column
Overview of Network Security of Cyber-Physical Systems
DING Da, CAO Jie
2019, 48(5): 513-521, 527. DOI: 10.13976/j.cnki.xk.2019.9160
PDF
Incremental Detection Mechanism of a Microgrid under False Data Injection Attacks
PENG Huaye, PENG Chen, SUN Hongtao, YANG Mingjin
2019, 48(5): 522-527. DOI: 10.13976/j.cnki.xk.2019.9156
PDF
Memory-Event-Triggered Control of Networked Control Systems Subject to DoS Attacks
WANG Kunyu, WEI Linnan, TIAN Engang, ZHANG Jinlong
2019, 48(5): 528-535. DOI: 10.13976/j.cnki.xk.2019.9159
PDF
A Debris Flow Prediction Model Based on the Improved KPCA and Mixed Kernel Function LSSVR
LI Limin, CHENG Shaokang, WEN Zongzhou, XIAO Mingwei, XU Genqi, ZHANG Shunfeng
2019, 48(5): 536-544. DOI: 10.13976/j.cnki.xk.2019.9052
PDF
Adaptive Selection Method of a Buck-Boost Matrix Converter's Main Circuit Parameters with Rated Current
LIU Ji, ZHANG Xiaoping, ZHANG Ruirui
2019, 48(5): 545-551. DOI: 10.13976/j.cnki.xk.2019.8582
PDF
Hybrid EDA for Three-phase Heterogeneous Parallel Machine Assembly Integrated Scheduling Problem
DENG Chao, QIAN Bin, HU Rong, WANG Ling
2019, 48(5): 552-558. DOI: 10.13976/j.cnki.xk.2019.8565
PDF
Image Denoizing Algorithm Based on Improved PM and Recursive Filter
WANG Lingzhi, ZHOU Xianchun, CHEN Ming
2019, 48(5): 559-566. DOI: 10.13976/j.cnki.xk.2019.8543
PDF
Fault Diagnosis Method Based on Power-average Operator and Evidence Theory
WANG Hongfei, LIU Haibin, DENG Xinyang, JIANG Wen
2019, 48(5): 567-572. DOI: 10.13976/j.cnki.xk.2019.8531
PDF
Iterative Feedback Tuning Control and Optimization of Pneumatic Muscle Actuators
TAO Hongfeng, LIU Wei, YANG Huizhong
2019, 48(5): 573-579. DOI: 10.13976/j.cnki.xk.2019.8513
PDF
Adaptive Extended Kalman Filters for Nonlinear Fractional-order Systems with Colored Noises
YANG Chao, GAO Zhe, HUANG Xiaomin, MA Ruicheng
2019, 48(5): 580-588. DOI: 10.13976/j.cnki.xk.2019.9026
PDF
Disturbance Torque Estimate and Adaptive Compensation for Optoelectronic Stabilized Platform
ZHANG Weiming, SHI Zelin, MA Depeng
2019, 48(5): 589-594, 602. DOI: 10.13976/j.cnki.xk.2019.9028
PDF
Fault Detection for Networked Control Systems Based on Round-Robin Protocol
WANG Hao, JIANG Shun, PAN Feng
2019, 48(5): 595-602. DOI: 10.13976/j.cnki.xk.2019.9041
PDF
Research on Two-hop QoS Routing Based on Link Reliability
SUN Ziwen, WU Ping
2019, 48(5): 603-611, 626. DOI: 10.13976/j.cnki.xk.2019.8637
PDF
Adaptive Neural Performance-guaranteed VSG Control for DFIG-based Wind Power Generators
HUO Xianxu, LI Bingyun, CHEN Peiyu, XU Ke, YANG Qinmin, WANG keyou
2019, 48(5): 612-618, 626. DOI: 10.13976/j.cnki.xk.2019.8485
PDF
Fast Disturbance Rejection Consensus for Second-order Multi-agent Based on Sliding Mode
CHEN Shiming, XIE Yunjing, WANG Mingyu
2019, 48(5): 619-626. DOI: 10.13976/j.cnki.xk.2019.8515
PDF
Vehicle Target Detection Based on Deep Self-encoding Network with TDA
REN Yajing, ZHANG Hongli
2019, 48(5): 627-633. DOI: 10.13976/j.cnki.xk.2019.8567
PDF
Calibration Modeling for On-line Monitoring of Ethanol Fermentation Processes Based on FT-NIR Spectra Technology
WANG Xudong, LIU Tao, SUN Xudong
2019, 48(5): 634-640. DOI: 10.13976/j.cnki.xk.2019.8530
PDF