期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A comprehensive survey on the methods of angle of attack measurement and estimation in UAVs
1
作者 L.SANKARALINGAM C.RAMPRASADH 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2020年第3期749-770,共22页
Angle of Attack(AOA) is a crucial parameter which directly affects the aerodynamic forces of an aircraft.The measurement of AOA is required to ensure a safe flight within its designed flight envelop.This paper intends... Angle of Attack(AOA) is a crucial parameter which directly affects the aerodynamic forces of an aircraft.The measurement of AOA is required to ensure a safe flight within its designed flight envelop.This paper intends to summarise a comprehensive survey on the measurement techniques and estimation methods for AOA, specifically in Unmanned Aerial Vehicle(UAV) applications.In the case of UAVs, weight constraint plays a major role as far as sensor suites are concerned.This results in selecting a suitable estimation method to extract AOA using the available data from the autopilot.The most feasible and widely employed AOA measurement technique is by using the Multi-Hole Probes(MHPs).The MHP measures the AOA regarding the pressure variations between the ports.Due to the importance of MHP in AOA measurement, the calibration methods for the MHP are also included in this paper.This paper discusses the AOA measurement using virtual AOA sensors, their importance and the operation. 展开更多
关键词 Angle of attack estimation Angle of attack measurement Angle of attack vane Five-hole probe Multi-hole probe Multi-hole probe calibration Nine-hole probe Seven-hole probe virtual angle of attack sensor
原文传递
Evaluation of Hypervisor Stability towards Insider Attacks
2
作者 Roman Kulikov Svetlana Kolesnikova 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第1期37-42,共6页
Virtualization technology plays a key role in cloud computing.Thus,the security issues of virtualization tools(hypervisors,emulators,etc.) should be under precise consideration.However,threats of insider attacks are... Virtualization technology plays a key role in cloud computing.Thus,the security issues of virtualization tools(hypervisors,emulators,etc.) should be under precise consideration.However,threats of insider attacks are underestimated.The virtualization tools and hypervisors have been poorly protected from this type of attacks.Furthermore,hypervisor is one of the most critical elements in cloud computing infrastructure.Firstly,hypervisor vulnerabilities analysis is provided.Secondly,a formal model of insider attack on hypervisor is developed.Consequently,on the basis of the formal attack model,we propose a new methodology of hypervisor stability evaluation.In this paper,certain security countermeasures are considered that should be integrated in hypervisor software architecture. 展开更多
关键词 Cloud computing hypervisor insider attack hypervisor stability virtualization virtual machine
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部