Kangkang Zhang
YOU?
Author Swipe
View article: Electrochemical Hydrogen Pump Using Sno2-Stabilized Csh2po4 Proton Transport Membrane: A Performance Evaluation at 250oc
Electrochemical Hydrogen Pump Using Sno2-Stabilized Csh2po4 Proton Transport Membrane: A Performance Evaluation at 250oc Open
View article: SnO<sub>2</sub> modified CsH<sub>2</sub>PO<sub>4</sub> (CDP) protonic electrolyte for an electrochemical hydrogen pump
SnO<sub>2</sub> modified CsH<sub>2</sub>PO<sub>4</sub> (CDP) protonic electrolyte for an electrochemical hydrogen pump Open
Hydrophilic SnO 2 is introduced into CsH 2 PO 4 (CDP) to mitigate CDP's dehydration at lower partial pressure of steam, thus retaining proton conductivity.
View article: Stealthy Attack Detection of controlled ramp meters in freeway networks
Stealthy Attack Detection of controlled ramp meters in freeway networks Open
The increasing reliance on intelligent transportation systems (ITS) for traffic management has simultaneously heightened the potential for cybersecurity threats. Malicious cyber attacks on such systems can lead to operational inefficien…
View article: Cooperative Adaptive Cruise Control in the Presence of Communication and Radar Stochastic Data Loss
Cooperative Adaptive Cruise Control in the Presence of Communication and Radar Stochastic Data Loss Open
Control of a platoon of connected vehicles with nonlinear longitudinal dynamics subject to failure in receiving communicated and radio data is addressed in this paper. We consider a scenario when due to malfunction of communication and rad…
View article: Protecting Zn anodes by atomic layer deposition of ZrO<sub>2</sub> to extend the lifetime of aqueous Zn-ion batteries
Protecting Zn anodes by atomic layer deposition of ZrO<sub>2</sub> to extend the lifetime of aqueous Zn-ion batteries Open
Coating of the Zn anode surface with nanoscale ZrO 2 effectively regulates the growth of a surface passive layer, resulting in a low overpotential and long cycle stability.
View article: Identification of Hub Genes in the Pathogenesis of Bronchiolitis Obliterans via Bioinformatic Analysis and Experimental Verification
Identification of Hub Genes in the Pathogenesis of Bronchiolitis Obliterans via Bioinformatic Analysis and Experimental Verification Open
Our study identified and validated four novel BO biomarkers, which may allow further investigation into the development of distinct BO diagnostic markers and novel therapeutic avenues.
View article: Analysis and tuning of a three-term DMC
Analysis and tuning of a three-term DMC Open
Most MPC (Model Predictive Control) algorithms used in industries and studied in the control academia use a two-term QP (quadratic programming), where the first term is the weighted norm of the output errors, and the second term is that of…
View article: Passive Attack Detection for a Class of Stealthy Intermittent Integrity Attacks
Passive Attack Detection for a Class of Stealthy Intermittent Integrity Attacks Open
This paper proposes a passive methodology for detecting a class of stealthy intermittent integrity attacks in cyber-physical systems subject to process disturbances and measurement noise. A stealthy intermittent integrity attack strategy i…
View article: Sensor Threat Isolation for Cyber-Physical Systems
Sensor Threat Isolation for Cyber-Physical Systems Open
View article: Direct, efficient and selective capture of low concentration of CO2 from natural gas flue gas using a high temperature tubular carbon capture membrane
Direct, efficient and selective capture of low concentration of CO2 from natural gas flue gas using a high temperature tubular carbon capture membrane Open
View article: A juvenile murine model with chronic lung inflammation induced by repeated intratracheal instillation of lipopolysaccharides: a versatile and replicable model
A juvenile murine model with chronic lung inflammation induced by repeated intratracheal instillation of lipopolysaccharides: a versatile and replicable model Open
Intratracheal instillation of 0.5 mg/kg LPS once a week for 4 weeks can cause chronic lung inflammation in young mice.
View article: Detecting stealthy integrity attacks in a class of nonlinear cyber–physical systems: A backward-in-time approach
Detecting stealthy integrity attacks in a class of nonlinear cyber–physical systems: A backward-in-time approach Open
View article: A Sensor Watermarking Design for Threat Discrimination
A Sensor Watermarking Design for Threat Discrimination Open
This paper proposes a sensor additive switching watermark methodology for detecting physical faults and replay attacks, and then identifying the occurring threat type: either the physical fault or the replay attack. The sensor watermark me…
View article: Direct, Efficient and Selective Capture of Low Concentration of Co2 from Natural Gas Flue Gas Using a High Temperature Dual-Phase Tubular Ceramic Membrane
Direct, Efficient and Selective Capture of Low Concentration of Co2 from Natural Gas Flue Gas Using a High Temperature Dual-Phase Tubular Ceramic Membrane Open
View article: Stealthy Integrity Attacks for a Class of Nonlinear Cyber-Physical Systems
Stealthy Integrity Attacks for a Class of Nonlinear Cyber-Physical Systems Open
This paper proposes a stealthy integrity attack generation methodology for a class of nonlinear cyber-physical systems. Geometric control theory and stability theory of incremental systems are used to design an attack generation scheme wit…
View article: Discrimination between replay attacks and sensor faults for cyber-physical systems via event-triggered communication
Discrimination between replay attacks and sensor faults for cyber-physical systems via event-triggered communication Open
View article: Identification of Sensor Replay Attacks and Physical Faults for Cyber-Physical Systems
Identification of Sensor Replay Attacks and Physical Faults for Cyber-Physical Systems Open
This letter proposes a threat discrimination methodology for distinguishing between sensor replay attacks and sensor bias faults, based on the specially designed watermark integrated with adaptive estimation. For each threat type, a waterm…
View article: Music generation and human voice conversion based on LSTM
Music generation and human voice conversion based on LSTM Open
Music is closely related to human life and is an important way for people to express their feelings in life. Deep neural networks have played a significant role in the field of music processing. There are many different neural network mode…
View article: Separating Overlapping Bat Calls with a Bi-directional Long Short-term Memory Network
Separating Overlapping Bat Calls with a Bi-directional Long Short-term Memory Network Open
Background: Acquiring clear and usable audio recordings is critical for acoustic analysis of animal vocalizations. Bioacoustics studies commonly face the problem of overlapping signals, which can impede the structural identification of voc…
View article: A Gd@C82-based single molecular electret device with switchable electrical polarization
A Gd@C82-based single molecular electret device with switchable electrical polarization Open
Single molecular electrets exhibiting single molecule electric polarization switching have been long desired as a platform for extremely small non-volatile storage devices, although it is controversial because of the poor stability of sing…
View article: A Gd@C82 single-molecule electret
A Gd@C82 single-molecule electret Open
This is the data for "A Gd@C82 single-molecule electret"
View article: Enhanced Anomaly Detector for Nonlinear Cyber-Physical Systems against Stealthy Integrity Attacks
Enhanced Anomaly Detector for Nonlinear Cyber-Physical Systems against Stealthy Integrity Attacks Open
The detection of stealthy integrity attacks for nonlinear cyber-physical systems is a great challenge for the research community. This paper proposes a backward-in-time detection methodology to enhance the anomaly detector against stealthy…
View article: Separating overlapping bat calls with a bi-directional long short-term memory network
Separating overlapping bat calls with a bi-directional long short-term memory network Open
Acquiring clear and usable audio recordings is critical for acoustic analysis of animal vocalizations. Bioacoustics studies commonly face the problem of overlapping signals, but the issue is often ignored, as there is currently no satisfac…
View article: Comparing context-dependent call sequences employing machine learning methods: an indication of syntactic structure of greater horseshoe bats
Comparing context-dependent call sequences employing machine learning methods: an indication of syntactic structure of greater horseshoe bats Open
For analysis of vocal syntax, accurate classification of call sequence structures in different behavioural contexts is essential. However, an effective, intelligent program for classifying call sequences from numerous recorded sound files …
View article: Incipient Fault Detection Based on Robust Threshold Generators: A Sliding Mode Interval Estimation Approach
Incipient Fault Detection Based on Robust Threshold Generators: A Sliding Mode Interval Estimation Approach Open
This paper presents an incipient fault detection framework for systems with process disturbances and sensor disturbances based on a novel proposed threshold generator. Firstly, the definition of incipient faults is given using the H? from …
View article: Multiple oscillations detection in control loops by using the DFT and Raleigh distribution ★ ★This work was supported by the Natural Sciences and Engineering Research Council (NSERC) of Canada; the National Natural Science Foundation of China [61174161, 61304141, 61375077]; the specialized Research Fund for the Doctoral Program of Higher Education of China [20130121130004]; and the Fundamental Research Funds for the Central Universities in China [201212G005].
Multiple oscillations detection in control loops by using the DFT and Raleigh distribution ★ ★This work was supported by the Natural Sciences and Engineering Research Council (NSERC) of Canada; the National Natural Science Foundation of China [61174161, 61304141, 61375077]; the specialized Research Fund for the Doctoral Program of Higher Education of China [20130121130004]; and the Fundamental Research Funds for the Central Universities in China [201212G005]. Open
This work introduces an oscillation detection method by analyzing the magnitude of signal after the discrete Fourier transform (DFT). Properties of Raleigh distribution are used to calculate a threshold in order to detect multiple oscillat…