency of the proposed control schemes is verified. Full article
Show Figures

Figure 1

19 pages, 737 KiB  
Article
An Improvement on Remote User Authentication Schemes Using Smart Cards
by Chin-Ling Chen, Yong-Yuan Deng, Yung-Wen Tang, Jung-Hsuan Chen and Yu-Fan Lin
Computers 2018, 7(1), 9; https://doi.org/10.3390/computers7010009 - 15 Jan 2018
Cited by 5 | Viewed by 5827
Abstract
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their claims were such that their schemes defended against ID-theft attacks, reply attacks, undetectable on-line password guessing attacks, off-line password guessing attacks, user impersonation attack, server counterfeit attack [...] Read more.
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their claims were such that their schemes defended against ID-theft attacks, reply attacks, undetectable on-line password guessing attacks, off-line password guessing attacks, user impersonation attack, server counterfeit attack and man-in-the-middle attack. In this paper, we show that Yeh et al.’s schemes are still vulnerable to ID-theft attack, off-line password guessing attacks, undetectable on-line password guessing attacks and user impersonation attack. Notably, problems remain in situations where the user lost a smart card or the malicious legal user. To remedy these flaws, this paper proposes an improvement on Yeh et al.’s remote user authentication schemes using smart cards. Full article
Show Figures

Figure 1

Back to TopTop