×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [13]
兰州理工大学 [8]
清华大学 [6]
自动化研究所 [5]
山东大学 [4]
厦门大学 [3]
更多...
内容类型
期刊论文 [35]
会议论文 [13]
学位论文 [5]
其他 [2]
发表日期
2021 [2]
2020 [2]
2019 [5]
2018 [2]
2017 [5]
2016 [6]
更多...
学科主题
Computer S... [1]
Computer S... [1]
Engineerin... [1]
Informatio... [1]
计算机科学技术基础学... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共55条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Separate Control Strategy for a Biomimetic Gliding Robotic Fish
期刊论文
IEEE-ASME TRANSACTIONS ON MECHATRONICS, 2021, 页码: 10
作者:
Dong, Huijie
收藏
  |  
浏览/下载:45/0
  |  
提交时间:2022/01/27
Robot kinematics
Attitude control
Buoyancy
Hydrodynamics
Control systems
Tracking
Torque
Biomimetic robot
gliding robotic fish
motion control
pitch control
underwater robotics
Formal modeling and security analysis method of security protocol based on CPN
期刊论文
Tongxin Xuebao/Journal on Communications, 2021, 卷号: 42, 期号: 9, 页码: 240-253
作者:
Gong, Xiang
;
Feng, Tao
;
Du, Jinze
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2022/02/17
Analysis method
Attack path
Colored Petri Nets
Formal analysis
Formal modeling
Formal security
Modeling analyzes
Security analysis
Security protocols
State-space
Adaptive Fuzzy Nonsmooth Backstepping Output-Feedback Control for Hypersonic Vehicles With Finite-Time Convergence
期刊论文
IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2020, 卷号: 28, 期号: 10, 页码: 2320-2334
作者:
Sun, Jinlin
;
Yi, Jianqiang
;
Pu, Zhiqiang
;
Liu, Zhen
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2021/01/07
Backstepping
Adaptive fuzzy control
Fuzzy logic
finite-time control
fixed-time state observer
A type of energy-efficient secure localization algorithm FM based in dynamic sensor networks
期刊论文
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 卷号: 2020, 期号: 1, 页码: 7
作者:
Xue, Wei-cheng
;
Peng, Bao
;
Wang, Shan-he
;
Hua, Yu
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2020/11/09
Wireless sensor networks
Mobility
Secure localization
FM
Safety check
The Security Assessment on Programmable Logic Controller based on Attack Tree Model and FAHP
会议论文
Shenyang, China, July 12, 2019 - July 14, 2019
作者:
Feng, Tao
;
Shi, Yanxia
;
Gong, Renbin
;
Zhao, Qianchuan
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/15
Analytic hierarchy process
Computation theory
Computer circuits
Controllers
Data acquisition
Decision making
Forestry
Intelligent computing
Probability
Programmable logic controllers
Programmed control systems
Security of data
Attack tree
Fuzzy analytic hierarchy process
Industrial control systems
Programmable logic controllers (PLC)
Protective measures
Security attributes
Shapiro-Wilk tests
Supervisory control and data acquisition
Enhanced electrochemical properties of LiNi0.6Co0.2Mn0.2O2 cathode material by the diffusional Al2O3 coating layer
期刊论文
IONICS, 2019, 卷号: 25, 期号: 2, 页码: 411-419
作者:
Cui, Xiaoling
;
Ai, Ling
;
Mao, Liping
;
Xie, Yingchun
;
Liang, Youwei
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/11/15
LiNi0.6Co0.2Mn0.2O2
Diffusion
Al2O3 coating
High-quality coating layer
Electrochemical performance
Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2019, 页码: 1-11
作者:
Zeng P(曾鹏)
;
Shang WL(尚文利)
;
Gong TY(巩天宇)
;
Chen CY(陈春雨)
;
Hou J(侯静)
收藏
  |  
浏览/下载:73/0
  |  
提交时间:2019/04/13
Optimal perturbation guidance with constraints on terminal flight-path angle and angle of attack
期刊论文
PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART G-JOURNAL OF AEROSPACE ENGINEERING, 2019, 卷号: 233, 页码: 4436-4446
作者:
Zhao, Penglei
;
Chen, Wanchun
;
Yu, Wenbin
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
Optimal guidance
flight control
singular perturbation method
flight-path angle constraint
angle of attack constraint
Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2019, 卷号: 2019, 页码: 1-11
作者:
Shang WL(尚文利)
;
Gong TY(巩天宇)
;
Chen CY(陈春雨)
;
Hou J(侯静)
;
Zeng P(曾鹏)
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2019/04/13
Research on trusted DNP3-BAE protocol based on hash chain
期刊论文
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018, 卷号: 2018, 期号: 1
作者:
Lu, Ye
;
Feng, Tao
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/11/15
Industrial control system
DNP3 protocol
Trusted Computing
Span
©版权所有 ©2017 CSpace - Powered by
CSpace