×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [3]
内容类型
期刊论文 [3]
发表日期
2022 [3]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共3条,第1-3条
帮助
限定条件
发表日期:2022
专题:兰州理工大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Time-impact optimal trajectory planning of vehicle-mounted cleaning mobile manipulator
期刊论文
Taiyangneng Xuebao/Acta Energiae Solaris Sinica, 2022, 卷号: 43, 期号: 4, 页码: 283-287
作者:
C., Li
;
K., Chen
;
N., Wang
;
J., Gong
收藏
  |  
浏览/下载:27/0
  |  
提交时间:2022/06/20
Cleaning
Interpolation
Manipulators
Multiobjective optimization
Particle swarm optimization (PSO)
Robot programming
Solar heating
Thermoelectric power plants
Wear of materials
Heliostat cleaning
Joint space
Mobile manipulator
Multi-objectives optimization
Optimal trajectory planning
Particle swarm optimization
Solar thermal power
Thermal power stations
Tower solar thermal power station
Working efficiency
Performance Analysis of PSDRCT-RFEH-DF in Cooperative Networks
期刊论文
Journal of Electrical and Computer Engineering, 2022, 卷号: 2022
作者:
Zhou, Yongqiang
;
Dai, Lei
;
Qian, Huan
;
Li, Suoping
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2022/06/20
Conversion efficiency
Energy harvesting
Outages
Radio transmission
Cooperative networks
Cooperative transmission
Decode-and-forward
Energy conversion efficiency
Outage probability
Performances analysis
Power allocation ratios
Power splitting
Radio Frequency Energy Harvesting
Transmission protocols
Research on Dual Security Control for a Non-Linear CPS with Multi-Objective Constraints under DoS Attack and Actuator Fault: An Active-Passive Attack-Tolerant Approach
期刊论文
Journal of Control Science and Engineering, 2022, 卷号: 2022
作者:
Zhao, Li
;
Li, Wei
;
Li, Yajie
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2022/04/21
Actuators
Delay control systems
Denial-of-service attack
Fault tolerance
Active/passive
Actuator fault
Attack tolerances
Codesign method
Cyber-physical systems
Denialof- service attacks
Multi objective
Non linear
Passive attacks
Security controls
©版权所有 ©2017 CSpace - Powered by
CSpace