期刊文献+
共找到583篇文章
< 1 2 30 >
每页显示 20 50 100
Deep Auto-Encoder Based Intelligent and Secure Time Synchronization Protocol(iSTSP)for Security-Critical Time-Sensitive WSNs
1
作者 Ramadan Abdul-Rashid Mohd Amiruddin Abd Rahman Abdulaziz Yagoub Barnawi 《Computer Modeling in Engineering & Sciences》 2025年第9期3213-3250,共38页
Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade... Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols. 展开更多
关键词 time-sensitive wireless sensor networks(TS-WSNs) secure time synchronization protocol trust-based authentication autoencoder model deep learning malicious node detection Internet of Things energyefficient communication protocols
在线阅读 下载PDF
Contention-Based Beaconless Real-Time Routing Protocol for Wireless Sensor Networks
2
作者 Chao Huang Guoli Wang 《Wireless Sensor Network》 2010年第7期528-537,共10页
This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at ... This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at each hop through integrating the contention and neighbor table mechanisms. More precisely, CBRR maintains a neighbor table via the contention mechanism being dependent on wireless broadcast instead of beacons. Comprehensive simulations show that CBRR can not only achieve higher performance in static networks, but also work well for dynamic networks. 展开更多
关键词 Wireless Sensor network REAL-time Routing Protocol Contention-Based Scheme Beaconless
在线阅读 下载PDF
A new real-time ethernet MAC protocol for time-critical applications 被引量:1
3
作者 沈钢 许晓鸣 +2 位作者 蔡云泽 何星 张卫东 《Journal of Central South University of Technology》 EI 2002年第1期54-58,共5页
The authors propose a new persistent transmission based real time Ethernet MAC protocol that provides a predictable upper bound for the delivery delay of real time frames. Moreover, it is compatible with the protocol ... The authors propose a new persistent transmission based real time Ethernet MAC protocol that provides a predictable upper bound for the delivery delay of real time frames. Moreover, it is compatible with the protocol used by the existing Ethernet controllers for conventional datagram traffic and thus standard Ethernet stations can be used in the system without any modification. The paper describes the protocol in detail and analyses the maximum delivery delay for real time traffic and the efficiency of the channel. 展开更多
关键词 real time ETHERNET multiple access protocol industrial control networks
在线阅读 下载PDF
Distributed In-Time Multiple Coverage Holes Healing Protocol
4
作者 Lin-Na Wei Zhi-Guang Qin 《Journal of Electronic Science and Technology》 CAS 2012年第2期185-191,共7页
Coverage holes often appear in wireless sensor networks due to sensor failure or the inheritance of sensor's random distribution. In the hybrid model, mobile sensors in the network are acquired to heal coverage holes... Coverage holes often appear in wireless sensor networks due to sensor failure or the inheritance of sensor's random distribution. In the hybrid model, mobile sensors in the network are acquired to heal coverage holes by their mobifity. When multiple coverage holes appear in the sensor network and each of them has a time requirement (in which the coverage hole has to be healed), conflicts for the requests of the same mobile sensor may arise. A distributed multiple mobile sensor schedufing protocol (DMS) is proposed in this paper to solve this problem by finding mobile sensors in the time response zone defined by the time requirement of each coverage hole. Simulation results show that DMS can well schedule the mobile sensors to move to multiple coverage holes within the time requirement. 展开更多
关键词 Coverage bole distributed protocol mobile sensor dispatch sensor network time limited.
在线阅读 下载PDF
An Arrangement of Channels and Transceivers in Optical Packet Switching Networks
5
作者 Ming Hu 《Journal of Electronic Science and Technology of China》 2008年第1期5-9,共5页
Based on a media access and control(MAC)protocol,an arrangement of channels and transceivers in optical packet switching dense wavelength division multiplexing(DWDM)networks is proposed in this paper.In order to r... Based on a media access and control(MAC)protocol,an arrangement of channels and transceivers in optical packet switching dense wavelength division multiplexing(DWDM)networks is proposed in this paper.In order to reduce the cost of nodes,fixed transmitters and receivers are used instead of tunable transmitters and receivers.Two fixed transmitters and many fixed receivers are used in each node in the scheme.The average waiting delay of this scheme is analyzed through mathematics and computer simulation.The result shows that the property of the scheme is almost the same as using tunable transmitter and receiver.Furthermore,if the tuning time of tunable transmitters is taken into account,the performance of the tunable transmitter scheme is poor than this scheme at the average waiting delay and throughput of the network. 展开更多
关键词 Dense wavelength division multiplexing(DWDM) media access and control (MAC) protocol optical packet switching network transmitter and receiverarrangement tuning time.
在线阅读 下载PDF
Distributed intrusion detection for mobile ad hoc networks 被引量:8
6
作者 Yi Ping Jiang Xinghao +1 位作者 Wu Yue Liu Ning 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期851-859,共9页
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to... Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. A distributed intrusion detection approach based on timed automata is given. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing (DSR). The monitor nodes can verify the behaviour of every nodes by timed automata, and validly detect real-time attacks without signatures of intrusion or trained data. Compared with the architecture where each node is its own IDS agent, the approach is much more efficient while maintaining the same level of effectiveness. Finally, the intrusion detection method is evaluated through simulation experiments. 展开更多
关键词 mobile ad hoc networks routing protocol SECURITY intrusion detection timed automata.
在线阅读 下载PDF
Time sensitive networking security:issues of precision time protocol and its implementation 被引量:1
7
作者 Davide Berardi Nils OTippenhauer +2 位作者 Andrea Melis Marco Prandini Franco Callegati 《Cybersecurity》 EI CSCD 2023年第4期1-13,共13页
Time Sensitive Networking(TSN)will be an integral component of industrial networking.Time synchronization in TSN is provided by the IEEE-1588,Precision Time Protocol(PTP)protocol.The standard,dating back to 2008,margi... Time Sensitive Networking(TSN)will be an integral component of industrial networking.Time synchronization in TSN is provided by the IEEE-1588,Precision Time Protocol(PTP)protocol.The standard,dating back to 2008,marginally addresses security aspects,notably not encompassing the frames designed for management purposes(Type Length Values or TLVs).In this work we show that the TLVs can be abused by an attacker to reconfigure,manipulate,or shut down time synchronization.The effects of such an attack can be serious,ranging from interruption of operations to actual unintended behavior of industrial devices,possibly resulting in physical damages or even harm to operators.The paper analyzes the root causes of this vulnerability,and provides concrete examples of attacks leveraging it to de-synchronize the clocks,showing that they can succeed with limited resources,realistically available to a malicious actor. 展开更多
关键词 time synchronization time sensitive networking Precision time protocol Cybersecurity attacks
原文传递
Performance improvement of licklider transmission protocol in complex deep space networks based on parameter optimization
8
作者 Guo YU Zhenxing DONG Yan ZHU 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2023年第5期406-420,共15页
A reasonable parameter configuration helps improve the data transmission performance of the Licklider Transmission Protocol(LTP).Previous research has focused mainly on parameter optimization for LTP in simplified sce... A reasonable parameter configuration helps improve the data transmission performance of the Licklider Transmission Protocol(LTP).Previous research has focused mainly on parameter optimization for LTP in simplified scenarios with one to two hops or multihop scenarios with a custody mechanism of the Bundle Protocol(BP).However,the research results are not applicable to communications in Complex Deep Space Networks(CDSNs)without the custody mechanism of BP that are more suitable for deep space communications with LTP.In this paper,we propose a model of file delivery time for LTP in CDSNs.Based on the model,we propose a Parameter Optimization Design Algorithm for LTP(LTP-PODA)of configuring reasonable parameters for LTP.The results show that the accuracy of the proposed model is at least 6.47%higher than that of the previously established models based on simple scenarios,and the proposed model is more suitable for CDSNs.Moreover,the LTP parameters are optimized by the LTP-PODA algorithm to obtain an optimization plan.Configuring the optimization plan for LTP improves the protocol transmission performance by at least 18.77%compared with configuring the other parameter configuration plans. 展开更多
关键词 Complex deep space networks File delivery time model Licklider Transmission Protocol(LTP) network Performance network protocols Parameter optimization Performance improvement
原文传递
Practical Timing Synchronization for Network Dynamics in Large Machine-to-Machine Networks
9
作者 Lei Gu Shih-Chun Lin 《China Communications》 SCIE CSCD 2016年第10期160-168,共9页
Efficient multi-machine cooperation and network dynamics still remain open that jeopardize great applications in largescale machine-to-machine(M2M) networks. Among all possible machine cooperation controls, to synchro... Efficient multi-machine cooperation and network dynamics still remain open that jeopardize great applications in largescale machine-to-machine(M2M) networks. Among all possible machine cooperation controls, to synchronize tremendous machines in a timing-efficient brings one of the greatest challenge and serves as the foundation for any other network control policies. In this paper, we propose a linear-time synchronization protocol in large M2M networks. Specifically, a closed-form of synchronization rate is provided by developing the statistical bounds of the second smallest eigenvalue of the graph Laplacian matrix. These bounds enable the efficient control of network dynamics, facilitating the timing synchronization in networks. Through a practical study in Metropolis, simulation results confirm our theoretical analysis and provide effective selection of wireless technologies, including Zigbee, Wi-Fi, and cellular systems, with respect to the deployed density of machines. Therefore, this paper successfully demonstrates a practical timing synchronization, to make a breakthrough of network dynamic control in real-world machine systems, such as Internet of Things. 展开更多
关键词 timing synchronization network dynamics graph Laplacian matrix distributed protocol internet of things(IoTs) machine-to-machine(M2M) communications
在线阅读 下载PDF
Second-Order Consensus in Networks of Agents with Delayed Dynamics
10
作者 YANG Bo FANG Huajing 《Wuhan University Journal of Natural Sciences》 CAS 2009年第2期158-162,共5页
This paper proposes second-order consensus protocols and gives a measure of the robustness of the protocols to the time-delays existing in the dynamics of agents with second-order dynamics. By employing a frequency do... This paper proposes second-order consensus protocols and gives a measure of the robustness of the protocols to the time-delays existing in the dynamics of agents with second-order dynamics. By employing a frequency domain method, it is proven that the information states achieve second-order consensus asymptotically for appropriate time-delay if the topology of the network is connected. Particularly, a nonconservative upper bound on the fixed time-delay that can be tolerated is found. The consensus protocols are distributed in the sense that each agent only needs information from its neighboring agents, which makes the proposed protocols scalable. It reduces the complexity of connections among agents significantly. Simulation results are provided to verify the effectiveness of the theoretical results for second-order consensus in networks in the presence of time-delays existing in the dynamics of agents. 展开更多
关键词 second-order consensus protocols dynamic networks time-DELAYS frequency domain analysis
原文传递
Research on Multiple Access Algorithms for Wireless Network
11
作者 Kaifeng Yao 《Journal of Electronic Research and Application》 2024年第4期55-63,共9页
Nodes in the communication network mainly depend on the Media Access Control(MAC)layer protocol design.To ensure the MAC protocol achieves high throughput,low latency,and high service quality,this paper designed a“ce... Nodes in the communication network mainly depend on the Media Access Control(MAC)layer protocol design.To ensure the MAC protocol achieves high throughput,low latency,and high service quality,this paper designed a“centralized-distribution”system MAC protocol combined with a slot allocation algorithm.This allows it to quickly adapt to the topology changes in the network and the overall network frame structure.For the centralized time slot allocation,since the system’s frame structure changes across the entire network,the root node must gather information from other nodes.This ensures that the root node can collect the latest topology information when the network topology changes and subsequently adjust the frame structure of the whole network for the distributed time slot allocation.The simulation results show that the adaptive time-division multiple access mechanism can quickly adapt to changes in topology and the network’s frame structure.It enables adaptive changes in node transmission times,ensures the rapid transmission and circulation of large-capacity data between nodes,and improves transmission efficiency. 展开更多
关键词 TDMA Wireless network MAC protocol time gap allocation
在线阅读 下载PDF
基于可信时间戳的远程在线测量系统研究
12
作者 王菊凤 龙波 +1 位作者 张宇 黄徐瑞晗 《计量与测试技术》 2025年第11期15-18,共4页
为实现交通用时终端设备的高频在线数字测量与监测应用,基于时间戳和时间网络校准技术,搭建基于可信时间戳的远程在线测量系统,利用卫星共视技术、光纤传递技术,将UTC(NIM)时间基准实时传递同步至交通用时终端,为其远程提供标准时间信号... 为实现交通用时终端设备的高频在线数字测量与监测应用,基于时间戳和时间网络校准技术,搭建基于可信时间戳的远程在线测量系统,利用卫星共视技术、光纤传递技术,将UTC(NIM)时间基准实时传递同步至交通用时终端,为其远程提供标准时间信号,并将用时终端的时间信息通过网络接口传输至该系统,产生加盖时间戳的校准证书。结果表明,基于NTP传递的用时终端与标准时间的时间偏差大多分布在(-4~2)ms以内,平均偏差为-1.06ms,扩展不确定度为0.18ms(k=2)。 展开更多
关键词 计量学 时间戳 时间传递 网络时间协议
在线阅读 下载PDF
高精度时间同步技术在模块化波分网络的应用分析
13
作者 周彦韬 赵良 +4 位作者 张贺 沈世奎 王永超 杨鹏真 王泽林 《邮电设计技术》 2025年第5期78-81,共4页
以中国联通的模块化波分设备城域网现网试点结果为基础,对模块化波分设备基于1588v2协议的高精度同步传输承载的方案进行了分析和比较。通过结合模块化波分设备与1588v2传输能力,其应用场景进一步扩宽,实现了城域光网络的低成本建设,并... 以中国联通的模块化波分设备城域网现网试点结果为基础,对模块化波分设备基于1588v2协议的高精度同步传输承载的方案进行了分析和比较。通过结合模块化波分设备与1588v2传输能力,其应用场景进一步扩宽,实现了城域光网络的低成本建设,并助力1588v2地面网络建设,实现了天地互备的授时系统。最后,分析了不同的1588v2同步传输承载方式,为模块化波分设备的1588v2部署提供了参考。 展开更多
关键词 模块化波分 高精度时间同步 城域网应用 4G/5G回传
在线阅读 下载PDF
面向TDMA无线传感器网络的攻击构造与入侵检测方法研究
14
作者 温敏初 梁炜 张嘉麟 《计算机工程》 北大核心 2025年第8期203-214,共12页
无线介质的开放性使得信息安全成为其应用中的挑战性问题之一。时分多址(TDMA)协议是面向工业等时延敏感应用的主要协议。针对TDMA无线传感器网络的时隙调度特征,提出空闲时隙攻击模型、重传时隙攻击模型这2种伪装攻击模型,并针对这2种... 无线介质的开放性使得信息安全成为其应用中的挑战性问题之一。时分多址(TDMA)协议是面向工业等时延敏感应用的主要协议。针对TDMA无线传感器网络的时隙调度特征,提出空闲时隙攻击模型、重传时隙攻击模型这2种伪装攻击模型,并针对这2种攻击模型,从TDMA无线传感器网络自身的传输特点出发,考虑网络传输的周期性及传输基本单元为一个时隙的特点,提出一种基于细粒度时间特征提取的高精度入侵检测方法。首先,利用数据包接收时间、超帧开始时间等信息进行时间维度上的细粒度特征提取,计算传输时隙的位置信息;然后,将位置信息输入无监督模型IF(Isolation Forest)进行训练和学习;最后,对在一个超帧周期内收到的同一个节点的序列号相同的2个数据包进行合法性判断。实验结果表明,所提2种伪装攻击能够逃避现有的入侵检测方法,而所提入侵检测方法可以有效检测出这2种伪装攻击,相较于传统方法,该方法在丢包率为30%时检测成功率提升14.5%。 展开更多
关键词 无线传感器网络 时分多址协议 伪装攻击 入侵检测 细粒度时间特征提取
在线阅读 下载PDF
基于分布式无线网络的智慧矿山实时数据传输算法 被引量:1
15
作者 王彦斌 屈波 +2 位作者 孙延钊 刘银兵 谢巧军 《金属矿山》 北大核心 2025年第8期107-112,共6页
随着智慧矿山建设的不断深入,实时数据传输在矿山安全和生产效率中的重要性愈发凸显。提出了一种基于分布式无线网络的智慧矿山实时数据传输算法,旨在解决矿山环境中信号传播受限、干扰严重和节点能耗高等问题,确保数据传输的稳定性和... 随着智慧矿山建设的不断深入,实时数据传输在矿山安全和生产效率中的重要性愈发凸显。提出了一种基于分布式无线网络的智慧矿山实时数据传输算法,旨在解决矿山环境中信号传播受限、干扰严重和节点能耗高等问题,确保数据传输的稳定性和高效性。首先,设计了一种分布式无线网络架构,该架构利用多跳通信和自适应路由协议,实现了在复杂地形中的可靠数据传输;其次,提出了一种能量高效的节点调度算法,以延长传感器节点的工作寿命。通过模拟试验和实际部署,对算法模型的传输延迟、数据包丢失率和能耗进行了详细分析表明,数据包丢失率减少至1.2%,并且节点能耗降低了约30%。此外,结合实际矿山场景,对算法模型的抗干扰能力和故障恢复机制进行了分析,验证了所提算法在数据传输速度、稳定性和能耗方面的优势。 展开更多
关键词 智慧矿山 分布式无线网络 实时数据传输 自适应路由协议
在线阅读 下载PDF
GRD:基于GNN和扩散模型的多变量时序数据异常检测算法
16
作者 邸钦渤 陈劭力 时良仁 《计算机工程》 北大核心 2025年第11期35-44,共10页
随着多变量时序数据在各行业中的广泛应用,开发有效的异常检测方法对于保障系统的稳定运行和安全性变得极为关键,由于多变量时序数据内在的复杂性和动态变化特性,对异常检测算法提出了更高的要求。针对现有异常检测方法在处理含有复杂... 随着多变量时序数据在各行业中的广泛应用,开发有效的异常检测方法对于保障系统的稳定运行和安全性变得极为关键,由于多变量时序数据内在的复杂性和动态变化特性,对异常检测算法提出了更高的要求。针对现有异常检测方法在处理含有复杂变量关系的高维数据时存在效率不足的问题,提出一种基于图神经网络(GNN)与扩散模型的多变量时序数据异常检测算法GRD。通过节点嵌入和图结构学习,GRD算法能有效地捕捉和表示变量间的复杂关系,并通过门控循环单元(GRU)和去噪扩散概率模型(DDPM)进一步提取特征,实现了对异常数据的高精度检测。在以往的实验评估中,大多数算法在评分前会采用点调整(PA)评估协议,该协议会严重高估算法的检测能力。为了更准确地评估算法性能,采用新的评估协议和评价指标。实验结果表明,GRD算法在3个公开数据集上的F1@k指标分别是0.7414、0.8017、0.7671,性能优于现有方法。特别是在高维数据处理方面,GRD算法展现出显著优势,证明了其在现实场景的异常检测应用中的实用性和鲁棒性。 展开更多
关键词 多变量时序数据 异常检测 图神经网络 扩散模型 评估协议
在线阅读 下载PDF
基于时间触发的机载统一网络协议一致性测试技术
17
作者 闫萍萍 李晖 +2 位作者 陈银超 杨朝旭 郭晓丹 《电子科技》 2025年第1期14-22,共9页
基于时间触发的机载统一网络是下一代航空机载系统技术的重要发展方向。为实现网络设备快速可靠互联,需要建立网络协议标准并通过一致性测试保证网络信号品质可靠、协议正确无故障。文中基于AS6802及IEEE 802.3协议规范,结合机载网络需... 基于时间触发的机载统一网络是下一代航空机载系统技术的重要发展方向。为实现网络设备快速可靠互联,需要建立网络协议标准并通过一致性测试保证网络信号品质可靠、协议正确无故障。文中基于AS6802及IEEE 802.3协议规范,结合机载网络需求选取适用于航空机载时间触发网络物理层及链路层标准,建立了机载统一网络设备标准。依据网络标准设计测试项目,结合测试需求建立了基于现场可编程门阵列(Field Programmable Gate Array,FPGA)的实物测试环境。使用光示波器、光功率计、光衰减器等设备进行发送端眼图、信号速率、上升下降时间、消光比、平均光功率、接收端误码率、接收灵敏度等物理层信号特性测试。通过特异性设备仿真端系统发送测试所需网络帧,进行链路层协议状态机、同步参数一致性测试。测试结果表明,被测网络设备误码率小于10-12,眼图等光电信号特性均满足物理层标准。状态机跳转符合链路层协议,重要同步参数满足主机所规定,所成品厂实现互联互通。 展开更多
关键词 协议一致性测试 机载网络 时间触发网络 物理层测试 链路层测试 飞控系统 网络互联 网络测试
在线阅读 下载PDF
基于安全分区的水电站时钟同步系统设计
18
作者 孔令超 张佳伟 +1 位作者 于远航 李金生 《三峡大学学报(自然科学版)》 北大核心 2025年第S1期132-136,共5页
为解决传统水电站不同安全分区共用一套时钟同步装置的风险,本文提出了一种基于安全分区的水电站时钟同步系统设计方案,对某水电站原时钟同步系统进行改造,实现了控制区(安全Ⅰ区)、非控制区(安全Ⅱ区)、信息管理大区分区对时,同时引入... 为解决传统水电站不同安全分区共用一套时钟同步装置的风险,本文提出了一种基于安全分区的水电站时钟同步系统设计方案,对某水电站原时钟同步系统进行改造,实现了控制区(安全Ⅰ区)、非控制区(安全Ⅱ区)、信息管理大区分区对时,同时引入时空防护装置对时钟信号进行过滤甄别,发现异常信号入侵及时报警,阻断入侵行为.改造后的时钟同步系统更加安全、可靠,具有很高的推广价值. 展开更多
关键词 时钟同步系统 北斗卫星导航系统 安全分区 时空防护装置 网络时间协议 精密时间协议
在线阅读 下载PDF
机械装备行业的TSN工业实时控制网络通信技术
19
作者 谭少飞 杨银香 +2 位作者 王战孟 范福基 郝亮 《兵工自动化》 北大核心 2025年第8期24-28,51,共6页
针对单一网络访问控制方式下通信效率不高等问题,提出面向掘进机的机械装备行业的TSN工业实时控制网络通信技术。根据基础访问和CTS访问方式设计TSN工业实时控制网络通信协议,将多节点组网的模式作为网络拓扑结构,通过计算网络通信空闲... 针对单一网络访问控制方式下通信效率不高等问题,提出面向掘进机的机械装备行业的TSN工业实时控制网络通信技术。根据基础访问和CTS访问方式设计TSN工业实时控制网络通信协议,将多节点组网的模式作为网络拓扑结构,通过计算网络通信空闲时间获取通信终端地址。对通信发起过程和节点转发过程进行设计,从而实现TSN工业实时控制网络通信。实验结果表明:该方法对TSN工业信息进行传输时的协议转换时延较低,通信效率较高,能够满足机械装备行业对实时性和精确时间控制的需求。 展开更多
关键词 机械装备行业 TSN 工业实时控制网络 通信协议
在线阅读 下载PDF
双边轮询协议下的时变线性系统分布式滤波
20
作者 梁啸海 闻继伟 +1 位作者 栾小丽 刘飞 《控制理论与应用》 北大核心 2025年第7期1397-1406,共10页
针对时变线性系统,提出滤波网络的双边轮询协议,研究其在随机拓扑切换下的分布式滤波问题.首先,对滤波网络建立双边轮询协议,将对观测对象的测量和网络内部智能节点之间的交互通信同时纳入轮询协议,即每一个采样时刻只有一个滤波节点占... 针对时变线性系统,提出滤波网络的双边轮询协议,研究其在随机拓扑切换下的分布式滤波问题.首先,对滤波网络建立双边轮询协议,将对观测对象的测量和网络内部智能节点之间的交互通信同时纳入轮询协议,即每一个采样时刻只有一个滤波节点占用通信资源,减少滤波网络资源消耗,解决带宽有限和数据冲突问题;其次,采用Markov链描述滤波网络的拓扑切换行为,通过构造拓扑依赖的Lyapunov函数给出滤波误差系统均方稳定的充分条件,利用差分线性矩阵不等式在线求解滤波器参数;最后,通过数值及实例仿真验证所设计滤波方法的可行性和有效性. 展开更多
关键词 时变线性系统 滤波网络 分布式滤波 双边轮询协议 拓扑切换 H_∞性能
在线阅读 下载PDF
上一页 1 2 30 下一页 到第
使用帮助 返回顶部