Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Design of a longitudinal trajectory tracking control law for somersault maneuver flight
Donghong ZHAO, Chuangxin ZHAO, Hewei NIE, Quhui ZHANG, Jiaqi YANG
Journal of Computer Applications    2025, 45 (11): 3739-3746.   DOI: 10.11772/j.issn.1001-9081.2024111592
Abstract38)   HTML1)    PDF (1965KB)(22)       Save

To enhance the combat capability of Unmanned Aerial Vehicles (UAVs) in the military field and address challenges such as significant aerodynamic parameter perturbations and strong nonlinear coupling during maneuvering flight, a longitudinal trajectory tracking control law design was proposed for a transonic/supersonic UAV, which integrated Robustness Servomechanism Linear Quadratic Regulator (RSLQR) fusion with Model Reference Adaptive Control (MRAC). Specifically, a mathematical model of UAV was established, and based on the framework of RSLQR and MRAC, the pitch channel control law and engine channel control law were designed. A numerical simulation environment was then constructed using Matlab to simulate and analyze the Kulbit flight performance of the proposed control law from the perspectives of calibration, wind disturbance, and parameter perturbation conditions. Simulation results show that the designed control law can ensure robust performance of the somersault maneuver process, improve the ability to suppress disturbances, compensate the uncertainty in the system online and improve the response quality of the system. The law can be used in engineering applications.

Table and Figures | Reference | Related Articles | Metrics
Review of operational mechanisms for blockchain-based decentralized science systems
Yuqi PENG, Jiaolong CHEN, Jiaqi YAN
Journal of Computer Applications    2025, 45 (11): 3407-3415.   DOI: 10.11772/j.issn.1001-9081.2024121847
Abstract128)   HTML29)    PDF (1077KB)(122)       Save

With the rapid development and widespread application of emerging technologies such as blockchain, the Decentralized Science (DeSci) movement has emerged, aiming to improve the traditional centralized scientific system and build an open and inclusive autonomous scientific ecosystem. To address challenges in the centralized scientific system, including issues in information flow, resource allocation, and evaluation mechanisms, the operational mechanisms of blockchain-based DeSci system were reviewed. Firstly, the concept of DeSci and its current applications were introduced. Secondly, through a literature review of DeSci, the operational mechanisms of scientific systems were classified into four aspects — asset management, token economics, organizational governance, and trust construction — from both economic and social perspectives. The current state of the scientific system and the advantages of blockchain technology in addressing existing limitations were summarized according to these categories. Next, the operational mechanisms of decentralized scientific systems based on blockchain and related technologies were analyzed in detail. Finally, the future decentralized scientific ecosystem was explored from the perspective of the entire scientific research process, with challenges and future opportunities faced by decentralized scientific system practices discussed. The review suggests that blockchain-based DeSci systems have the potential to enhance the existing scientific framework, and their operational mechanisms can provide both theoretical foundation and practical directions for developing an autonomous scientific ecosystem.

Table and Figures | Reference | Related Articles | Metrics
Overview of cryptocurrency regulatory technologies research
Jiaxin WANG, Jiaqi YAN, Qian’ang MAO
Journal of Computer Applications    2023, 43 (10): 2983-2995.   DOI: 10.11772/j.issn.1001-9081.2022111694
Abstract595)   HTML67)    PDF (911KB)(2355)       Save

With the help of blockchain and other emerging technologies, cryptocurrencies are decentralized, autonomous and cross-border. Research on cryptocurrency regulatory technologies is not only helpful to fight criminal activities based on cryptocurrencies, but also helpful to provide feasible supervision schemes for the expansion of blockchain technologies in other fields. Firstly, based on the application characteristics of cryptocurrency, the Generation, Exchange and Circulation (GEC) cycle theory of cryptocurrency was defined and elaborated. Then, the frequent international and domestic crimes based on cryptocurrencies were analyzed in detail, and the research status of cryptocurrency security supervision technologies in all three stages was investigated and surveyed as key point. Finally, the cryptocurrency regulatory platform ecology systems and current challenges faced by the regulatory technologies were summarized, and the future research directions of cryptocurrency regulatory technologies were prospected in order to provide reference for subsequent research.

Table and Figures | Reference | Related Articles | Metrics
Survey of anonymity and tracking technology in Monero
Dingkang LIN, Jiaqi YAN, Nandeng BA, Zhenhao FU, Haochen JIANG
Journal of Computer Applications    2022, 42 (1): 148-156.   DOI: 10.11772/j.issn.1001-9081.2021020296
Abstract1733)   HTML78)    PDF (723KB)(1210)       Save

Virtual digital currency provides a breeding ground for terrorist financing, money laundering, drug trafficking and other criminal activities. As a representative emerging digital currency, Monero has a universally acknowledged high anonymity. Aiming at the problem of using Monroe anonymity to commit crimes, Monero anonymity technology and tracking technology were explored as well as the research progresses were reviewed in recent years, so as to provide technical supports for effectively tackling the crimes based on blockchain technology. In specific, the evolution of Monero anonymity technology was summarized, and the tracking strategies of Monero anonymity technology in academic circles were sorted out. Firstly, in the anonymity technologies, ring signature, guaranteed unlinkability (one-off public key), guaranteed untraceability, and the important version upgrading for improving anonymity were introduced. Then, in tracking technologies, the attacks such as zero mixin attack, output merging attack, guess-newest attack, closed set attack, transaction flooding attack, tracing attacks from remote nodes and Monero ring attack were introduced. Finally, based on the analysis of anonymity technologies and tracking strategies, four conclusions were obtained: the development of anonymity technology and the development of tracking technology of Monero promote each other; the application of Ring Confidential Transactions (RingCT) is a two-edged sword, which makes the passive attack methods based on currency value ineffective, and also makes the active attack methods easier to succeed; output merging attack and zero mixin attack complement each other; Monero’s system security chain still needs to be sorted out.

Table and Figures | Reference | Related Articles | Metrics