CASIA OpenIR

浏览/检索结果: 共24条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Privacy-Preserving Consensus-Based Distributed Economic Dispatch of Smart Grids via State Decomposition 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 5, 页码: 1250-1261
作者:  Wei Chen;  Guo-Ping Liu
Adobe PDF(1624Kb)  |  收藏  |  浏览/下载:67/20  |  提交时间:2024/04/10
Consensus-based DED algorithm  privacy preservation  smart grids  state decomposition  
Computational Experiments for Complex Social Systems: Experiment Design and Generative Explanation 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 1022-1038
作者:  Xiao Xue;  Deyu Zhou;  Xiangning Yu;  Gang Wang;  Juanjuan Li;  Xia Xie;  Lizhen Cui;  Fei-Yue Wang
Adobe PDF(7239Kb)  |  收藏  |  浏览/下载:58/13  |  提交时间:2024/03/18
Agent-based modeling  computational experiments  cyber-physical-social systems (CPSS)  generative deduction  generative experiments  meta model  
Cybersecurity Landscape on Remote State Estimation: A Comprehensive Review 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 851-865
作者:  Jing Zhou;  Jun Shang;  Tongwen Chen
Adobe PDF(1169Kb)  |  收藏  |  浏览/下载:48/14  |  提交时间:2024/03/18
Cyber-attacks  Kalman filtering  remote state estimation  unreliable transmission channels  
Simulation Analysis of Deformation Control for Magnetic Soft Medical Robots 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 3, 页码: 794-796
作者:  Jingxi Wang;  Baoyu Liu;  Edmond Q. Wu;  Jin Ma;  Ping Li
Adobe PDF(1124Kb)  |  收藏  |  浏览/下载:124/43  |  提交时间:2024/02/19
A Dual Closed-Loop Digital Twin Construction Method for Optimizing the Copper Disc Casting Process 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 3, 页码: 581-594
作者:  Zhaohui Jiang;  Chuan Xu;  Jinshi Liu;  Weichao Luo;  Zhiwen Chen;  Weihua Gui
Adobe PDF(16387Kb)  |  收藏  |  浏览/下载:63/14  |  提交时间:2024/02/19
Copper disc casting machine  digital twin (DT)  mechanism modeling  self-optimization  
Advancements in Humanoid Robots: A Comprehensive Review and Future Prospects 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 2, 页码: 301-328
作者:  Yuchuang Tong;  Haotian Liu;  Zhengtao Zhang
Adobe PDF(7587Kb)  |  收藏  |  浏览/下载:129/31  |  提交时间:2024/01/23
Future trends and challenges  humanoid robots  human-robot interaction  key technologies  potential applications  
Knowledge Transfer Learning via Dual Density Sampling for Resource-Limited Domain Adaptation 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 12, 页码: 2269-2291
作者:  Zefeng Zheng;  Luyao Teng;  Wei Zhang;  Naiqi Wu;  Shaohua Teng
Adobe PDF(15412Kb)  |  收藏  |  浏览/下载:134/25  |  提交时间:2023/10/31
Cross-domain risk  dual density sampling  intra-domain risk  maximum mean discrepancy  knowledge transfer learning  resource-limited domain adaptation  
Subspace Identification for Closed-Loop Systems With Unknown Deterministic Disturbances 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 12, 页码: 2248-2257
作者:  Kuan Li;  Hao Luo;  Yuchen Jiang;  Dejia Tang;  Hongyan Yang
Adobe PDF(1548Kb)  |  收藏  |  浏览/下载:139/35  |  提交时间:2023/10/31
Bernstein polynomial  closed-loop system  subspace identification  unknown deterministic disturbances  
A Data-Driven Rutting Depth Short-Time Prediction Model With Metaheuristic Optimization for Asphalt Pavements Based on RIOHTrack 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 10, 页码: 1918-1932
作者:  Zhuoxuan Li;  Iakov Korovin;  Xinli Shi;  Sergey Gorbachev;  Nadezhda Gorbacheva;  Wei Huang;  Jinde Cao
Adobe PDF(3879Kb)  |  收藏  |  浏览/下载:116/40  |  提交时间:2023/09/07
Extreme learning machine algorithm with residual correction (RELM), metaheuristic optimization  oil-gas transportation  RIOHTrack  rutting depth  
Attacks Against Cross-Chain Systems and Defense Approaches: A Contemporary Survey 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 8, 页码: 1647-1667
作者:  Li Duan;  Yangyang Sun;  Wei Ni;  Weiping Ding;  Jiqiang Liu;  Wei Wang
Adobe PDF(2148Kb)  |  收藏  |  浏览/下载:137/35  |  提交时间:2023/07/20
Blockchain  cross-chain  defense  distributed private key control  hash-locking  notary  security threats  sidechain/relay