您现在的位置: 首页> 研究主题> fault

fault

fault的相关文献在1989年到2022年内共计340篇,主要集中在肿瘤学、地球物理学、自动化技术、计算机技术 等领域,其中期刊论文337篇、专利文献3篇;相关期刊94种,包括地学前缘、中国科学、中国科学等; fault的相关文献由889位作者贡献,包括Mehran Arian、Zahra Maleki、CHEN等。

fault—发文量

期刊论文>

论文:337 占比:99.12%

专利文献>

论文:3 占比:0.88%

总计:340篇

fault—发文趋势图

fault

-研究学者

  • Mehran Arian
  • Zahra Maleki
  • CHEN
  • Hao Wu
  • Jinfang ZHANG
  • Jing MA
  • Wenbing Wu
  • Wilson Wang
  • Yagang ZHANG
  • ZHENG
  • 期刊论文
  • 专利文献

搜索

排序:

年份

期刊

关键词

    • TANG Huafeng; GUO Tianchan; WU Keqiang; LIU Zilin; XU Jianyong; LU Baoliang; WANG Pujun
    • 摘要: Research on the distribution of mantle CO_(2)should involve comprehensive analysis from CO_(2)source to accumulation.The crust-mantle pathway system is the key controlling factor of the distribution of mantle CO_(2),but has received little attention.The pathway system and controlling factors of CO_(2)distribution in the Bohai Sea are analyzed using data on fault styles and information on the mantle and lithosphere.The relation between volcanic rocks and the distribution of mantle CO_(2)is reassessed using age data for CO_(2)accumulations.The distribution of mantle CO_(2)is controlled by uplift of the asthenosphere and upper mantle,magma conduits in the mantle and fault systems in the crust.Uplifted regions of the asthenosphere are accumulation areas for CO_(2).The area with uplift of the Moho exhibits accumulation of mantle CO_(2)at depth.CO_(2)was mainly derived from vertical migration through the upper mantle and lower crust.The fault style in the upper crust controls the distance of horizontal migration and the locations of CO_(2)concentrations.The distribution of mantle CO_(2)and volcanic rocks are not the same,but both probably followed the same pathways sometimes.Mantle CO_(2)in the Bohai Sea is concentrated in the Bozhong sag and the surrounding area,particularly in a trap that formed before 5.1 Ma and is connected to crustal faults(the Bozhang faults)and lithospheric faults(the Tanlu faults).
    • 摘要: We started this 21 st century with the legacy of Prof.Huntington’s theory of the"Clash of Civilisations",whereby our cultural differences will become the fault lines for future conflicts.So far,Clash of Civilisations is merely a theory begging destruction,but suffice to say that it was incompatible with history,our greatest mentor.History indicates that civilisations do not clash,however interests do.
    • Yong ZHENG; Rumeng GUO
    • 摘要: 1.Background on the seismic gap between the Wenchuan and the Lushan earthquakes The 2008 Mw7.9 Wenchuan earthquake and the 2013 Mw6.9 Lushan earthquake,which occurred in the Longmenshan fault system(hereafter called LMSFS),caused dramatically casualties and huge economic losses.Their aftershock zones outline a seismic gap of about 50 km(Figure 1).
    • Jingyi FENG; Hua CHEN; Weiqiong CAO; Limin FAN; Wei XI; Dengguo FENG
    • 摘要: Dear editor,Implementation attacks such as fault attack(FA)[1]and side-channel analysis(SCA)[2]are significant threats to the cryptographic device security.Infective countermeasure is a promising strategy to resist FAs.Its principle is to scramble the data path of the encryption and make the faulty ciphertext useless in the key retrieval.The scrambling here is called infection.It can be executed either once at the end of the algorithm or multiple times between different encryption operations.
    • 摘要: The increased complexity in system and the growing need of advanced and complicated actuators and sensors towards higher level of automation and autonomy in different engineering applications render the engineering systems susceptible to faults,which may significantly degrade the control performance or even cause catastrophic accidents.Recently,fault detection and diagnosis(FDD)and fault-tolerant control(FTC)techniques have been widely used to diagnose and compensate for the actuator/sensor faults,respectively.
    • Anubhab Baksi; Santanu Sarkar; Akhilesh Siddhanti; Ravi Anand; Anupam Chattopadhyay
    • 摘要: As the fault‐based attacks are becoming a more pertinent threat in today''s era of edge computing/internet‐of‐things,there is a need to streamline the existing tools for better accuracy and ease of use,so that we can gauge the attacker''s power and a proper countermeasure can be devised in the long run.In this regard,we propose a machine learning(ML)assisted tool that can be used in the context of a differential fault attack.In particular,finding the exact fault location by analysing the output difference(typically the XOR of the nonfaulty and the faulty ciphertexts)is somewhat nontrivial.During the literature survey,we notice that the Pearson''s correlation coefficient dominantly is used for this purpose,and has almost become the defacto standard.While this method can yield good accuracy for certain cases,we argue that an MLbased method is more powerful in all the situations we experiment with.We sub-stantiate our claim by showing the relative performances(we choose the commonly used multilayer perceptron as our ML tool)with two variants of Grain‐128a(a stream cipher,and a stream cipher with authentication),the lightweight stream cipher LIZARD and the lightweight block cipher SIMON‐32(where the faults are injected at the fifth last rounds).Our results demonstrate that a common ML tool can outperform the correlation with the same training/testing data.We believe that our work extends the state‐of‐the‐art by showing how traditional cryptographic methods can be replaced by a more powerful ML tool.
    • Bin GUO; Yong CHEN; Anjian ZHOU
    • 摘要: Dear editor,Fault-tolerant tracking control has recently become an area of research interest, in which fault detection, fault-tolerant control(FTC), and tracking-control techniques are integrated [1, 2]. It is noteworthy that disturbance is a critical factor that degrades system performance [3]. Therefore,disturbance attenuation is indispensable when designing a controller scheme. A common method is to develop a compensator, i.e., an anti-disturbance mechanism could be constructed to compensate for the effects of the disturbance.In previous studies, the disturbance observer based control has been reported as an efficient disturbance-attenuation method [4].
    • Qiu TANG; Benqi LI; Yi CHAI; Jianfeng QU; Hao REN
    • 摘要: Dear editor,To satisfy the increasing requirements for safety and quality in industrial processes,process monitoring has been actively investigated in the past decade.The most critical aspects of this approach are the detection of faults in realtime and the diagnosis of fault types.Redundancy and coupling among these variables make it difficult to identify existing correlations between faults and variables,which hinders the quick detection of faults.Furthermore,the large amount of available monitoring data often obscures information about abnormalities and faults.Effective dimension reduction and feature extraction are imperative to address this challenge[1,2].
    • Ming CHENG; Zheng WANG
    • 摘要: THE electric machine systems have been utilized widely and played important roles in many industrial applications.The high-reliability electric machine systems and fault-tolerant operation technology are critical enablers for the industry to unlock significant improvements in system maintainability,total life-cycle costs,and overall system reliability.The high-reliability electric machine systems offer features of simple and robust structures,and low failure rate.When unavoidable failures occur,the faulty parts in electric machine systems should be diagnosed accurately and isolated effectively.The fault-tolerant strategies can help the system maintain operation performance in some certain aspects,and thus keep the total system working continuously.
  • 查看更多

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号