Searched for: +
(1 - 20 of 121)

Pages

Identifying the Design Feature That Causes Project Delay in DfMA
Identifying the Design Feature That Causes Project Delay in DfMA: A Dominant Element Analysis Method for Project Scheduling
DACOOP-A
DACOOP-A: Decentralized Adaptive Cooperative Pursuit via Attention
Performance analysis of an idealized Darrieus–Savonius combined vertical axis wind turbine
Performance analysis of an idealized Darrieus–Savonius combined vertical axis wind turbine
Learning-Based Multi-UAV Flocking Control With Limited Visual Field and Instinctive Repulsion
Learning-Based Multi-UAV Flocking Control With Limited Visual Field and Instinctive Repulsion
Cloud-based battery failure prediction and early warning using multi-source signals and machine learning
Cloud-based battery failure prediction and early warning using multi-source signals and machine learning
Creation of memory–memory entanglement in a metropolitan quantum network
Creation of memory–memory entanglement in a metropolitan quantum network
Spiking Neural-Networks-Based Data-Driven Control
Spiking Neural-Networks-Based Data-Driven Control
Effects of phosphate addition on the removal of disinfection by-product formation potentials by biological activated carbon filtration
Effects of phosphate addition on the removal of disinfection by-product formation potentials by biological activated carbon filtration
Fusion protocol for Majorana modes in coupled quantum dots
Fusion protocol for Majorana modes in coupled quantum dots
A numerical study on the blade-vortex interaction of a two-dimensional Darrieus-Savonius combined vertical axis wind turbine
A numerical study on the blade-vortex interaction of a two-dimensional Darrieus-Savonius combined vertical axis wind turbine
Damage pattern recognition for corroded beams strengthened by CFRP anchorage system based on acoustic emission techniques
Damage pattern recognition for corroded beams strengthened by CFRP anchorage system based on acoustic emission techniques
A Secure Robot Learning Framework for Cyber Attack Scheduling and Countermeasure
A Secure Robot Learning Framework for Cyber Attack Scheduling and Countermeasure
Reinforcement Learning for Safe Robot Control using Control Lyapunov Barrier Functions
Reinforcement Learning for Safe Robot Control using Control Lyapunov Barrier Functions
A novel viral infection model to guide optimal mpox treatment
A novel viral infection model to guide optimal mpox treatment
A laboratory evaluation of factors affecting rutting resistance of asphalt mixtures using wheel tracking test
A laboratory evaluation of factors affecting rutting resistance of asphalt mixtures using wheel tracking test
A Sub-1 V Capacitively Biased BJT-Based Temperature Sensor With an Inaccuracy of  ± 0.15  ∘ C (3 σ ) From  − 55  ∘ C to 125  ∘ C
A Sub-1 V Capacitively Biased BJT-Based Temperature Sensor With an Inaccuracy of ± 0.15 ∘ C (3 σ ) From − 55 ∘ C to 125 ∘ C
Unwieldy Object Delivery With Nonholonomic Mobile Base
Unwieldy Object Delivery With Nonholonomic Mobile Base: A Stable Pushing Approach
Graph Partition and Multiple Choice-UCB Based Algorithms for Edge Server Placement in MEC Environment
Graph Partition and Multiple Choice-UCB Based Algorithms for Edge Server Placement in MEC Environment
Repair concrete structures with high-early-strength engineered cementitious composites (HES-ECC)
Repair concrete structures with high-early-strength engineered cementitious composites (HES-ECC): Material design and interfacial behavior
Deep reinforcement learning control approach to mitigating actuator attacks
Deep reinforcement learning control approach to mitigating actuator attacks
Searched for: +
(1 - 20 of 121)

Pages