Journals / CMC / Vol.,
Table of Content

Research Article


Analysis, Processing, and Applications of Fuzzy System and Deep Learning

Submission Deadline: 30 July 2022


This article has no abstract.


Fuzzy method, deep learning, software engineering for fuzzy systems, Fuzzy systems in robotics and mechatronics, data processing, Pattern Recognition's fuzzy system application, Artificial Intelligence.
  • Research Article

    BEST PAPER 2021

    Suggestion of Maintenance Criteria for Electric Railroad Facilities Based on Fuzzy TOPSIS

    Sunwoo Hwang1, Joouk Kim1, Hagseoung Kim1, Hyungchul Kim2, Youngmin Kim3,* CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5453-5466, 2022, DOI:10.32604/cmc.2022.021057
    Abstract This paper is on the suggestion of maintenance items for electric railway facility systems. With the recent increase in the use of electric locomotives, the utilization and importance of railroad electrical facility systems are also increasing, but the railroad electrical facility system in Korea is rapidly aging. To solve this problem, various methodologies are applied to ensure operational reliability and stability for railroad electrical facility systems, but there is a lack of detailed evaluation criteria for railroad electrical facility system maintenance. Also, maintenance items must be selected in a scientific and systematic method. Therefore, railroad electrical facility systems are selected… More >

    Graphic Abstract

  • Research Article

    BEST PAPER 2021

    Efficient Autonomous Defense System Using Machine Learning on Edge Device

    Jaehyuk Cho* CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3565-3588, 2022, DOI:10.32604/cmc.2022.020826
    Abstract As a large amount of data needs to be processed and speed needs to be improved, edge computing with ultra-low latency and ultra-connectivity is emerging as a new paradigm. These changes can lead to new cyber risks, and should therefore be considered for a security threat model. To this end, we constructed an edge system to study security in two directions, hardware and software. First, on the hardware side, we want to autonomically defend against hardware attacks such as side channel attacks by configuring field programmable gate array (FPGA) which is suitable for edge computing and identifying communication status to… More >

    Graphic Abstract

Share Link

WeChat scan