期刊文献+
共找到44篇文章
< 1 2 3 >
每页显示 20 50 100
Distributed Fault Estimation for Nonlinear Systems With Sensor Saturation and Deception Attacks Using Stochastic Communication Protocols
1
作者 Weiwei Sun Xinci Gao +1 位作者 Lusong Ding Xiangyu Chen 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第8期1865-1876,共12页
This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimati... This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimation structure under consideration,an estimation center is not necessary,and the estimator derives its information from itself and neighboring nodes,which fuses the state vector and the measurement vector.In an effort to cut down data conflicts in communication networks,the stochastic communication protocol(SCP)is employed so that the output signals from sensors can be selected.Additionally,a recursive security estimator scheme is created since attackers randomly inject malicious signals into the selected data.On this basis,sufficient conditions for a fault estimator with less conservatism are presented which ensure an upper bound of the estimation error covariance and the mean-square exponential boundedness of the estimating error.Finally,a numerical example is used to show the reliability and effectiveness of the considered distributed estimation algorithm. 展开更多
关键词 Actuator fault deception attacks distributed estimation sensor saturation stochastic communication protocol(SCP).
在线阅读 下载PDF
Event-Based Anomaly Detection for Non-Public Industrial Communication Protocols in SDN-Based Control Systems 被引量:4
2
作者 Ming Wan Jiangyuan Yao +1 位作者 Yuan Jing Xi Jin 《Computers, Materials & Continua》 SCIE EI 2018年第6期447-463,共17页
As the main communication mediums in industrial control networks,industrial communication protocols are always vulnerable to extreme exploitations,and it is very difficult to take protective measures due to their seri... As the main communication mediums in industrial control networks,industrial communication protocols are always vulnerable to extreme exploitations,and it is very difficult to take protective measures due to their serious privacy.Based on the SDN(Software Defined Network)technology,this paper proposes a novel event-based anomaly detection approach to identify misbehaviors using non-public industrial communication protocols,and this approach can be installed in SDN switches as a security software appliance in SDN-based control systems.Furthermore,aiming at the unknown protocol specification and message format,this approach first restructures the industrial communication sessions and merges the payloads from industrial communication packets.After that,the feature selection and event sequence extraction can be carried out by using the N-gram model and K-means algorithm.Based on the obtained event sequences,this approach finally trains an event-based HMM(Hidden Markov Model)to identify aberrant industrial communication behaviors.Experimental results clearly show that the proposed approach has obvious advantages of classification accuracy and detection efficiency. 展开更多
关键词 Event sequence anomaly detection non-public industrial communication protocols SDN
在线阅读 下载PDF
A Recovery Algorithm for Self-Stabilizing Communication Protocols 被引量:1
3
作者 Li Layuan & Li Chunlin (Department of Computer Science & Technology, Wuhan nansportation University, 430063, P. R. China) 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2000年第1期38-46,共9页
This paper presents a recovery algorithm for self-stabilizing communication protocols. It first describes some concepts and a formal description method for the algorithm. Then it proposes the algorithm procedures, pro... This paper presents a recovery algorithm for self-stabilizing communication protocols. It first describes some concepts and a formal description method for the algorithm. Then it proposes the algorithm procedures, proves its correctness and analyses its complexity. Finally, it also verifies the availability and efficiency of the algorithm by illustrating an example protocol with multi-processes. 展开更多
关键词 Computer networks communication protocols Recovery algorithm SELF-STABILIZATION Multimedia communication networks.
在线阅读 下载PDF
The Algorithms for Achieving Global States and Self-Stabilization for Communication Protocols
4
作者 Li Layuan & Li Chunlin(Department of Computer Science & Engineering. Wuhan Transportation University,430063,P . R. China) 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1999年第4期34-41,共8页
This paper discusses the algorithms for achieving global states and self-stabilizationfor communication protocols. It first describes a primary algorithm including its suitability forachieving global states and limita... This paper discusses the algorithms for achieving global states and self-stabilizationfor communication protocols. It first describes a primary algorithm including its suitability forachieving global states and limitation of self-stabilization for communication protocols, and thenpresents an improved algorithm that can be suitable to achieve global states and can be also usedto self-stabilizing communication protocols. Filially, it gives the proof of correctness and analysis ofcomplexity of the improved algorithm, and verifies its availability and efficiency by illustrating anexample protocol. 展开更多
关键词 communication protocols Algorithm for achieving global states Self-stabilization Computer networks Multimedia communication networks.
在线阅读 下载PDF
Falcon Optimization Algorithm-Based Energy Efficient Communication Protocol for Cluster-Based Vehicular Networks 被引量:1
5
作者 Youseef Alotaibi B.Rajasekar +1 位作者 R.Jayalakshmi Surendran Rajendran 《Computers, Materials & Continua》 SCIE EI 2024年第3期4243-4262,共20页
Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effect... Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effective driving experience by presenting time-sensitive and location-aware data.The communication occurs directly between V2V and Base Station(BS)units such as the Road Side Unit(RSU),named as a Vehicle to Infrastructure(V2I).However,the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with time.Therefore,the scheme of an effectual routing protocol for reliable and stable communications is significant.Current research demonstrates that clustering is an intelligent method for effectual routing in a mobile environment.Therefore,this article presents a Falcon Optimization Algorithm-based Energy Efficient Communication Protocol for Cluster-based Routing(FOA-EECPCR)technique in VANETS.The FOA-EECPCR technique intends to group the vehicles and determine the shortest route in the VANET.To accomplish this,the FOA-EECPCR technique initially clusters the vehicles using FOA with fitness functions comprising energy,distance,and trust level.For the routing process,the Sparrow Search Algorithm(SSA)is derived with a fitness function that encompasses two variables,namely,energy and distance.A series of experiments have been conducted to exhibit the enhanced performance of the FOA-EECPCR method.The experimental outcomes demonstrate the enhanced performance of the FOA-EECPCR approach over other current methods. 展开更多
关键词 Vehicular networks communication protocol CLUSTERING falcon optimization algorithm ROUTING
在线阅读 下载PDF
Studies on Algorithms for Self-StabilizingCommunication Protocols
6
作者 LI Layuan LI Chunlin 《Journal of Computer Science & Technology》 SCIE EI CSCD 1999年第6期606-613,共8页
in this paper the algorithms for self-stabilizing communication protocols are studied.First some concepts and a formal method for describing theproposed algorithms are described,then an improved algorithm for achievin... in this paper the algorithms for self-stabilizing communication protocols are studied.First some concepts and a formal method for describing theproposed algorithms are described,then an improved algorithm for achieving globalstates is presented.The study shows that the improved algorithm can be appliedto obtain the global states in the case of a loss of cooperation of the different processes in the protocol,which can be used as a recovery point that will be used bythe following recovery procedure.Thus,the improved algorithm can be used toself-stabilize a communication protocol.Meanwhile,a recovery algorithm for selfstabilizing communication protocols is presented.After a failure is detected,allProcesses can eventually know the error.The recovery algorithm uses the contextualinformation exchanged during the progress of the protocol and recorded on the stablememory.The proof of correctness and analysis of complexity for these algorithmshave been made.The availability and efficiency of the algorithms have been verifiedby illustrating the example protocols.Finally,some conclusions and remarks aregiven. 展开更多
关键词 communication protocol SELF-STABILIZATION global state recoveryalgorithm multimedia communication
原文传递
Research on Interoperability of IoT Devices and Analysis of Standardization Progress
7
作者 Yinghao Tang 《机械工程与设计(中英文版)》 2025年第1期1-6,共6页
The rapid advancement of the Internet of Things(IoT)has led to the proliferation of connected devices across various domains,including smart cities,industrial automation,and healthcare.However,interoperability challen... The rapid advancement of the Internet of Things(IoT)has led to the proliferation of connected devices across various domains,including smart cities,industrial automation,and healthcare.However,interoperability challenges arising from heterogeneous communication protocols,diverse data formats,and fragmented standardization efforts hinder the seamless integration of IoT systems.This paper explores the current state of IoT interoperability,analyzing key challenges,existing standardization initiatives,and emerging technological solutions.We examine the role of middleware,gateway solutions,artificial intelligence(AI),blockchain,and edge computing in facilitating interoperability.Furthermore,we provide a comparative analysis of major IoT standards and discuss the potential for greater convergence among standardization efforts.The findings highlight that while significant progress has been made,a unified and widely accepted interoperability framework remains elusive.Addressing these challenges requires collaborative efforts among industry stakeholders,researchers,and policymakers to establish robust and scalable interoperability solutions,ensuring the continued growth and efficiency of IoT ecosystems. 展开更多
关键词 IoT Interoperability communication protocols Standardization Initiatives Middleware Solutions Edge Computing Blockchain IoT Integration
在线阅读 下载PDF
Deep Auto-Encoder Based Intelligent and Secure Time Synchronization Protocol(iSTSP)for Security-Critical Time-Sensitive WSNs
8
作者 Ramadan Abdul-Rashid Mohd Amiruddin Abd Rahman Abdulaziz Yagoub Barnawi 《Computer Modeling in Engineering & Sciences》 2025年第9期3213-3250,共38页
Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade... Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols. 展开更多
关键词 Time-sensitive wireless sensor networks(TS-WSNs) secure time synchronization protocol trust-based authentication autoencoder model deep learning malicious node detection Internet of Things energyefficient communication protocols
在线阅读 下载PDF
Neural-Network-Based Control for Discrete-Time Nonlinear Systems with Input Saturation Under Stochastic Communication Protocol 被引量:10
9
作者 Xueli Wang Derui Ding +1 位作者 Hongli Dong Xian-Ming Zhang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第4期766-778,共13页
In this paper,an adaptive dynamic programming(ADP)strategy is investigated for discrete-time nonlinear systems with unknown nonlinear dynamics subject to input saturation.To save the communication resources between th... In this paper,an adaptive dynamic programming(ADP)strategy is investigated for discrete-time nonlinear systems with unknown nonlinear dynamics subject to input saturation.To save the communication resources between the controller and the actuators,stochastic communication protocols(SCPs)are adopted to schedule the control signal,and therefore the closed-loop system is essentially a protocol-induced switching system.A neural network(NN)-based identifier with a robust term is exploited for approximating the unknown nonlinear system,and a set of switch-based updating rules with an additional tunable parameter of NN weights are developed with the help of the gradient descent.By virtue of a novel Lyapunov function,a sufficient condition is proposed to achieve the stability of both system identification errors and the update dynamics of NN weights.Then,a value iterative ADP algorithm in an offline way is proposed to solve the optimal control of protocol-induced switching systems with saturation constraints,and the convergence is profoundly discussed in light of mathematical induction.Furthermore,an actor-critic NN scheme is developed to approximate the control law and the proposed performance index function in the framework of ADP,and the stability of the closed-loop system is analyzed in view of the Lyapunov theory.Finally,the numerical simulation results are presented to demonstrate the effectiveness of the proposed control scheme. 展开更多
关键词 Adaptive dynamic programming(ADP) constrained inputs neural network(NN) stochastic communication protocols(SCPs) suboptimal control
在线阅读 下载PDF
桥接未来--LCCF库函数的应用
10
作者 吴剑铭 张志强 《橡塑技术与装备》 CAS 2025年第1期59-65,共7页
本文探讨了Siemens的LCCF库函数在工业自动化项目中的应用,LCCF库提供了一种软件层面的解决方案,通过库函数替代传统硬件协议网关,实现不同通信协议间的数据交换。介绍了Siemens库函数的分类与功能,阐述了LCCF库的主要组件及其在协议转... 本文探讨了Siemens的LCCF库函数在工业自动化项目中的应用,LCCF库提供了一种软件层面的解决方案,通过库函数替代传统硬件协议网关,实现不同通信协议间的数据交换。介绍了Siemens库函数的分类与功能,阐述了LCCF库的主要组件及其在协议转换中的优势,包括简化配置流程、增强系统兼容性、降低技术门槛等。通过具体的应用实例,展示了LCCF库在SIMATIC控制器与Rockwell及Mitsubishi控制器之间通信的实现方法。此外,文章还对LCom与LCCF两个Siemens通信库进行了比较分析,指出了它们的共同点与不同点。 展开更多
关键词 LCCF 协议网关 数据交换CIP(Common Industrial Protocol) MELSEC communication Protocol(MC协议)
在线阅读 下载PDF
System Performance of Wireless Sensor Network Using LoRa–Zigbee Hybrid Communication 被引量:5
11
作者 Van-Truong Truong Anand Nayyar Showkat Ahmad Lone 《Computers, Materials & Continua》 SCIE EI 2021年第8期1615-1635,共21页
Wireless sensor network(WSN)is considered as the fastest growing technology pattern in recent years because of its applicability in varied domains.Many sensor nodes with different sensing functionalities are deployed ... Wireless sensor network(WSN)is considered as the fastest growing technology pattern in recent years because of its applicability in varied domains.Many sensor nodes with different sensing functionalities are deployed in the monitoring area to collect suitable data and transmit it to the gateway.Ensuring communications in heterogeneous WSNs,is a critical issue that needs to be studied.In this research paper,we study the system performance of a heterogeneous WSN using LoRa–Zigbee hybrid communication.Specifically,two Zigbee sensor clusters and two LoRa sensor clusters are used and combined with two Zigbee-to-LoRa converters to communicate in a network managed by a LoRa gateway.The overall system integrates many different sensors in terms of types,communication protocols,and accuracy,which can be used in many applications in realistic environments such as on land,under water,or in the air.In addition to this,a synchronous management software on ThingSpeak Web server and Blynk app is designed.In the proposed system,the token ring protocol in Zigbee network and polling mechanism in LoRa network is used.The system can operate with a packet loss rate of less than 0.5%when the communication range of the Zigbee network is 630 m,and the communication range of the LoRa network is 3.7 km.On the basis of the digital results collected on the management software,this study proves tremendous improvements in the system performance. 展开更多
关键词 Wireless sensor network ZIGBEE LoRa communication protocol CONVERTER packet loss
在线阅读 下载PDF
Variance-Constrained Filtering Fusion for Nonlinear Cyber-Physical Systems With the Denial-of-Service Attacks and Stochastic Communication Protocol 被引量:4
12
作者 Hang Geng Zidong Wang +2 位作者 Yun Chen Xiaojian Yi Yuhua Cheng 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第6期978-989,共12页
In this paper,a new filtering fusion problem is studied for nonlinear cyber-physical systems under errorvariance constraints and denial-of-service attacks.To prevent data collision and reduce communication cost,the st... In this paper,a new filtering fusion problem is studied for nonlinear cyber-physical systems under errorvariance constraints and denial-of-service attacks.To prevent data collision and reduce communication cost,the stochastic communication protocol is adopted in the sensor-to-filter channels to regulate the transmission order of sensors.Each sensor is allowed to enter the network according to the transmission priority decided by a set of independent and identicallydistributed random variables.From the defenders’view,the occurrence of the denial-of-service attack is governed by the randomly Bernoulli-distributed sequence.At the local filtering stage,a set of variance-constrained local filters are designed where the upper bounds(on the filtering error covariances)are first acquired and later minimized by appropriately designing filter parameters.At the fusion stage,all local estimates and error covariances are combined to develop a variance-constrained fusion estimator under the federated fusion rule.Furthermore,the performance of the fusion estimator is examined by studying the boundedness of the fused error covariance.A simulation example is finally presented to demonstrate the effectiveness of the proposed fusion estimator. 展开更多
关键词 Cyber-physical system(CPS) denial-of-service attack stochastic communication protocol(SCP) variance-constrained filtering fusion
在线阅读 下载PDF
A Computing Resource Adjustment Mechanism for Communication Protocol Processing in Centralized Radio Access Networks 被引量:3
13
作者 Guowei Zhai Lin Tian +2 位作者 Yiqing Zhou Qian Sun Jinglin Shi 《China Communications》 SCIE CSCD 2016年第12期79-89,共11页
The centralized radio access cellular network infrastructure based on centralized Super Base Station(CSBS) is a promising solution to reduce the high construction cost and energy consumption of conventional cellular n... The centralized radio access cellular network infrastructure based on centralized Super Base Station(CSBS) is a promising solution to reduce the high construction cost and energy consumption of conventional cellular networks. With CSBS, the computing resource for communication protocol processing could be managed flexibly according the protocol load to improve the resource efficiency. Since the protocol load changes frequently and may exceed the capacity of processors, load balancing is needed. However, existing load balancing mechanisms used in data centers cannot satisfy the real-time requirement of the communication protocol processing. Therefore, a new computing resource adjustment scheme is proposed for communication protocol processing in the CSBS architecture. First of all, the main principles of protocol processing resource adjustment is concluded, followed by the analysis on the processing resource outage probability that the computing resource becomes inadequate for protocol processing as load changes. Following the adjustment principles, the proposed scheme is designed to reduce the processing resource outage probability based onthe optimized connected graph which is constructed by the approximate Kruskal algorithm. Simulation re-sults show that compared with the conventional load balancing mechanisms, the proposed scheme can reduce the occurrence number of inadequate processing resource and the additional resource consumption of adjustment greatly. 展开更多
关键词 computing resource adjustment communication protocol processing cloud RAN super BS processing resource outage probability optimized connected graph
在线阅读 下载PDF
The Security Analysis of Two-Step Quantum Direct Communication Protocol in Collective-Rotation Noise Channel 被引量:2
14
作者 李剑 孙风琪 +3 位作者 潘泽世 聂金瑞 陈彦桦 袁开国 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第8期1-5,共5页
To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, a... To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, an excellent model of noise analysis is proposed. In the security analysis, the method of the entropy theory is introduced, and is compared with QDCP, an error rate point Qo(M : (Q0, 1.0)) is given. In different noise levels, if Eve wants to obtain the same amount of information, the error rate Q is distinguishable. The larger the noise level ~ is, the larger the error rate Q is. When the noise level ~ is lower than 11%, the high error rate is 0.153 without eavesdropping. Lastly, the security of the proposed protocol is discussed. It turns out that the quantum channel will be safe when Q 〈 0.153. Similarly, if error rate Q〉 0.153 = Q0, eavesdropping information I 〉 1, which means that there exist eavesdroppers in the quantum channel, and the quantum channel will not be safe anymore. 展开更多
关键词 The Security Analysis of Two-Step Quantum Direct communication Protocol in Collective-Rotation Noise Channel EPR
原文传递
Exploration of IoT Nodes Communication Using LoRaWAN in Forest Environment 被引量:1
15
作者 Anshul Sharma Divneet Singh Kapoor +3 位作者 Anand Nayyar Basit Qureshi Kiran Jot Singh Khushal Thakur 《Computers, Materials & Continua》 SCIE EI 2022年第6期6239-6256,共18页
The simultaneous advances in the Internet of Things(IoT),Artificial intelligence(AI)and Robotics is going to revolutionize our world in the near future.In recent years,LoRa(Long Range)wireless powered by LoRaWAN(LoRa ... The simultaneous advances in the Internet of Things(IoT),Artificial intelligence(AI)and Robotics is going to revolutionize our world in the near future.In recent years,LoRa(Long Range)wireless powered by LoRaWAN(LoRa Wide Area Network)protocol has attracted the attention of researchers for numerous applications in the IoT domain.LoRa is a low power,unlicensed Industrial,Scientific,and Medical(ISM)bandequipped wireless technology that utilizes a wide area network protocol,i.e.,LoRaWAN,to incorporate itself into the network infrastructure.In this paper,we have evaluated the LoRaWAN communication protocol for the implementation of the IoT(Internet of Things)nodes’communication in a forest scenario.The outdoor performance of LoRa wireless in LoRaWAN,i.e.,the physical layer,has been evaluated in the forest area of Kashirampur Uttarakhand,India.Hence,the present paper aims towards analyzing the performance level of the LoRaWAN technology by observing the changes in Signal to Noise Ratio(SNR),Packet Reception Ratio(PRR)and Received Signal Strength Indicator(RSSI),with respect to the distance between IoT nodes.The article focuses on estimating network lifetime for a specific set of LoRa configuration parameters,hardware selection and power constraints.From the experimental results,it has been observed that transmissions can propagate to a distance of 300 m in the forest environment,while consuming approx.63%less energy for spreading factor 7 at 2 dBm,without incurring significant packet loss with PRR greater than 80%. 展开更多
关键词 LoRa LoRaWAN IOT communication protocol wireless sensor networks packet reception ratio
在线阅读 下载PDF
Research on a Secure Communication Protocol Based on National Secret SM2 Algorithm 被引量:1
16
作者 Youhai Shao Yong Wang +1 位作者 Yun Yang Xiang Wang 《Journal of Computer and Communications》 2022年第1期42-56,共15页
Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic s... Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic sensitive information data field, there are threats such as preset backdoors and security vulnerabilities. In response to the above problems, the article introduces a secure communication protocol based on the optimized Secret SM2 algorithm, which uses socket programming to achieve two-way encrypted communication between clients and services, and is able to complete the security protection of data encryption transmission, authentication, data tampering, etc., and proves through experiments that the security protocol is more secure than traditional methods, can effectively identify each other, carry out stable and controllable data encryption transmission, and has good applicability. 展开更多
关键词 Secret Algorithm SM2 communication Protocol Hybrid Encryption Security Protection
在线阅读 下载PDF
Manufacturing Communication: DCOM-MMS-based Approach for Flexible Manufacturing System
17
作者 周炳海 余传猛 曹永上 《Journal of Donghua University(English Edition)》 EI CAS 2005年第4期36-40,共5页
A design approach of manufacturing communication is presented for flexible manufacturing system in this paper. The primary objective aims at making the flexible manufacturing control system provided with interoperabil... A design approach of manufacturing communication is presented for flexible manufacturing system in this paper. The primary objective aims at making the flexible manufacturing control system provided with interoperability and reconfigurability. Based on describing manufacturing message specification (MMS) and distributed component object model (DCOM), a client/server manufacturing communication model is built with MMS standard and DCOM middleware, and the communication interfaces between MMS client and MMS server are designed with Microsoft interface definition language (MIDL) and abstract syntax notation one (ASN.1) of MMS services. As a result, DCOM and MMS integration leads to such client/ server communication capabilities independent of different operating systems and manufacturing devices in flexible manufacturing automation environment. Finally, to verify the new design approach, a prototype system of robot control system has been implemented in MS 2000 Server/Professional Operating System and VC++ 6.0 Developer Environments. 展开更多
关键词 Flexible manufacturing system manufacturing message specification distributed object communication protocol control system.
在线阅读 下载PDF
A Hybrid Formal Description Method Based on FSM,CSP and ADT for Communication Protocol
18
作者 Li Layman(Wuhan Transportation Universityl 430063, P. R. China) 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1998年第3期29-38,共10页
Since communication protocol deals with complex issues related to distribution such as communication, concurrency and synchronization, their development needs to be traced by using sophisticated formal description met... Since communication protocol deals with complex issues related to distribution such as communication, concurrency and synchronization, their development needs to be traced by using sophisticated formal description methods. This paper presents a new hybrid formal method for communication protocol specification. In this method, finite state machine (FSM), communication sequential process (CSP) and abstract data type (ADT) are mixed and the best features of these approaches are offered. In this paper, the main formal description techniques (FDT) for protocol engineering are brieny introduced and a hybrid formal description method based on the FSM, CSP and ADT for communication protocol is described. Finally, this paper presents the formal specification of an example protocol for LAN by using the proposed hybrid formal method. The results of studies show that the hybrid formal description method for communication protocol is an available and effective approach. 展开更多
关键词 communication protocol Formal description techniques Protocol engineering Hybrid formal method
在线阅读 下载PDF
Study of Communication Protocol and Link Establishing Mode of Mine Managing Mobile Communication System of Minute Areas
19
作者 杨维 孙继平 苏又平 《International Journal of Mining Science and Technology》 2000年第2期79-82,共4页
This paper studies the communication protocol and link establishing mode of the mine managing mobile communication system consisted of minute areas. The communication protocol suitable for the system is proposed and d... This paper studies the communication protocol and link establishing mode of the mine managing mobile communication system consisted of minute areas. The communication protocol suitable for the system is proposed and designed. 展开更多
关键词 MINE mobile communication communication protocol LAYER LINK
在线阅读 下载PDF
Toward edge-computing-enabled collision-free scheduling management for autonomous vehicles at unsignalized intersections
20
作者 Ziyi Lu Tianxiong Wu +4 位作者 Jinshan Su Yunting Xu Bo Qian Tianqi Zhang Haibo Zhou 《Digital Communications and Networks》 CSCD 2024年第6期1600-1610,共11页
With the support of Vehicle-to-Everything(V2X)technology and computing power networks,the existing intersection traffic order is expected to benefit from efficiency improvements and energy savings by new schemes such ... With the support of Vehicle-to-Everything(V2X)technology and computing power networks,the existing intersection traffic order is expected to benefit from efficiency improvements and energy savings by new schemes such as de-signalization.How to effectively manage autonomous vehicles for traffic control with high throughput at unsignalized intersections while ensuring safety has been a research hotspot.This paper proposes a collision-free autonomous vehicle scheduling framework based on edge-cloud computing power networks for unsignalized intersections where the lanes entering the intersections are undirectional,and designs an efficient communication system and protocol.First,by analyzing the collision point occupation time,this paper formulates an absolute value programming problem.Second,this problem is solved with low complexity by the Edge Intelligence Optimal Entry Time(EI-OET)algorithm based on edge-cloud computing power support.Then,the communication system and protocol are designed for the proposed scheduling scheme to realize efficient and low-latency vehicular communications.Finally,simulation experiments compare the proposed scheduling framework with directional and traditional traffic light scheduling mechanisms,and the experimental results demonstrate its high efficiency,low latency,and low complexity. 展开更多
关键词 Unsignalized intersection Automatic vehicle scheduling Edge computing communication protocol Computing power network
在线阅读 下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部