UM

Browse/Search Results:  1-10 of 13 Help

Selected(0)Clear Items/Page:    Sort:
Optimized Multi-Agent Formation Control Based on an Identifier-Actor--Critic Reinforcement Learning Algorithm Journal article
IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2018,Volume: 26,Issue: 5,Page: 2719-2731
Authors:  Wen, Guoxing;  Chen, C. L. Philip;  Feng, Jun;  Zhou, Ning
View  |  Adobe PDF(984Kb)  |  Favorite  |  View/Download:640/49  |  Submit date:2018/10/30
Fuzzy logic systems (FLSs)  identifier-actor-critic architecture  multi-agent formation  optimized formation control  reinforcement learning (RL)  
Cost optimization in persistent virtual world design Journal article
INFORMATION TECHNOLOGY & MANAGEMENT, 2018,Volume: 19,Issue: 3,Page: 155-169
Authors:  Bingqing Shen;  Jingzhi Guo;  Ling Xia Li
Favorite  |  View/Download:12/0  |  Submit date:2018/10/30
Cost Optimization  Logical Computer  Persistence  Redundancy  Timeout  Virtual World  
Vortical structures for nanomagnetic memory induced by dipole-dipole interaction in monolayer disks Journal article
SUPERLATTICES AND MICROSTRUCTURES, 2018,Volume: 117,Page: 495-502
Authors:  Liu, Zhaosen;  Ciftja, Orion;  Zhang, Xichao;  Zhou, Yan;  Ian, Hou
Favorite  |  View/Download:14/0  |  Submit date:2018/10/30
Spin vortex  Magnetic memory  Dipolar interaction  
Semantic interoperability with heterogeneous information systems on the internet through automatic tabular document exchange Journal article
Information Systems, 2017,Volume: 69,Page: 195-217
Authors:  Shuo Yang;  Jingzhi Guo;  Ran Wei
Favorite  |  View/Download:8/0  |  Submit date:2019/02/13
Automatic Document Exchange  Information Fusion  Semantic Inference  Semantic Interoperability  Semantic Interpretation  
Cost Optimization in Virtual World Redundancy Management Conference paper
2016 IEEE 13th International Conference on e-Business Engineering (ICEBE), Macau, PEOPLES R CHINA, 4-6 Nov. 2016
Authors:  Bingqing Shen;  Jingzhi Guo;  C. L. Philip Chen
Favorite  |  View/Download:9/0  |  Submit date:2019/02/11
Cost Optimization  Logical Computer  Redundancy  Virtual World  
Energy Optimized Subthreshold VLSI Logic Family with Unbalanced Pull-Up/Down Network and Inverse Narrow-Width Techniques Journal article
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2015,Volume: 23,Issue: 12,Page: 3119-3123
Authors:  Li M.-Z.;  Ieong C.-I.;  Law M.-K.;  Mak P.-I.;  Vai M.-I.;  Pun S.-H.;  Martins R.P.
Favorite  |  View/Download:11/0  |  Submit date:2019/02/11
Cmos  Device Sizing  Electrocardiography (Ecg)  Finite Impulse Response (Fir) Filter  Inverse Narrow Width (Inw)  Logical Effort  Process-voltage-temperature (Pvt) Variations  Subthreshold Standard Logic Library  Ultralow Energy  Ultralow Voltage.  
Cyber security and privacy issues in smart grids Journal article
IEEE Communications Surveys and Tutorials, 2012,Volume: 14,Issue: 4,Page: 981
Authors:  Liu J.;  Xiao Y.;  Li S.;  Liang W.;  Chen C.L.P.
View  |  Adobe PDF(1244Kb)  |  Favorite  |  View/Download:846/195  |  Submit date:2018/10/30
Accountability  Ami  Privacy  Scada  Security  Smart Grid  
Granulations based on semantics of rough logical formulas and its reasoning Conference paper
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Authors:  Liu Q.;  Sun H.;  Wang Y.
Favorite  |  View/Download:1/0  |  Submit date:2019/01/16
λ-closeness  λ-inclusion  Granular reasoning  Granulation  Semantics of rough logical formula  
A Logical Model for Detecting Irregular Actions in Physical Access Environment Conference paper
Proceedings - International Workshop on Database and Expert Systems Applications, DEXA, Regensburg, Germany, 3-7 Sept. 2007
Authors:  António Leong;  Simon Fong;  Zhuang Yan
Favorite  |  View/Download:4/0  |  Submit date:2019/02/13
Access Control  Intrusion Detection  Smart-card  
Smart card-based identification and access control model with real-time suspicious action detection mechanism Conference paper
Proceedings of the IASTED International Conference. Applied Informatics, Innsbruck, AUSTRIA, FEB 16-18, 2004
Authors:  Leong A.;  Fong S.;  Siu S.
Favorite  |  View/Download:7/0  |  Submit date:2019/02/13
Contact-tracing  Intrusion Diction  Real-time System  Smart-card