×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [25]
内容类型
期刊论文 [17]
会议论文 [8]
发表日期
2022 [4]
2021 [1]
2020 [2]
2019 [4]
2018 [4]
2015 [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共25条,第1-10条
帮助
限定条件
专题:兰州理工大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Electrochemical synthesis of PANI-ERGO composite electrode and its application in the reduction of hexavalent chromium
期刊论文
Journal of Environmental Chemical Engineering, 2022, 卷号: 10, 期号: 3
作者:
Li, Yanjuan
;
Wang, Sanfan
;
Wu, Nan
;
Li, Yanhong
;
Zhang, Xuemin
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2022/04/21
Chromium compounds
Composite films
Efficiency
Electrochemical electrodes
Electrolytic reduction
Mass transfer
Polymer films
Semiconducting films
Titanium oxides
Cr-containing wastewater
Electro reduction
Electrochemical reduction of graphene oxide
Electrochemical reductions
Electrochemical synthesis
First-order kinetic models
Initial concentration
Reduction efficiency
Ti electrode
Prioritized Experience Replay based on Multi-armed Bandit
期刊论文
EXPERT SYSTEMS WITH APPLICATIONS, 2022, 卷号: 189
作者:
Liu, Ximing
;
Zhu, Tianqing
;
Jiang, Cuiqing
;
Ye, Dayong
;
Zhao, Fuqing
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2022/03/01
Deep reinforcement learning
Q-learning
Deep Q-network
Experience replay
Multi-armed Bandit
Distribution Network Reconfiguration Method based on Adaptive Multi-Population Fruit Fly Optimization Algorithm
期刊论文
EEA - Electrotehnica, Electronica, Automatica, 2022, 卷号: 70, 期号: 1, 页码: 31-38
作者:
Zhang, Kaiyue
;
Tang, Minan
;
Wang, Qianqian
;
Zhou, Peihua
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2022/07/20
Fruits
Local search (optimization)
Population distribution
Adaptive
Distribution network reconfiguration
Fly optimization algorithms
Fruit fly optimization algorithm
Fruitflies
Intelligent distribution networks
Local search
Multi population
Networks reconfiguration
Objective functions
Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage
期刊论文
Security and Communication Networks, 2022, 卷号: 2022
作者:
Zhang, Qiuyu
;
Fu, Minrui
;
Huang, Yibo
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/06/20
Access control
Cryptography
Digital storage
Long short-term memory
Semantics
Ciphertext-policy attribute-based encryptions
Cloud storages
Encrypted speech
Memory network
Multiusers
Privacy protection
Searchable encryptions
Speech data
Speech encryption
Speech retrieval
Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2021, 卷号: 2021
作者:
Zhang, Qiuyu
;
Zhao, Zhenyu
;
Fu, Minrui
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2021/12/17
Research on Satisfactory Integrated Design of Event- Triggered Fault Accommodation and Network Communication Saving for NCSs With Actuator Saturation Under Non-Uniform Transmission
期刊论文
IEEE ACCESS, 2020, 卷号: 2020, 期号: Vol. 8, 页码: 70293 - 70305
作者:
YAJIE LI,WEI LI
收藏
  |  
浏览/下载:45/0
  |  
提交时间:2020/11/13
active fault-tolerant control
actuator saturation
integrated design
event-triggered fault accommodation
non-uniform transmission
Research on Satisfactory Integrated Design of Event-Triggered Fault Accommodation and Network Communication Saving for NCSs with Actuator Saturation under Non-Uniform Transmission
期刊论文
IEEE Access, 2020, 卷号: 8, 页码: 70293-70305
作者:
Li, Yajie
;
Li, Wei
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2020/11/14
Actuators
Continuous time systems
Fault tolerant computer systems
MATLAB
Active fault tolerant control
Actuator saturations
Communication schemes
Experimental platform
Fault accommodation
Network communications
Nonlinear network control systems
Transmission periods
Fault feature extraction of rotating machinery based on EWT and a weighted multi neighborhood rough set
期刊论文
Zhendong yu Chongji/Journal of Vibration and Shock, 2019, 卷号: 38, 期号: 24, 页码: 235-242
作者:
Wu, Yaochun
;
Zhao, Rongzhen
;
Jin, Wuyin
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2020/11/14
Classification (of information)
Extraction
Iterative methods
Probability
Rotating machinery
Rough set theory
Time domain analysis
Wavelet transforms
Characteristics of vibrations
Empirical wavelet transform(EWT)
Fault feature extractions
Feature selection methods
Multiple neighborhoods
Neighborhood rough sets
Probability of occurrence
Time domain characteristics
Algorithm of blockchain data provenance based on ABE
期刊论文
Tongxin Xuebao/Journal on Communications, 2019, 卷号: 40, 期号: 11, 页码: 101-111
作者:
Tian, Youliang
;
Yang, Kedi
;
Wang, Zuan
;
Feng, Tao
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2020/11/14
Blockchain
Data privacy
Data Sharing
Information dissemination
Visibility
Attribute-based encryptions
Data provenance
Dynamic protections
Experimental simulations
Ho-momorphic encryptions
Privacy protection
Traceability information
Zero knowledge proof
Cloud Storage Scheme on Attribute Blinding Fuzzy Searchable Encryption
期刊论文
Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2019, 卷号: 39, 期号: 7, 页码: 706-713
作者:
Cao, Lai-Cheng
;
Wang, Wei-Ting
;
Kang, Yi-Fan
;
Guo, Xian
;
Feng, Tao
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2020/11/14
Data privacy
Digital storage
Network security
Attribute blinding
Ciphertext-policy attribute-based encryptions
Cloud storages
Pre-decryption
Searchable encryptions
©版权所有 ©2017 CSpace - Powered by
CSpace