SIA OpenIR

Browse/Search Results:  1-10 of 497 Help

Selected(0)Clear Items/Page:    Sort:
改进狼群算法求解模具在模台上组合分配问题 期刊论文
系统仿真学报, 2021, 卷号: 33, 期号: 1, 页码: 127-140
Authors:  韩忠华;  刘约翰;  李曼;  孙亮亮;  郑鸿志;  韩忠华;  刘约翰;  李曼;  孙亮亮;  郑鸿志
Adobe PDF(1513Kb)  |  Favorite  |  View/Download:10/0  |  Submit date:2021/01/24
狼群算法  混凝土预制构件  模具模台分配  莱维飞行  汉明距离  
A Novel Evolution Strategy of Level Set Method for the Segmentation of Overlapping Cervical Cells 期刊论文
APPLIED SCIENCES-BASEL, 2021, 卷号: 11, 期号: 1, 页码: 1-23
Authors:  Liu GQ(刘广琦);  Ding QH(丁庆海);  Luo HB(罗海波);  Ju MR(鞠默然);  Jin TM(金天明);  He M(何淼);  Dong G(董刚)
Adobe PDF(8515Kb)  |  Favorite  |  View/Download:36/5  |  Submit date:2021/01/30
cervical cell  image segmentation  level set method  ISBI  topology filtering  
Research on Conflict Resolution Method of Production Evaluation Index in Flexible Manufacturing Field Based on Multiplayer Cooperative Game 期刊论文
IEEE Access, 2021, 卷号: 9, 页码: 7336-7352
Authors:  Han C(韩超);  Chang DL(常大亮);  Meng F(孟付)
Adobe PDF(2555Kb)  |  Favorite  |  View/Download:35/0  |  Submit date:2021/01/24
Flexible ow shop  limited buffer  public buffer  multiplayer cooperative game  con ict resolution  local assignment rules  
Joint Algorithm of Message Fragmentation and No-Wait Scheduling for Time-Sensitive Networks 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2021, 卷号: 8, 期号: 2, 页码: 478-490
Authors:  Jin X(金曦);  Xia CQ(夏长清);  Guan N(关楠);  Zeng P(曾鹏)
Adobe PDF(1483Kb)  |  Favorite  |  View/Download:105/4  |  Submit date:2021/01/30
Message fragmentation  networked control system  real-time scheduling  time sensitive network  
Energy-efficient task offloading based on differential evolution in edge computing system with energy harvesting 期刊论文
IEEE Access, 2021, 卷号: 9, 页码: 16383-16391
Authors:  Sun, Yingying;  Song CH(宋纯贺);  Yu SM(于诗矛);  Liu YY(刘意杨);  Pan, Hao;  Zeng P(曾鹏)
Adobe PDF(3817Kb)  |  Favorite  |  View/Download:61/4  |  Submit date:2021/02/14
Edge computing  task offloading  energy harvesting  differential evolutionary algorithm  
The Maximum Number of Cells with Modulated Binary Sensors 期刊论文
IEEE Sensors Journal, 2021, 页码: 1-14
Authors:  Luo LX(罗龙祥);  Xiao Y(肖杨);  Liang W(梁炜)
Adobe PDF(1090Kb)  |  Favorite  |  View/Download:29/0  |  Submit date:2021/03/14
Internet of Things (IoT)  Binary sensors  Sensor Deployment  Sensor Array  Spatial Awareness  the maximum number of cells  
Transmission Scheduling With Order Constraints in WIA-FA-Based AGV Systems 期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2021, 卷号: 8, 期号: 1, 页码: 381-392
Authors:  Shi HG(石华光);  Zheng M(郑萌);  Liang W(梁炜);  Zhang JL(张嘉麟);  Wang K(王轲);  Liu S(刘帅)
Adobe PDF(1705Kb)  |  Favorite  |  View/Download:104/3  |  Submit date:2021/01/17
Job shop scheduling  Reliability  Wireless sensor networks  Wireless communication  Delays  Servers  Automated guided vehicles (AGVs)  industrial wireless sensor networks (IWSNs)  order constraint  reliability  transmission scheduling  
Furnace-Grouping Problem Modeling and Multi-Objective Optimization for Special Aluminum 期刊论文
IEEE Transactions on Emerging Topics in Computational Intelligence, 2021, 页码: 1-12
Authors:  Zhang H(张浩);  Ma LB(马连博);  Wang JY(王军义);  Wang L(王亮)
Adobe PDF(1476Kb)  |  Favorite  |  View/Download:32/3  |  Submit date:2021/02/27
Furnace-grouping modeling  multi-objective optimization  artificial bee colony  special aluminum ingots  information learning  
Interactive-Imitation-Based Distributed Coordination Scheme for Smart Manufacturing 期刊论文
IEEE Transactions on Industrial Informatics, 2021, 卷号: 17, 期号: 5, 页码: 3599-3608
Authors:  Yang, Bo;  Zhang JL(张嘉麟);  Shi HG(石华光)
Adobe PDF(1245Kb)  |  Favorite  |  View/Download:43/1  |  Submit date:2021/03/14
Coordinated manufacturing  industrial cyber-physical systems  multiagent imitation learning  
Characteristic Insights on Industrial Cyber Security and Popular Defense Mechanisms 期刊论文
CHINA COMMUNICATIONS, 2021, 卷号: 18, 期号: 1, 页码: 130-150
Authors:  Wan M(万明);  Li JW(李嘉玮);  Liu Y(刘颖);  Zhao JM(赵剑明);  Wang, Jiushuang
Adobe PDF(2763Kb)  |  Favorite  |  View/Download:39/2  |  Submit date:2021/03/14
industrial cyber threats  industrial characteristics  vulnerabilities  security mechanisms and viewpoints