首页> 外文期刊>International Journal of Robust and Nonlinear Control >Secure estimation for cyber‐physical systems with adversarial attacks and unknown inputs: An LL 22 ‐gain method
【24h】

Secure estimation for cyber‐physical systems with adversarial attacks and unknown inputs: An LL 22 ‐gain method

机译:具有对抗性攻击和未知输入的网络物理系统的安全估计: l l

获取原文
获取原文并翻译 | 示例
           

摘要

Summary > This paper investigates the attack‐resilient state estimation problem for linear systems with adversarial attacks and unknown inputs, where the upper bound of the unknown inputs is unknown. It is assumed that the attacker has limited resources and can only manipulate a certain number of sensors. In most of the existing observer design approaches for the systems with unknown inputs even in the absence of attacks, the observer matching condition should be satisfied. To overcome this restriction, a novel switched observer is proposed, where the matched unknown inputs will be completely compensated by means of the outputs and the mismatched part will be suppressed in terms of <fi>L</fi> <sub>2</sub> ‐gain rejection property. Meanwhile, the observer can provide an attack‐resilient state estimation. Compared with the existing results, the proposed observer can guarantee that the resulting observer error system is stable with unknown input attenuation level γ that can be optimized. Finally, a simulation example of an unmanned ground vehicle is provided to show the effectiveness of the proposed approach. </abstract> </span> <span class="z_kbtn z_kbtnclass hoverxs" style="display: none;">展开▼</span> </div> <div class="translation abstracttxt"> <span class="zhankaihshouqi fivelineshidden" id="abstract"> <span>机译:</span><abstract xmlns =“http://www.wiley.com/namespaces/wiley”type =“main”xml:lang =“en”xml:id =“rnc4007-abs-0001”> <标题类型=“main” >摘要</ title> >本文调查了具有对冲攻击和未知输入的线性系统的攻击 - 弹性状态估计问题,其中未知输入的上限未知。假设攻击者资源有限,只能操纵一定数量的传感器。在大多数现有观察者设计方法中,即使在没有攻击的情况下,也是未知输入的方法,应满足观察者匹配条件。为了克服这种限制,提出了一种新的交换观察者,其中匹配的未知输入将通过输出完全补偿,并且在<fi> l </ fi> <sub> 2 </ ml中,错配部分将被抑制子> -gain拒绝财产。同时,观察者可以提供攻击弹性状态估计。与现有结果相比,所提出的观察者可以保证所产生的观察者误差系统具有可以优化的未知输入衰减电平γ稳定。最后,提供了一种无人地面车辆的模拟示例以显示所提出的方法的有效性。 </ p> </ abstract> </span> <span class="z_kbtn z_kbtnclass hoverxs" style="display: none;">展开▼</span> </div> </div> <div class="record"> <h2 class="all_title" id="enpatent33" >著录项</h2> <ul> <li> <span class="lefttit">来源</span> <div style="width: 86%;vertical-align: text-top;display: inline-block;"> <a href='/journal-foreign-21736/'>《International Journal of Robust and Nonlinear Control》</a> <b style="margin: 0 2px;">|</b><span>2018年第6期</span><b style="margin: 0 2px;">|</b><span>共13页</span> </div> </li> <li> <div class="author"> <span class="lefttit">作者</span> <p id="fAuthorthree" class="threelineshidden zhankaihshouqi"> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Xie Chun‐Hua&option=202" target="_blank" rel="nofollow">Xie Chun‐Hua;</a> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Yang Guang‐Hong&option=202" target="_blank" rel="nofollow">Yang Guang‐Hong;</a> </p> <span class="z_kbtnclass z_kbtnclassall hoverxs" id="zkzz" style="display: none;">展开▼</span> </div> </li> <li> <div style="display: flex;"> <span class="lefttit">作者单位</span> <div style="position: relative;margin-left: 3px;max-width: 639px;"> <div class="threelineshidden zhankaihshouqi" id="fOrgthree"> <p>College of Information Science and EngineeringNortheastern UniversityShenyang China;</p> <p>College of Information Science and EngineeringNortheastern UniversityShenyang China;</p> </div> <span class="z_kbtnclass z_kbtnclassall hoverxs" id="zhdw" style="display: none;">展开▼</span> </div> </div> </li> <li > <span class="lefttit">收录信息</span> <span style="width: 86%;vertical-align: text-top;display: inline-block;"></span> </li> <li> <span class="lefttit">原文格式</span> <span>PDF</span> </li> <li> <span class="lefttit">正文语种</span> <span>eng</span> </li> <li> <span class="lefttit">中图分类</span> <span><a href="https://www.zhangqiaokeyan.com/clc/7742.html" title="自动化系统">自动化系统;</a></span> </li> <li class="antistop"> <span class="lefttit">关键词</span> <p style="width: 86%;vertical-align: text-top;"> <a style="color: #3E7FEB;" href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=attack resilient&option=203" rel="nofollow">attack resilient;</a> <a style="color: #3E7FEB;" href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=estimation&option=203" rel="nofollow">estimation;</a> <a style="color: #3E7FEB;" href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=L 2 ‐gain rejection property&option=203" rel="nofollow">L 2 ‐gain rejection property;</a> <a style="color: #3E7FEB;" href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=robustness&option=203" rel="nofollow">robustness;</a> </p> <div class="translation"> 机译:攻击弹性;估计;L 2 -Gain拒绝财产;鲁棒性; </div> </li> </ul> </div> </div> <div class="literature cardcommon"> <div class="similarity "> <h3 class="all_title" id="enpatent66">相似文献</h3> <div class="similaritytab clearfix"> <ul> <li class="active" >外文文献</li> <li >专利</li> </ul> </div> <div class="similarity_details"> <ul > <li> <div> <b>1. </b><a class="enjiyixqcontent" href="/journal-foreign-detail/0704023067445.html">Secure estimation for cyber‐physical systems with adversarial attacks and unknown inputs: An <fi xmlns="http://www.wiley.com/namespaces/wiley">L</fi>L <sub xmlns="http://www.wiley.com/namespaces/wiley">2</sub>2 ‐gain method</a> <b>[J]</b> . <span> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Xie Chun‐Hua&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">Xie Chun‐Hua,</a> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Yang Guang‐Hong&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">Yang Guang‐Hong </a> <a href="/journal-foreign-21736/" target="_blank" rel="nofollow" class="tuijian_authcolor">International Journal of Robust and Nonlinear Control .</a> <span>2018</span><span>,第6期</span> </span> </div> <p class="zwjiyix translation" style="max-width: initial;height: auto;word-break: break-all;white-space: initial;text-overflow: initial;overflow: initial;"> <span>机译:具有对抗性攻击和未知输入的网络物理系统的安全估计:<fi xmlns =“http://www.wiley.com/namespaces/wiley”> l </ fi> l <sub xmlns =“http:// www.wiley.com/namespaces/wiley"22 pute pution.</span> </p> </li> <li> <div> <b>2. </b><a class="enjiyixqcontent" href="/journal-foreign-detail/0704023566543.html">A projection‐based algorithm for <fi xmlns="http://www.wiley.com/namespaces/wiley">?</fi>? <sub xmlns="http://www.wiley.com/namespaces/wiley">2</sub>2 ‐ <fi xmlns="http://www.wiley.com/namespaces/wiley">?</fi>? <sub xmlns="http://www.wiley.com/namespaces/wiley"> <fi>p</fi> </sub> <fi xmlns="http://www.wiley.com/namespaces/wiley">p</fi>p Tikhonov regularization</a> <b>[J]</b> . <span> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Borges Leonardo S.&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">Borges Leonardo S.,</a> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Bazán Fermín S.V.&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">Bazán Fermín S.V.,</a> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Bedin Luciano&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">Bedin Luciano </a> <a href="/journal-foreign-24473/" target="_blank" rel="nofollow" class="tuijian_authcolor">Mathematical Methods in the Applied Sciences .</a> <span>2018</span><span>,第15期</span> </span> </div> <p class="zwjiyix translation" style="max-width: initial;height: auto;word-break: break-all;white-space: initial;text-overflow: initial;overflow: initial;"> <span>机译:基于投影的<fi xmlns =“http://www.wiley.com/namespaces/wiley”>?</ fi>的投影算法? <sub xmlns =“http://www.wiley.com/namespaces/wiley”> 2 </ sub> 2 - <fi xmlns =“http://www.wiley.com/namespaces/wiley”>?</ fi>? <sub xmlns =“http://www.wiley.com/namespaces/wiley”> <fi> p </ fi> </ sub> <fi xmlns =“http://www.wiley.com/namespaces/wiley “> P </ FI> P TIKHONOV规则</span> </p> </li> <li> <div> <b>3. </b><a class="enjiyixqcontent" href="/journal-foreign-detail/0704023067572.html"><fi xmlns="http://www.wiley.com/namespaces/wiley">H</fi>H <sub xmlns="http://www.wiley.com/namespaces/wiley"> <fi> ∞ </fi> </sub> <fi xmlns="http://www.wiley.com/namespaces/wiley"> ∞ </fi> <b xmlns="http://www.wiley.com/namespaces/wiley">∞∞ ‐output regulation of linear heterogeneous multiagent systems over switching graphs</a> <b>[J]</b> . <span> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Adib Yaghmaie Farnaz&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">Adib Yaghmaie Farnaz,</a> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Hengster Movric Kristian&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">Hengster Movric Kristian,</a> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Lewis Frank L.&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">Lewis Frank L.,</a> <a href="/journal-foreign-21736/" target="_blank" rel="nofollow" class="tuijian_authcolor">International Journal of Robust and Nonlinear Control .</a> <span>2018</span><span>,第13期</span> </span> </div> <p class="zwjiyix translation" style="max-width: initial;height: auto;word-break: break-all;white-space: initial;text-overflow: initial;overflow: initial;"> <span>机译:<fi xmlns =“http://www.wiley.com/namespaces/wiley”> h </ fi> h <sub xmlns =“http://www.wiley.com/namespaces/wiley”> <fi> < b>∞</ b> </ fi> </ sub> <fi xmlns =“http://www.wiley.com/namespaces/wiley”> ∞</ b> </ fi> <b xmlns =“http://www.wiley.com/namespaces/wiley”>∞</ b>∞-output调节切换图中的线性异构多算法系统</span> </p> </li> <li> <div> <b>4. </b><a class="enjiyixqcontent" href="/academic-conference-foreign_meeting-207110_thesis/020514240163.html">Attack detection and secure estimation under false data injection attack in cyber-physical systems</a> <b>[C]</b> . <span> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Arpan Chattopadhyay&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">Arpan Chattopadhyay,</a> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Urbashi Mitra&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">Urbashi Mitra </a> <a href="/conference-foreign-207110/" target="_blank" rel="nofollow" class="tuijian_authcolor">Annual Conference on Information Sciences and Systems .</a> <span>2018</span> </span> </div> <p class="zwjiyix translation" style="max-width: initial;height: auto;word-break: break-all;white-space: initial;text-overflow: initial;overflow: initial;"> <span>机译:网络物理系统中错误数据注入攻击下的攻击检测和安全估计</span> </p> </li> <li> <div> <b>5. </b><a class="enjiyixqcontent" href="/academic-journal-foreign-pmc_detail_thesis/040001773414.html">Catalytic Asymmetric Synthesis 2nd Edition. By Iwao Ojima (Editor)Wiley-VCH: New York (http://www.wiley.com/). 2000. Pages: XIV 864 Pages Hardcover. Price: 169.- Euro / 330.54 DM / 294.- SFR. ISBN: 0-471-29805-0</a> <b>[O] </b> . <span> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor"> </a> <span>2001</span> </span> </div> <p class="zwjiyix translation" style="max-width: initial;height: auto;word-break: break-all;white-space: initial;text-overflow: initial;overflow: initial;"> <span>机译:催化不对称合成第二版。奥利马(Iwao Ojima)(编辑)Wiley-VCH:纽约(http://www.wiley.com/)。 2000。页数:XIV864页精装。价格:169.-欧元/330.54 DM / 294.- SFR。国际标准书号(ISBN):0-471-29805-0</span> </p> </li> <li> <div> <b>6. </b><a class="enjiyixqcontent" href="/open-access_resources_thesis/01000130110912.html">On stability, <mml:math altimg="si1.gif" display="inline" overflow="scroll" xmlns:xocs="http://www.elsevier.com/xml/xocs/dtd" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.elsevier.com/xml/ja/dtd" xmlns:ja="http://www.elsevier.com/xml/ja/dtd" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:tb="http://www.elsevier.com/xml/common/table/dtd" xmlns:sb="http://www.elsevier.com/xml/common/struct-bib/dtd" xmlns:ce="http://www.elsevier.com/xml/common/dtd" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:cals="http://www.elsevier.com/xml/common/cals/dtd"><mml:msub><mml:mrow><mml:mi>L</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math>-gain and <mml:math altimg="si2.gif" display="inline" overflow="scroll" xmlns:xocs="http://www.elsevier.com/xml/xocs/dtd" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.elsevier.com/xml/ja/dtd" xmlns:ja="http://www.elsevier.com/xml/ja/dtd" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:tb="http://www.elsevier.com/xml/common/table/dtd" xmlns:sb="http://www.elsevier.com/xml/common/struct-bib/dtd" xmlns:ce="http://www.elsevier.com/xml/common/dtd" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:cals="http://www.elsevier.com/xml/common/cals/dtd"><mml:msub><mml:mrow><mml:mi>H</mml:mi></mml:mrow><mml:mrow><mml:mi>∞</mml:mi></mml:mrow></mml:msub></mml:math> control for switched systems</a> <b>[O] </b> . <span> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Jun Zhao&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">Jun Zhao,</a> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=David J. Hill&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">David J. Hill </a> <span>2008</span> </span> </div> <p class="zwjiyix translation" style="max-width: initial;height: auto;word-break: break-all;white-space: initial;text-overflow: initial;overflow: initial;"> <span>机译:在稳定性上,<MML:MATH ALTIMG =“SI1.GIF”显示=“内联”overflow =“滚动”XMLNS:XOCS =“http://www.elsevier.com/xml/xocs/dtd”xmlns:xs =“ http://www.w3.org/2001/xmlschema“xmlns:xsi =”http://www.w3.org/2001/xmlschema-instance“xmlns =”http://www.elsevier.com/xml/ JA / DTD“XMLNS:JA =”http://www.elsevier.com/xml/ja/dtd“xmlns:mml =”http://www.w3.org/1998/math/mathml“xmlns:tb = “http://www.elsevier.com/xml/common/table/dtd”xmlns:sb =“http://www.elsevier.com/xml/common/struct-bib/dtd”xmlns:ce =“http ://www.elsevier.com/xml/common/dtd“xmlns:xlink =”http://www.w3.org/1999/xlink“xmlns:cals =”http://www.elsevier.com/xml / Common / Cals / DTD“> <MML:MSUB> <MML:MROW> <MML:MI> L </ MML:MI> </ MML:MROW> <MML:MROW> <MML:MN> 2 </ MML :Mn> </ mml:mrow> </ mml:msub> </ mml:math> -gain和<mml:math altimg =“si2.gif”display =“inline”overflow =“scroll”xmlns:xocs =“ http://www.elsevier.com/xml/xocs/dtd“xmlns:xs =”http://www.w3.org/2001/xmlschema“xmlns:xsi =”http://www.w3.org/ 2001 / XMLSchema-instance“XMLNS =”http://www.elsevier.com/xml/ja/dtd“ XMLNS:JA =“http://www.elsevier.com/xml/ja/dtd”xmlns:mml =“http://www.w3.org/1998/math/mathml”xmlns:tb =“http:/ / www.elsevier.com/xml/common/table/dtd“xmlns:sb =”http://www.elsevier.com/xml/common/struct-bib/dtd“xmlns:ce =”http:// www .elsevier.com / xml / common / dtd“xmlns:xlink =”http://www.w3.org/1999/xlink“xmlns:cals =”http://www.elsevier.com/xml/common/cals / dtd“> <mml:msub> <mml:mrow> <mml:mi> h </ mml:mi> </ mml:mrow> <mml:mrow> <mml:mi>∞</ mml:mi> < / MML:MROW> </ MML:MSUB> </ MML:MATH>用于交换系统的控制</span> </p> </li> </ul> <ul style="display: none;"> <li> <div> <b>1. </b><a class="enjiyixqcontent" href="/patent-detail/06130430441865.html">Method and system for processing HTTP requests creating a new map for an entire namespace that is associated with the request and that maps the name extension to the further content type within namespace</a> <b>[P]</b> . <span> 外国专利: <!-- 美国专利: --> US7457805B2 </span> <span> . 2008-11-25</span> </div> <p class="zwjiyix translation" style="max-width: initial;height: auto;word-break: break-all;white-space: initial;text-overflow: initial;overflow: initial;"> <span>机译:用于处理HTTP请求的方法和系统,用于为与该请求相关联的整个名称空间创建新映射,并将名称扩展名映射到名称空间内的其他内容类型 </span> </p> </li> </ul> </div> </div> </div> <div class="theme cardcommon" style="overflow: auto;display:none"> <h3 class="all_title" id="enpatent55">相关主题</h3> <ul id="subject"> </ul> </div> </div> </div> </div> <div class="right rightcon"> <div class="details_img cardcommon clearfix" style="margin-bottom: 10px;display:none;" > </div> </div> </div> <div id="thesis_get_original1" class="downloadBth" style="bottom: 19px;z-index: 999;" onclick="ywcd('0704023067445','4',7,2,1,'',this,24)" class="delivery" prompt="010401" title="通过人工服务将文献原文发送至邮箱" >获取原文</div> <div class="journalsub-pop-up" style="display: none"> <div class="journal-sub"> <h2>期刊订阅</h2> <img src="https://cdn.zhangqiaokeyan.com/img/loginclose.png" alt="" onclick="$('.journalsub-pop-up').hide()"> <p class="pardon">抱歉,该期刊暂不可订阅,敬请期待!</p> <p class="current">目前支持订阅全部北京大学中文核心(2020)期刊目录。</p> <div style="display: flex;margin-top: 69px;justify-content: space-between;"> <div class="no-sub" onclick="$('.journalsub-pop-up').hide()">暂不订阅</div> <div class="other-sub" onclick="continueSub('from=pc-detail')">继续订阅其他期刊</div> </div> </div> </div> <div class="right_btn"> <ul> <li class="gouwuche"> <!-- <a href="javascript:void(0);" onclick="link_analysis('/shoppingcart/auth/list.html',this)">购物车</a>--> </li> <li class="yijian"> <a href="javascript:void(0);" onclick="link_analysis('/mycenter/auth/complaint.html',this)">意见反馈</a> </li> <li class="top"> <a href="javascript:scrollTo(0,0);">回到顶部</a> </li> <li class="shouye"> <a href="/">回到首页</a> </li> </ul> </div> <div class="xllindexfooter"> <div class="xllindexfootercenter"> <div class="xllindexfooterleft left" > <div class="xllindexfooterleftli"> <ul> <li><a href="/about.html">关于掌桥</a></li> <li><a href="/help/helpmap.html">资源导航</a></li> <li><a href="/help/helpguide.html">新手指南</a></li> <li><a href="/help/helpcenter.html">常见问题</a></li> <li><a href="/sitemap.html">网站地图</a></li> <li><a href="/help/helpcenter.html?type=9">版权声明</a></li> </ul> </div> <div class="xllindexfooterleft"> <p class="xllindexfooterlefteamil">客服邮箱:kefu@zhangqiaokeyan.com</p> <div class="xllindexfooterlefttcp"> <div class="xllindexfooterpoliceiimg"></div> <div class="xllindexfooterpoliceispan"> <span>京公网安备:11010802029741号 </span> <span>ICP备案号:<a href="https://beian.miit.gov.cn" rel="nofollow" target="_blank">京ICP备15016152号-6</a></span> <span>六维联合信息科技 (北京) 有限公司©版权所有</span> </div> </div> </div> </div> <div class="xllindexfooterright left"> <ul> <li> <p style="font-weight: bold;">客服微信</p> <div></div> </li> <li> <p style="font-weight: bold;">服务号</p> <div></div> </li> </ul> </div> </div> </div> <span id="0704023067445down" data-source="7," data-out-id="ZY0cmZh/NzaMK7WDuE2Kjw==," data-f-source-id="7" data-title="Secure estimation for cyber‐physical systems with adversarial attacks and unknown inputs: An <fi xmlns='http://www.wiley.com/namespaces/wiley'>L</fi>L <sub xmlns='http://www.wiley.com/namespaces/wiley'>2</sub>2 ‐gain method" data-price="20" data-site-name="" data-transnum="24" style="display:none;"></span> <input type="hidden" value="4" id="sourcetype"> <input type="hidden" value="21736" id="journalid"> <input type="hidden" value="1" id="inyn_provide_service_level"> <input type="hidden" value="https://cdn.zhangqiaokeyan.com" id="imgcdn"> <input type="hidden" value="1" id="isdeatail"> <input type="hidden" value="" id="syyn_indexed_database"> <input type="hidden" value="" id="servicetype"> <input type="hidden" id="pagename" value="Secure estimation for cyber‐physical systems with adversarial attacks and unknown inputs: An <fi xmlns='http://www.wiley.com/namespaces/wiley'>L</fi>L <sub xmlns='http://www.wiley.com/namespaces/wiley'>2</sub>2 ‐gain method"/> <input type="hidden" value="thesis_get_original" id="pageIdentification"> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/jquery-1.12.4.js"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/common/lwlh_ajax.js"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/zq.js?v=5.7.7"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/common/common.js?v=5.7.7"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/jquery.cookie.js"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/top.js?v=5.7.7"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/common/tip.js?v=5.7.7"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/common/login.js?v=5.7.7"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/common/down.js?v=5.7.7"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/common/search.js?v=5.7.7"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/searchtype.js?v=5.7.7"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/user/regist.js?v=5.7.7"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/zxs_solor/detail.js?v=5.7.7"></script> <script type="text/javascript" src="https://www.zhangqiaokeyan.com/statistics/static/pagecollection.js"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/tj.js"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/pushbaidu.js"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/common/history.js"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/util/cookie.js?v=5.7.7"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/weipu/weipu.js?v=5.7.7"></script> </body> <script> $(function(){ var weiPuStatus = getCookie('WeiPuStatus'); if(weiPuStatus){ tipWeiPuStatus(weiPuStatus); delCookie('WeiPuStatus'); } getFacetKeywordVoInId(); var sourcetype = $("#sourcetype").val(); var inyn_provide_service_level = $("#inyn_provide_service_level").val(); if((sourcetype ==1||sourcetype==4)&&inyn_provide_service_level!=4){ getJournal(); } }) </script> </html>