scispace - formally typeset
Search or ask a question
Institution

Beihang University

EducationBeijing, China
About: Beihang University is a education organization based out in Beijing, China. It is known for research contribution in the topics: Computer science & Control theory. The organization has 67002 authors who have published 73507 publications receiving 975691 citations. The organization is also known as: Beijing University of Aeronautics and Astronautics.


Papers
More filters
Journal ArticleDOI
TL;DR: The models for Future IoT are not only helpful to interpret the relationship between IoT and reality world, but also beneficial to the implementation of IoT in its current development milieu.
Abstract: Internet of things (IoT) is fascinating; its future architecture is still under construction. Based on the analysis on the basic and essential characters of IoT, this paper deals with Future IoT architecture in two aspects: Unit IoT and Ubiquitous IoT. Focusing on a special application, the architecture of the Unit IoT is built from man like neural network (MLN) model and its modified model. Ubiquitous IoT refers to the global IoT or the integration of multiple Unit IoTs with "ubiquitous" characters, and its architecture employs social organization framework (SOF) model. The models for Future IoT are not only helpful to interpret the relationship between IoT and reality world, but also beneficial to the implementation of IoT in its current development milieu.

308 citations

Journal ArticleDOI
TL;DR: Pt-Ru bimetallic dimer structures are prepared through atomic layer deposition process and the roles of Pt and Ru in hydrogen evolution reaction are identified.
Abstract: Single atom catalysts exhibit particularly high catalytic activities in contrast to regular nanomaterial-based catalysts. Until recently, research has been mostly focused on single atom catalysts, and it remains a great challenge to synthesize bimetallic dimer structures. Herein, we successfully prepare high-quality one-to-one A-B bimetallic dimer structures (Pt-Ru dimers) through an atomic layer deposition (ALD) process. The Pt-Ru dimers show much higher hydrogen evolution activity (more than 50 times) and excellent stability compared to commercial Pt/C catalysts. X-ray absorption spectroscopy indicates that the Pt-Ru dimers structure model contains one Pt-Ru bonding configuration. First principle calculations reveal that the Pt-Ru dimer generates a synergy effect by modulating the electronic structure, which results in the enhanced hydrogen evolution activity. This work paves the way for the rational design of bimetallic dimers with good activity and stability, which have a great potential to be applied in various catalytic reactions. Atomically precise control over elemental distributions presents a challenge in the preparation of catalytic nanomaterials. Here the authors report Pt-Ru bimetallic dimer structures through atomic layer deposition process and identify the roles of Pt and Ru in hydrogen evolution reaction.

307 citations

Journal ArticleDOI
TL;DR: A user authentication protocol scheme with privacy protection for IIoT is proposed and the security of the proposed scheme is proved under a random oracle model, and other security discussions show that the proposed protocol is robust to various attacks.
Abstract: Wireless sensor networks (WSNs) play an important role in the industrial Internet of Things (IIoT) and have been widely used in many industrial fields to gather data of monitoring area. However, due to the open nature of wireless channel and resource-constrained feature of sensor nodes, how to guarantee that the sensitive sensor data can only be accessed by a valid user becomes a key challenge in IIoT environment. Some user authentication protocols for WSNs have been proposed to address this issue. However, previous works more or less have their own weaknesses, such as not providing user anonymity and other ideal functions or being vulnerable to some attacks. To provide secure communication for IIoT, a user authentication protocol scheme with privacy protection for IIoT has been proposed. The security of the proposed scheme is proved under a random oracle model, and other security discussions show that the proposed protocol is robust to various attacks. Furthermore, the comparison results with other related protocols and the simulation by NS-3 show that the proposed protocol is secure and efficient for IIoT.

307 citations

Journal ArticleDOI
TL;DR: The proposed nonlinear-disturbance-observer-based control method obtains not only promising robustness and disturbance rejection performance but also the property of nominal performance recovery.
Abstract: The work presented here is concerned with the robust flight control problem for the longitudinal dynamics of a generic airbreathing hypersonic vehicles (AHVs) under mismatched disturbances via a nonlinear-disturbance-observer-based control (NDOBC) method. Compared with other robust flight control method for AHV, the proposed method obtains not only promising robustness and disturbance rejection performance but also the property of nominal performance recovery. The merits of the proposed method are validated by simulation studies.

306 citations

Journal ArticleDOI
TL;DR: The field of magnetic skyrmions has been actively investigated across a wide range of topics during the last decades as discussed by the authors, including information storage, logic computing gates and non-conventional devices such as neuromorphic computing devices.
Abstract: The field of magnetic skyrmions has been actively investigated across a wide range of topics during the last decades. In this topical review, we mainly review and discuss key results and findings in skyrmion research since the first experimental observation of magnetic skyrmions in 2009. We particularly focus on the theoretical, computational and experimental findings and advances that are directly relevant to the spintronic applications based on magnetic skyrmions, i.e. their writing, deleting, reading and processing driven by magnetic field, electric current and thermal energy. We then review several potential applications including information storage, logic computing gates and non-conventional devices such as neuromorphic computing devices. Finally, we discuss possible future research directions on magnetic skyrmions, which also cover rich topics on other topological textures such as antiskyrmions and bimerons in antiferromagnets and frustrated magnets.

305 citations


Authors

Showing all 67500 results

NameH-indexPapersCitations
Yi Chen2174342293080
H. S. Chen1792401178529
Alan J. Heeger171913147492
Lei Jiang1702244135205
Wei Li1581855124748
Shu-Hong Yu14479970853
Jian Zhou128300791402
Chao Zhang127311984711
Igor Katkov12597271845
Tao Zhang123277283866
Nicholas A. Kotov12357455210
Shi Xue Dou122202874031
Li Yuan12194867074
Robert O. Ritchie12065954692
Haiyan Wang119167486091
Network Information
Related Institutions (5)
Harbin Institute of Technology
109.2K papers, 1.6M citations

96% related

Tsinghua University
200.5K papers, 4.5M citations

92% related

University of Science and Technology of China
101K papers, 2.4M citations

92% related

Nanyang Technological University
112.8K papers, 3.2M citations

92% related

City University of Hong Kong
60.1K papers, 1.7M citations

91% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20241
2023205
20221,178
20216,768
20206,916
20197,080