UM

Browse/Search Results:  1-9 of 9 Help

Selected(0)Clear Items/Page:    Sort:
Optimized Multi-Agent Formation Control Based on an Identifier-Actor--Critic Reinforcement Learning Algorithm Journal article
IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2018,Volume: 26,Issue: 5,Page: 2719-2731
Authors:  Wen, Guoxing;  Chen, C. L. Philip;  Feng, Jun;  Zhou, Ning
View  |  Adobe PDF(984Kb)  |  Favorite  |  View/Download:553/41  |  Submit date:2018/10/30
Fuzzy logic systems (FLSs)  identifier-actor-critic architecture  multi-agent formation  optimized formation control  reinforcement learning (RL)  
Node deployment of high altitude platform based ocean monitoring sensor networks Conference paper
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Tianjin, China, 6 20, 2018 - 6 22, 2018
Authors:  Duan, Jianli;  Liu, Yuxiang;  Lin, Bin;  Jiang, Yuan;  Hou, Fen
Favorite  |  View/Download:1/0  |  Submit date:2018/11/06
Big data mining algorithms for fog computing Conference paper
ACM International Conference Proceeding Series
Authors:  Fong S.
Favorite  |  View/Download:2/0  |  Submit date:2019/02/13
Computer network security  Security threats  SME  
Sensor network optimization of gearbox based on dependence matrix and improved discrete shuffled frog leaping algorithm Journal article
Natural Computing, 2016,Volume: 15,Issue: 4,Page: 653-664
Authors:  Zhao Z.;  Xu Q.;  Jia M.
Favorite  |  View/Download:3/0  |  Submit date:2018/12/23
Crossover  Dependence matrix  Improved discrete shuffled frog leaping algorithm  Mutation  Sensor network optimization  
Linear programming algorithms for sensor networks node localization Conference paper
2016 IEEE International Conference on Consumer Electronics, ICCE 2016
Authors:  Xu K.;  Liu H.-L.;  Liu D.;  Huang X.;  Hou F.
Favorite  |  View/Download:0/0  |  Submit date:2019/03/01
A technical and business perspective on wireless sensor network for manufacturing execution system Journal article
Mathematical Problems in Engineering, 2015,Volume: 2015
Authors:  Xu W.;  Yang Z.;  Wang X.
Favorite  |  View/Download:3/0  |  Submit date:2018/12/22
Cyber security and privacy issues in smart grids Journal article
IEEE Communications Surveys and Tutorials, 2012,Volume: 14,Issue: 4,Page: 981
Authors:  Liu J.;  Xiao Y.;  Li S.;  Liang W.;  Chen C.L.P.
View  |  Adobe PDF(1244Kb)  |  Favorite  |  View/Download:678/98  |  Submit date:2018/10/30
Accountability  Ami  Privacy  Scada  Security  Smart Grid  
DDT-based top-k queries protocol in wireless sensor networks Journal article
Chinese Journal of Sensors and Actuators, 2010,Volume: 23,Issue: 9,Page: 1340-1346
Authors:  Zheng J.;  Jia W.;  Wang G.
Favorite  |  View/Download:1/0  |  Submit date:2019/02/11
Cross-layer optimization  Data management  DDT  Energy efficiency  Top-k  Wireless sensor networks  
Emerging Directions in Embedded and Ubiquitous Computing Book
Berlin, Germany:Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, 2006
Authors:  Denko, M.;  Shih, C.-S.;  Li, K.-C.;  Tsao, S.-L.;  Zeng, Q.-A.;  Park, S.-H.;  Ko, Y.-B.;  Hung, S.-H.;  Park, J.H
Favorite  |  View/Download:1/0  |  Submit date:2019/08/02