265 | -- | 276 | Min Li, Sherif Bakr. Development of sensing system for 3-dimensional mapping of underground optic fibre cable conduit |
277 | -- | 285 | Xiaoling Shi. Novel asymptotic stabilisation conditions of nonlinear fractional-order composite systems via the decentralised control |
286 | -- | 288 | Jilie Zhang, Tao Feng 0006. From undirected graphs to directed graphs: a new technique makes it possible for multi-agent systems |
289 | -- | 300 | Kangjun Wang, Xiangbin Liu, Hongye Su. Robust immersion and invariance adaptive coordinated control for a class of biaxial gantry systems |
301 | -- | 310 | Jin-Zi Yang, Yuan-Xin Li, Shaocheng Tong. Adaptive asymptotic fault-tolerant tracking of uncertain nonlinear systems with unknown control directions |
311 | -- | 321 | Zubair Ahmad Khan, Khalid Khan, Shuja Ahmad Khan, Shahbaz Khan 0005, Muhammad Tufail, Abdel-Nasser. Dynamic trip point categorisation using manufacturing process for polycrystalline diamond compact bits as case study |
322 | -- | 333 | Guoliang Wang, Yunshuai Ren. Normalised stabilisation for singular semi-Markov jump systems with discontinuous jump states |
334 | -- | 346 | Hongyun Xiong, Jiangxiong Han, Xiaohong Nian, Shiling Li. Nash equilibrium computation of two-network zero-sum games with event-triggered communication |
347 | -- | 354 | Joo-Wha Hong. With great power comes great responsibility: inquiry into the social roles and the power dynamics in human-AI interactions |
355 | -- | 363 | Ramakrishna Allu, Venkata Nageswara Rao Padmanabhuni. Predicting the success rate of a start-up using LSTM with a swish activation function |
364 | -- | 371 | Jiao Li 0005. Time-varying output feedback H∞ control for switched systems based on mixed switching |
372 | -- | 383 | Jun Liu, Chengkun Li. Match and mismatched second-order sliding mode finite-time control with simple parameter conditions and its applications |
384 | -- | 396 | Shuo-Qiu Zhang, Wei-Wei Che, Chao Deng. Observer-based event-triggered control for linear MASs under a directed graph and DoS attacks |