Institution
Beihang University
Education•Beijing, China•
About: Beihang University is a education organization based out in Beijing, China. It is known for research contribution in the topics: Computer science & Control theory. The organization has 67002 authors who have published 73507 publications receiving 975691 citations. The organization is also known as: Beijing University of Aeronautics and Astronautics.
Topics: Computer science, Control theory, Nonlinear system, Microstructure, Artificial neural network
Papers published on a yearly basis
Papers
More filters
••
TL;DR: The models for Future IoT are not only helpful to interpret the relationship between IoT and reality world, but also beneficial to the implementation of IoT in its current development milieu.
Abstract: Internet of things (IoT) is fascinating; its future architecture is still under construction. Based on the analysis on the basic and essential characters of IoT, this paper deals with Future IoT architecture in two aspects: Unit IoT and Ubiquitous IoT. Focusing on a special application, the architecture of the Unit IoT is built from man like neural network (MLN) model and its modified model. Ubiquitous IoT refers to the global IoT or the integration of multiple Unit IoTs with "ubiquitous" characters, and its architecture employs social organization framework (SOF) model. The models for Future IoT are not only helpful to interpret the relationship between IoT and reality world, but also beneficial to the implementation of IoT in its current development milieu.
308 citations
••
TL;DR: Pt-Ru bimetallic dimer structures are prepared through atomic layer deposition process and the roles of Pt and Ru in hydrogen evolution reaction are identified.
Abstract: Single atom catalysts exhibit particularly high catalytic activities in contrast to regular nanomaterial-based catalysts. Until recently, research has been mostly focused on single atom catalysts, and it remains a great challenge to synthesize bimetallic dimer structures. Herein, we successfully prepare high-quality one-to-one A-B bimetallic dimer structures (Pt-Ru dimers) through an atomic layer deposition (ALD) process. The Pt-Ru dimers show much higher hydrogen evolution activity (more than 50 times) and excellent stability compared to commercial Pt/C catalysts. X-ray absorption spectroscopy indicates that the Pt-Ru dimers structure model contains one Pt-Ru bonding configuration. First principle calculations reveal that the Pt-Ru dimer generates a synergy effect by modulating the electronic structure, which results in the enhanced hydrogen evolution activity. This work paves the way for the rational design of bimetallic dimers with good activity and stability, which have a great potential to be applied in various catalytic reactions. Atomically precise control over elemental distributions presents a challenge in the preparation of catalytic nanomaterials. Here the authors report Pt-Ru bimetallic dimer structures through atomic layer deposition process and identify the roles of Pt and Ru in hydrogen evolution reaction.
307 citations
••
TL;DR: A user authentication protocol scheme with privacy protection for IIoT is proposed and the security of the proposed scheme is proved under a random oracle model, and other security discussions show that the proposed protocol is robust to various attacks.
Abstract: Wireless sensor networks (WSNs) play an important role in the industrial Internet of Things (IIoT) and have been widely used in many industrial fields to gather data of monitoring area. However, due to the open nature of wireless channel and resource-constrained feature of sensor nodes, how to guarantee that the sensitive sensor data can only be accessed by a valid user becomes a key challenge in IIoT environment. Some user authentication protocols for WSNs have been proposed to address this issue. However, previous works more or less have their own weaknesses, such as not providing user anonymity and other ideal functions or being vulnerable to some attacks. To provide secure communication for IIoT, a user authentication protocol scheme with privacy protection for IIoT has been proposed. The security of the proposed scheme is proved under a random oracle model, and other security discussions show that the proposed protocol is robust to various attacks. Furthermore, the comparison results with other related protocols and the simulation by NS-3 show that the proposed protocol is secure and efficient for IIoT.
307 citations
••
TL;DR: The proposed nonlinear-disturbance-observer-based control method obtains not only promising robustness and disturbance rejection performance but also the property of nominal performance recovery.
Abstract: The work presented here is concerned with the robust flight control problem for the longitudinal dynamics of a generic airbreathing hypersonic vehicles (AHVs) under mismatched disturbances via a nonlinear-disturbance-observer-based control (NDOBC) method. Compared with other robust flight control method for AHV, the proposed method obtains not only promising robustness and disturbance rejection performance but also the property of nominal performance recovery. The merits of the proposed method are validated by simulation studies.
306 citations
••
TL;DR: The field of magnetic skyrmions has been actively investigated across a wide range of topics during the last decades as discussed by the authors, including information storage, logic computing gates and non-conventional devices such as neuromorphic computing devices.
Abstract: The field of magnetic skyrmions has been actively investigated across a wide range of topics during the last decades. In this topical review, we mainly review and discuss key results and findings in skyrmion research since the first experimental observation of magnetic skyrmions in 2009. We particularly focus on the theoretical, computational and experimental findings and advances that are directly relevant to the spintronic applications based on magnetic skyrmions, i.e. their writing, deleting, reading and processing driven by magnetic field, electric current and thermal energy. We then review several potential applications including information storage, logic computing gates and non-conventional devices such as neuromorphic computing devices. Finally, we discuss possible future research directions on magnetic skyrmions, which also cover rich topics on other topological textures such as antiskyrmions and bimerons in antiferromagnets and frustrated magnets.
305 citations
Authors
Showing all 67500 results
Name | H-index | Papers | Citations |
---|---|---|---|
Yi Chen | 217 | 4342 | 293080 |
H. S. Chen | 179 | 2401 | 178529 |
Alan J. Heeger | 171 | 913 | 147492 |
Lei Jiang | 170 | 2244 | 135205 |
Wei Li | 158 | 1855 | 124748 |
Shu-Hong Yu | 144 | 799 | 70853 |
Jian Zhou | 128 | 3007 | 91402 |
Chao Zhang | 127 | 3119 | 84711 |
Igor Katkov | 125 | 972 | 71845 |
Tao Zhang | 123 | 2772 | 83866 |
Nicholas A. Kotov | 123 | 574 | 55210 |
Shi Xue Dou | 122 | 2028 | 74031 |
Li Yuan | 121 | 948 | 67074 |
Robert O. Ritchie | 120 | 659 | 54692 |
Haiyan Wang | 119 | 1674 | 86091 |