Computer and Modernization ›› 2018, Vol. 0 ›› Issue (07): 58-.doi: 10.3969/j.issn.1006-2475.2018.07.012
Previous Articles Next Articles
Received:
2018-01-05
Online:
2018-08-23
Published:
2018-08-27
CLC Number:
BUYi-chen,HUANGHuan,QINHai-peng,JINXin. AControlSystemforLaserLevelingMachinesBasedonCANBus[J]. Computer and Modernization, 2018, 0(07): 58-.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.c-a-m.org.cn/EN/10.3969/j.issn.1006-2475.2018.07.012
[1]侯明亮,毛恩荣,刘刚.激光控制平地系统控制技术的研究与试验[J].农业工程学报,2006,22(1):110-113. [2]陈君梅,赵祚喜,陈嘉琪,等.水田激光平地机非线性水平控制系统[J].农业机械学报,2014,45(7):79-84. [3]陈嘉琪,赵祚喜,施垒,等.水田激光平地机调平系统动力学建模[J].农业工程学报,2015,31(7):18-23. [4]杨伟伟.水田激光平地机控制系统优化设计[D].广州:华南农业大学,2016. [5]汪佳彪,王忠宾,张霖,等.基于以太网和CAN总线的液压支架电液控制系统研究[J].煤炭学报,2016,41(6):1575-1581. [6]李如石,张津津,任富争.基于C8051F040的CAN总线通信[J].计算机与现代化,2013(3):124-127. [7]曹骞,赵加宝,禹庆荣.基于CAN总线的光伏设备智能监控系统的研究与设计[J].计算机与现代化,2013(3):148-151. [8]姚亚萍.激光控制平地系统的研究与设计[D].杨陵:西北农林科技大学,2010. [9]佟国香,付礼,刘欢.基于CAN总线的STM32应用编程及实现[J].信息技术,2015(10):49-52. [10]胡炼,林潮兴,罗锡文,等.农机具自动调平控制系统设计与试验[J].农业工程学报,2015,31(8):15-20. [11]张洋,刘军,严汉宇,等.精通STM32F4库函数版[M].北京:北京航空航天大学出版社,2015. [12]刘艳行,肖强,李文强.基于TMS320F28335的CAN和以太网接口设计[J].现代电子技术,2013,36(24):128-130. [13]鹿卉芬,刘洪模.基于DSP的CAN总线网络与Ethernet数据实时通信实现[J].计算机与现代化,2009(12):130-132,136. [14]丁力,吴文婷,徐萌萌,等.基于DSP技术和CAN总线的数据采集系统设计[J].测控技术,2014,33(10):56-59. [15]李臣龙,强俊.基于STM32和MPU6050姿态解算的研究与实现[J].佳木斯大学学报(自然科学版),2017,35(2):296-298. [16]KangTaizhong,FangJiancheng,WangWei.Quaternion-optimization-basedin-flightalignmentapproachforairbornePOS[J].IEEETransactionsonInstrumentationandMeasurement,2012,61(11):2916-2923. [17]黎永键,赵祚喜.水田激光平地机平地铲姿态测量系统的设计[J].农机化研究,2012(2):69-75. [18]ProdanovW,ValleM,BuzasR.AcontrollerareanetworkBustransceiverbehavioralmodelfornetworkdesignandsimulation[J].IEEETransactionsonIndustrialElectronics,2009,56(9):3762-3771. |
[1] | LYU Meijing1, NIAN Mei1, ZHANG Jun1, 2, FU Lusen1. Anomaly Detection of Network Traffic Based on Autoencoder [J]. Computer and Modernization, 2024, 0(12): 40-44. |
[2] | XIAO Junbi, QIU Yi. SDN Failure Detection and Recovery Scheme Based on State-aware Data Plane [J]. Computer and Modernization, 2024, 0(12): 116-123. |
[3] | ZHANG Tai1, YAN Zihao2, DUAN Jie2, ZHANG Zhihong2. Information Forwarding Strategy of Internet of Vehicles in Named Data Network [J]. Computer and Modernization, 2024, 0(11): 19-27. |
[4] | DONG Chongchong, ZHAO Cong, WU You, ZHANG Lei, ZHANG Jiawen, LI Zhihao. Zero-trust Dynamic Evaluation Method for IoT Terminals [J]. Computer and Modernization, 2024, 0(11): 41-45. |
[5] | WANG Cong1, YANG Wenjuan1, DING Xingwang2. An Aggregation Model of Historical Archive Resources Based on Multimodal#br# Information Fusion [J]. Computer and Modernization, 2024, 0(10): 120-126. |
[6] | MA Huiping1, LI Peng1, 2, HU Sujun1. Security Game Analysis Model of RFID System Based on Bayesian Attack Graph [J]. Computer and Modernization, 2024, 0(07): 93-99. |
[7] | ZHAO Wenbo1, XIANG Dong1, WANG Jiubin2, DENG Yuehui3, ZHANG Wei1, KANG Qian1, LI Yujie1. Infrared Image Segmentation of Electrical Equipment Based on Improved Slime Mould Algorithm and Tsallis Entropy [J]. Computer and Modernization, 2024, 0(06): 70-75. |
[8] | LI Shuang1, 2, YE Ning1, 2, XU Kang1, 2, WANG Su1, WANG Ruchuan1, 2. Edge Computing Unloading Method for Intelligent Elderly Care [J]. Computer and Modernization, 2024, 0(06): 95-102. |
[9] | SU Kaixuan . Network Intrusion Detection Based on Improved XGBoost Model [J]. Computer and Modernization, 2024, 0(06): 109-114. |
[10] | YUAN Hongwei1, CHANG Lijun1, HAO Jianhuan2, FAN Na2, WANG Chao2, LUO Chuang2, ZHANG Zehui2. Trajectory Interest Points Mining Based on Label Propagation and Privacy Protection [J]. Computer and Modernization, 2024, 0(05): 46-54. |
[11] | WANG Dongyue, LIU Hao. Multi-agent Genetic Algorithm Based Cloud Platform Anti-fake Data Injection Attack Method [J]. Computer and Modernization, 2024, 0(04): 21-26. |
[12] | YOU Jiajing1, 2, HE Yueshun1, HE Linlin1, ZHONG Hailong1, 2. Encryption Traffic Classification Method Based on AHP-CNN [J]. Computer and Modernization, 2024, 0(04): 83-87. |
[13] | ZHU Yong-shi, YANG Zi-yi, ZHAO Liang-ju, YAO Rui-chu. Volume-hiding Dynamic Encrypted Multi-maps [J]. Computer and Modernization, 0, (): 114-120. |
[14] | WANG Hong-jie, XU Sheng-chao, YANG Bo, MAO Ming-yang, JIANG Jin-ling. Automatic Arrangement Method of Cloud Network Security Service Chain Based on SRv6 Technology [J]. Computer and Modernization, 2024, 0(01): 1-5. |
[15] | HU Chong-jia, LIU Jin-zhou, FANG Li. Unsupervised Domain Adaptation for Outdoor Point Cloud Semantic Segmentation [J]. Computer and Modernization, 2024, 0(01): 74-79. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||