CASIA OpenIR

浏览/检索结果: 共37条,第1-10条 帮助

限定条件        
已选(0)清除 条数/页:   排序方式:
A Survey on Type-3 Fuzzy Logic Systems and Their Control Applications 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 8, 页码: 1744-1756
作者:  Oscar Castillo;  Fevrier Valdez;  Patricia Melin;  Weiping Ding
Adobe PDF(5742Kb)  |  收藏  |  浏览/下载:5/3  |  提交时间:2024/07/16
Applications  control systems  optimization  review  type-3 fuzzy logic  
Low-Rank Optimal Transport for Robust Domain Adaptation 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 7, 页码: 1667-1680
作者:  Bingrong Xu;  Jianhua Yin;  Cheng Lian;  Yixin Su;  Zhigang Zeng
Adobe PDF(3368Kb)  |  收藏  |  浏览/下载:43/19  |  提交时间:2024/06/07
Domain adaptation  low-rank constraint  noise corruption  optimal transport  
Computational Experiments for Complex Social Systems: Integrated Design of Experiment System 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 5, 页码: 1175-1189
作者:  Xiao Xue;  Xiangning Yu;  Deyu Zhou;  Xiao Wang;  Chongke Bi;  Shufang Wang;  Fei-Yue Wang
Adobe PDF(11890Kb)  |  收藏  |  浏览/下载:62/7  |  提交时间:2024/04/10
Artificial society  computational experiments  model integration  operation engine  technology integration  
A Novel Sensing Imaging Equipment Under Extremely Dim Light for Blast Furnace Burden Surface: Starlight High-Temperature Industrial Endoscope 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 893-906
作者:  Zhipeng Chen;  Xinyi Wang;  Weihua Gui;  Jilin Zhu;  Chunhua Yang;  Zhaohui Jiang
Adobe PDF(11937Kb)  |  收藏  |  浏览/下载:52/6  |  提交时间:2024/03/18
Blast furnace (BF)  burden surface  extremely dim light  industrial endoscope  sensing imaging  starlight  
A Dual Closed-Loop Digital Twin Construction Method for Optimizing the Copper Disc Casting Process 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 3, 页码: 581-594
作者:  Zhaohui Jiang;  Chuan Xu;  Jinshi Liu;  Weichao Luo;  Zhiwen Chen;  Weihua Gui
Adobe PDF(16387Kb)  |  收藏  |  浏览/下载:74/16  |  提交时间:2024/02/19
Copper disc casting machine  digital twin (DT)  mechanism modeling  self-optimization  
A Self-Adapting and Efficient Dandelion Algorithm and Its Application to Feature Selection for Credit Card Fraud Detection 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 2, 页码: 377-390
作者:  Honghao Zhu;  MengChu Zhou;  Yu Xie;  Aiiad Albeshri
Adobe PDF(2674Kb)  |  收藏  |  浏览/下载:83/28  |  提交时间:2024/01/23
Credit card fraud detection (CCFD)  dandelion algorithm (DA)  feature selection  normal sowing operator  
Reinforcement Learning in Process Industries: Review and Perspective 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 2, 页码: 283-300
作者:  Oguzhan Dogru;  Junyao Xie;  Om Prakash;  Ranjith Chiplunkar;  Jansen Soesanto;  Hongtian Chen;  Kirubakaran Velswamy;  Fadi Ibrahim;  Biao Huang
Adobe PDF(1275Kb)  |  收藏  |  浏览/下载:67/23  |  提交时间:2024/01/23
Process control  process systems engineering  reinforcement learning  
Geometry Flow-Based Deep Riemannian Metric Learning 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 9, 页码: 1882-1892
作者:  Yangyang Li;  Chaoqun Fei;  Chuanqing Wang;  Hongming Shan;  Ruqian Lu
Adobe PDF(1815Kb)  |  收藏  |  浏览/下载:152/49  |  提交时间:2023/08/10
Curvature regularization  deep metric learning (DML)  embedding learning  geometry flow  riemannian metric  
How Generative Adversarial Networks Promote the Development of Intelligent Transportation Systems: A Survey 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 9, 页码: 1781-1796
作者:  Hongyi Lin;  Yang Liu;  Shen Li;  Xiaobo Qu
Adobe PDF(1497Kb)  |  收藏  |  浏览/下载:226/137  |  提交时间:2023/08/10
Autonomous driving  generative adversarial network (GAN)  intelligent transportation system (ITS)  traffic anomaly inspection  traffic flow  
Attacks Against Cross-Chain Systems and Defense Approaches: A Contemporary Survey 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 8, 页码: 1647-1667
作者:  Li Duan;  Yangyang Sun;  Wei Ni;  Weiping Ding;  Jiqiang Liu;  Wei Wang
Adobe PDF(2148Kb)  |  收藏  |  浏览/下载:148/41  |  提交时间:2023/07/20
Blockchain  cross-chain  defense  distributed private key control  hash-locking  notary  security threats  sidechain/relay