A method of transmission and monitoring in local area network(LAN) for the welding seam video information of binocular vision welding robot is proposed.This paper uses MPEG-4 video CODEC functions of DivX,video for Wi...A method of transmission and monitoring in local area network(LAN) for the welding seam video information of binocular vision welding robot is proposed.This paper uses MPEG-4 video CODEC functions of DivX,video for Windows(VFW) video capture technology,multi-threaded network communication idea and WinSock Socket in Visual C++ 6.0.In the end,client/server(C/S) communication model based on TCP/IP protocol has been developed.Experimental results show that the method can achieve the multiple welding seam video's real-time transmission in LAN.Moreover,the Canny operator is used to realize the edge feature extraction of the seam image which is captured by the client,so that the edge of the seam extracted is continuous and clear.展开更多
This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries l...This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries launch deauthentication flood attacks cutting users' connection, the connection managers will automatically research the last access point's extended service set identifier (ESSID) and then re-establish connection. However, such re-connection can lead the users to a fake access point with the same ESSID set by attackers. As the attackers hide behind users' access points, they can pass AL's authentication and security schemes, e.g. secure socket layer (SSL). We have proved that they can even spy on users' account details, passwords, data and privacy.展开更多
A wireless sensor network (WSN) is spatially distributing independent sensors to monitor physical and environmental characteristics such as temperature, sound, pressure and also provides different applications such as...A wireless sensor network (WSN) is spatially distributing independent sensors to monitor physical and environmental characteristics such as temperature, sound, pressure and also provides different applications such as battlefield inspection and biological detection. The Constrained Motion and Sensor (CMS) Model represents the features and explain k-step reach ability testing to describe the states. The description and calculation based on CMS model does not solve the problem in mobile robots. The ADD framework based on monitoring radio measurements creates a threshold. But the methods are not effective in dynamic coverage of complex environment. In this paper, a Localized Coverage based on Shape and Area Detection (LCSAD) Framework is developed to increase the dynamic coverage using mobile robots. To facilitate the measurement in mobile robots, two algorithms are designed to identify the coverage area, (i.e.,) the area of a coverage hole or not. The two algorithms are Localized Geometric Voronoi Hexagon (LGVH) and Acquaintance Area Hexagon (AAH). LGVH senses all the shapes and it is simple to show all the boundary area nodes. AAH based algorithm simply takes directional information by locating the area of local and global convex points of coverage area. Both these algorithms are applied to WSN of random topologies. The simulation result shows that the proposed LCSAD framework attains minimal energy utilization, lesser waiting time, and also achieves higher scalability, throughput, delivery rate and 8% maximal coverage connectivity in sensor network compared to state-of-art works.展开更多
This paper introduces a novel robot for outer surface inspection of boiler tubes. The paper describes the hardware system, wireless communication strategy, communication procedure and system software of the robot. The...This paper introduces a novel robot for outer surface inspection of boiler tubes. The paper describes the hardware system, wireless communication strategy, communication procedure and system software of the robot. The WLAN technology is used in the robot. It solves the problem of shielding generated by iron boiler and 11Mbps bandwidth made it possible for video and control stream real-time transmit within the same channel. Though TCP/IP protocol is robust, serial server is a transparent channel but cannot detect error and retransmit the data. In order to improve the reliability of serial communication, a new communication protocol is proposed. Key words boiler tubes - mobile robotics - wireless local area network Project Supported by the National High-Tech Program (Grant No. 2002AA420080)展开更多
This paper proposes the teaching reform of the "Wireless Local Area Network" in the background of "Wireless Business Circle" . At present, WLAN technology is becoming more and more mature, the application is then ...This paper proposes the teaching reform of the "Wireless Local Area Network" in the background of "Wireless Business Circle" . At present, WLAN technology is becoming more and more mature, the application is then becoming more and more extensive, the campus network will grow rapidly on wireless LAN applications especially the research and higher education institutions on the wireless LAN demand is increasing with wireless LAN will have a very broad market development space. GIS business circle analysis model is to determine business enterprise location or expand their existing business outlets of information necessary to say on the map by G1S visual function of the model. This paper makes the combination of the mentioned items that will then and later influence the performance of the model.展开更多
With the rapid development of wireless local area network (WLAN) technology, an important target of indoor positioning systems is to improve the positioning accuracy while reducing the online calibration effort to o...With the rapid development of wireless local area network (WLAN) technology, an important target of indoor positioning systems is to improve the positioning accuracy while reducing the online calibration effort to overcome signal time-varying. A novel fingerprint positioning algorithm, known as the adaptive radio map with updated method based on hidden Markov model (HMM), is proposed. It is shown that by using a collection of user traces that can be cheaply obtained, the proposed algorithm can take advantage of these data to update the labeled calibration data to further improve the position estimation accuracy. This algorithm is a combination of machine learning, information gain theory and fingerprinting. By collecting data and testing the algorithm in a realistic indoor WLAN environment, the experiment results indicate that, compared with the widely used K nearest neighbor algorithm, the proposed algorithm can improve the positioning accuracy while greatly reduce the calibration effort.展开更多
For indoor location estimation based on received signal strength( RSS) in wireless local area networks( WLAN),in order to reduce the influence of noise on the positioning accuracy,a large number of RSS should be colle...For indoor location estimation based on received signal strength( RSS) in wireless local area networks( WLAN),in order to reduce the influence of noise on the positioning accuracy,a large number of RSS should be collected in offline phase. Therefore,collecting training data with positioning information is time consuming which becomes the bottleneck of WLAN indoor localization. In this paper,the traditional semisupervised learning method based on k-NN and ε-NN graph for reducing collection workload of offline phase are analyzed,and the result shows that the k-NN or ε-NN graph are sensitive to data noise,which limit the performance of semi-supervised learning WLAN indoor localization system. Aiming at the above problem,it proposes a l1-graph-algorithm-based semi-supervised learning( LG-SSL) indoor localization method in which the graph is built by l1-norm algorithm. In our system,it firstly labels the unlabeled data using LG-SSL and labeled data to build the Radio Map in offline training phase,and then uses LG-SSL to estimate user's location in online phase. Extensive experimental results show that,benefit from the robustness to noise and sparsity ofl1-graph,LG-SSL exhibits superior performance by effectively reducing the collection workload in offline phase and improving localization accuracy in online phase.展开更多
IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local ...IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local area network(WLAN)through radio waves,its communication is exposed to the possibility of being attacked by illegitimate users.Moreover,the security design of the wireless structure is vulnerable to versatile attacks.For example,the attacker can imitate genuine features,rendering classificationbased methods inaccurate in differentiating between real and false messages.Althoughmany security standards have been proposed over the last decades to overcome many wireless network attacks,effectively detecting such attacks is crucial in today’s real-world applications.This paper presents a novel resource exhaustion attack detection scheme(READS)to detect resource exhaustion attacks effectively.The proposed scheme can differentiate between the genuine and fake management frames in the early stages of the attack such that access points can effectively mitigate the consequences of the attack.The scheme is built through learning from clustered samples using artificial neural networks to identify the genuine and rogue resource exhaustion management frames effectively and efficiently in theWLAN.The proposed scheme consists of four modules whichmake it capable to alleviates the attack impact more effectively than the related work.The experimental results show the effectiveness of the proposed technique by gaining an 89.11%improvement compared to the existing works in terms of detection.展开更多
Software-Defined Networking(SDN)improves network management by separating its control logic from the underlying hardware and integrating it into a logically centralized control unit,termed the SDN controller.SDN adapt...Software-Defined Networking(SDN)improves network management by separating its control logic from the underlying hardware and integrating it into a logically centralized control unit,termed the SDN controller.SDN adaptation is essential for wireless networks because it offers enhanced and data-intensive services.The initial intent of the SDN design was to have a physically centralized controller.However,network experts have suggested logically centralized and physically distributed designs for SDN controllers,owing to issues such as a single point of failure and scalability.This study addressed the security,scalability,reliability,and consistency issues associated with the design of distributed SDN controllers.Moreover,the security issues of an enterprise related to multiple physically distributed controllers in a software-defined wireless local area network(SD-WLAN)were emphasized,and optimal solutions were suggested.展开更多
With the exponential growth of mobile terminals and the widespread adoption of Internet of Things(IoT)technologies,an increasing number of devices rely on wireless local area networks(WLAN)for data transmission.To add...With the exponential growth of mobile terminals and the widespread adoption of Internet of Things(IoT)technologies,an increasing number of devices rely on wireless local area networks(WLAN)for data transmission.To address this demand,deploying more access points(APs)has become an inevitable trend.While this approach enhances network coverage and capacity,it also exacerbates co-channel interference(CCI).The multi-AP cooperation introduced in IEEE 802.11be(Wi-Fi 7)represents a paradigm shift from conventional single-AP architectures,offering a novel solution to CCI through joint resource scheduling across APs.However,designing efficient cooperation mechanisms and achieving optimal resource allocation in dense AP environment remain critical research challenges.To mitigate CCI in high-density WLANs,this paper proposes a radio resource allocation method based on 802.11be multi-AP cooperation.First,to reduce the network overhead associated with centralized AP management,we introduce a distributed interference-aware AP clustering method that groups APs into cooperative sets.Second,methods for multi-AP cooperation information exchange,and cooperation transmission processes are designed.To support network state collection,capability advertisement,and cooperative trigger execution at the protocol level,this paper enhances the 802.11 frame structure with dedicated fields for multi-AP cooperation.Finally,considering the mutual influence between power and channel allocation,this paper proposes a joint radio resource allocation algorithm that employs an enhanced genetic algorithm for resource unit(RU)allocation and Q-learning for power control,interconnected via an inner-outer dual-loop architecture.Simulation results demonstrate the effectiveness of the proposed CCI avoidance mechanism and radio resource allocation algorithm in enhancing throughput in dense WLAN scenarios.展开更多
基于医院多业务接入复杂性与内外网协同需求,研究无线局域网(Wireless Local Area Network,WLAN)系统的拓扑架构、接入控制、调度机制及资源优化方法。阐述面向角色的动态接入控制策略,介绍覆盖建模与容量规划方法,并在仿真平台上构建...基于医院多业务接入复杂性与内外网协同需求,研究无线局域网(Wireless Local Area Network,WLAN)系统的拓扑架构、接入控制、调度机制及资源优化方法。阐述面向角色的动态接入控制策略,介绍覆盖建模与容量规划方法,并在仿真平台上构建典型场景,开展协同机制与传统机制的性能对比分析。分析结果表明,所提方案在吞吐量、时延控制、信道利用效率方面具有显著优势,具备良好的工程适用性与系统可扩展性。展开更多
随着网络技术的持续演进,为满足日益增长的通信需求,急需对油气自控网络进行升级。基于虚拟交换实例(Virtual Switching Instance,VSI)/虚拟扩展局域网(Virtual eXtensible Local Area Network,VXLAN)隧道通信技术,开展网际互连协议第4...随着网络技术的持续演进,为满足日益增长的通信需求,急需对油气自控网络进行升级。基于虚拟交换实例(Virtual Switching Instance,VSI)/虚拟扩展局域网(Virtual eXtensible Local Area Network,VXLAN)隧道通信技术,开展网际互连协议第4版/网际互连协议第6版(Internet Protocol Version 4/Internet Protocol Version 6,IPv6)双栈部署与效能评估相关研究。通过确立双栈架构的设计原则与目标,构建分层网络架构,实现VSI/VXLAN隧道与IPv4/IPv6双栈架构的深度融合,完成核心网络设备与接入层网络的双栈部署,并实施安全域划分。基于多维度效能评估指标体系,采集多测点、多负载条件下的性能数据,量化评估网络的安全防护能力。实验结果表明,该方案可显著提升油气自控网络在协议兼容性、传输效率与安全性方面的综合性能,为其数字化升级提供理论支撑与实践路径。展开更多
基金the National Natural Science Foundation of China (No.61165008)the Natural Science Foundation of Jiangxi Province (No.20114BAB206004)the Project of Jiangxi Provincial Education Department(No.GJJ12038)
文摘A method of transmission and monitoring in local area network(LAN) for the welding seam video information of binocular vision welding robot is proposed.This paper uses MPEG-4 video CODEC functions of DivX,video for Windows(VFW) video capture technology,multi-threaded network communication idea and WinSock Socket in Visual C++ 6.0.In the end,client/server(C/S) communication model based on TCP/IP protocol has been developed.Experimental results show that the method can achieve the multiple welding seam video's real-time transmission in LAN.Moreover,the Canny operator is used to realize the edge feature extraction of the seam image which is captured by the client,so that the edge of the seam extracted is continuous and clear.
基金the National Science Council (No. NSC-99-2219-E-033-001)the Foundation of the Chung Yuan Christian University (1004) (No. CYCU-EECS.9801)
文摘This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries launch deauthentication flood attacks cutting users' connection, the connection managers will automatically research the last access point's extended service set identifier (ESSID) and then re-establish connection. However, such re-connection can lead the users to a fake access point with the same ESSID set by attackers. As the attackers hide behind users' access points, they can pass AL's authentication and security schemes, e.g. secure socket layer (SSL). We have proved that they can even spy on users' account details, passwords, data and privacy.
文摘A wireless sensor network (WSN) is spatially distributing independent sensors to monitor physical and environmental characteristics such as temperature, sound, pressure and also provides different applications such as battlefield inspection and biological detection. The Constrained Motion and Sensor (CMS) Model represents the features and explain k-step reach ability testing to describe the states. The description and calculation based on CMS model does not solve the problem in mobile robots. The ADD framework based on monitoring radio measurements creates a threshold. But the methods are not effective in dynamic coverage of complex environment. In this paper, a Localized Coverage based on Shape and Area Detection (LCSAD) Framework is developed to increase the dynamic coverage using mobile robots. To facilitate the measurement in mobile robots, two algorithms are designed to identify the coverage area, (i.e.,) the area of a coverage hole or not. The two algorithms are Localized Geometric Voronoi Hexagon (LGVH) and Acquaintance Area Hexagon (AAH). LGVH senses all the shapes and it is simple to show all the boundary area nodes. AAH based algorithm simply takes directional information by locating the area of local and global convex points of coverage area. Both these algorithms are applied to WSN of random topologies. The simulation result shows that the proposed LCSAD framework attains minimal energy utilization, lesser waiting time, and also achieves higher scalability, throughput, delivery rate and 8% maximal coverage connectivity in sensor network compared to state-of-art works.
文摘This paper introduces a novel robot for outer surface inspection of boiler tubes. The paper describes the hardware system, wireless communication strategy, communication procedure and system software of the robot. The WLAN technology is used in the robot. It solves the problem of shielding generated by iron boiler and 11Mbps bandwidth made it possible for video and control stream real-time transmit within the same channel. Though TCP/IP protocol is robust, serial server is a transparent channel but cannot detect error and retransmit the data. In order to improve the reliability of serial communication, a new communication protocol is proposed. Key words boiler tubes - mobile robotics - wireless local area network Project Supported by the National High-Tech Program (Grant No. 2002AA420080)
文摘This paper proposes the teaching reform of the "Wireless Local Area Network" in the background of "Wireless Business Circle" . At present, WLAN technology is becoming more and more mature, the application is then becoming more and more extensive, the campus network will grow rapidly on wireless LAN applications especially the research and higher education institutions on the wireless LAN demand is increasing with wireless LAN will have a very broad market development space. GIS business circle analysis model is to determine business enterprise location or expand their existing business outlets of information necessary to say on the map by G1S visual function of the model. This paper makes the combination of the mentioned items that will then and later influence the performance of the model.
基金supported by the National Natural Science Foundation of China(61571162)the Major National Science and Technology Project(2014ZX03004003-005)
文摘With the rapid development of wireless local area network (WLAN) technology, an important target of indoor positioning systems is to improve the positioning accuracy while reducing the online calibration effort to overcome signal time-varying. A novel fingerprint positioning algorithm, known as the adaptive radio map with updated method based on hidden Markov model (HMM), is proposed. It is shown that by using a collection of user traces that can be cheaply obtained, the proposed algorithm can take advantage of these data to update the labeled calibration data to further improve the position estimation accuracy. This algorithm is a combination of machine learning, information gain theory and fingerprinting. By collecting data and testing the algorithm in a realistic indoor WLAN environment, the experiment results indicate that, compared with the widely used K nearest neighbor algorithm, the proposed algorithm can improve the positioning accuracy while greatly reduce the calibration effort.
基金Sponsored by the National Natural Science Foundation of China(Grant No.61101122)the National High Technology Research and Development Program of China(Grant No.2012AA120802)the National Science and Technology Major Project of the Ministry of Science and Technology of China(Grant No.2012ZX03004-003)
文摘For indoor location estimation based on received signal strength( RSS) in wireless local area networks( WLAN),in order to reduce the influence of noise on the positioning accuracy,a large number of RSS should be collected in offline phase. Therefore,collecting training data with positioning information is time consuming which becomes the bottleneck of WLAN indoor localization. In this paper,the traditional semisupervised learning method based on k-NN and ε-NN graph for reducing collection workload of offline phase are analyzed,and the result shows that the k-NN or ε-NN graph are sensitive to data noise,which limit the performance of semi-supervised learning WLAN indoor localization system. Aiming at the above problem,it proposes a l1-graph-algorithm-based semi-supervised learning( LG-SSL) indoor localization method in which the graph is built by l1-norm algorithm. In our system,it firstly labels the unlabeled data using LG-SSL and labeled data to build the Radio Map in offline training phase,and then uses LG-SSL to estimate user's location in online phase. Extensive experimental results show that,benefit from the robustness to noise and sparsity ofl1-graph,LG-SSL exhibits superior performance by effectively reducing the collection workload in offline phase and improving localization accuracy in online phase.
基金The manuscript APC is supported by the grant name(UMS No.DFK2005)“Smart Vertical farming Technology for Temperate vegetable cultivation in Sabah:practising smart automation system using IR and AI technology in agriculture 4.0”.
文摘IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local area network(WLAN)through radio waves,its communication is exposed to the possibility of being attacked by illegitimate users.Moreover,the security design of the wireless structure is vulnerable to versatile attacks.For example,the attacker can imitate genuine features,rendering classificationbased methods inaccurate in differentiating between real and false messages.Althoughmany security standards have been proposed over the last decades to overcome many wireless network attacks,effectively detecting such attacks is crucial in today’s real-world applications.This paper presents a novel resource exhaustion attack detection scheme(READS)to detect resource exhaustion attacks effectively.The proposed scheme can differentiate between the genuine and fake management frames in the early stages of the attack such that access points can effectively mitigate the consequences of the attack.The scheme is built through learning from clustered samples using artificial neural networks to identify the genuine and rogue resource exhaustion management frames effectively and efficiently in theWLAN.The proposed scheme consists of four modules whichmake it capable to alleviates the attack impact more effectively than the related work.The experimental results show the effectiveness of the proposed technique by gaining an 89.11%improvement compared to the existing works in terms of detection.
文摘Software-Defined Networking(SDN)improves network management by separating its control logic from the underlying hardware and integrating it into a logically centralized control unit,termed the SDN controller.SDN adaptation is essential for wireless networks because it offers enhanced and data-intensive services.The initial intent of the SDN design was to have a physically centralized controller.However,network experts have suggested logically centralized and physically distributed designs for SDN controllers,owing to issues such as a single point of failure and scalability.This study addressed the security,scalability,reliability,and consistency issues associated with the design of distributed SDN controllers.Moreover,the security issues of an enterprise related to multiple physically distributed controllers in a software-defined wireless local area network(SD-WLAN)were emphasized,and optimal solutions were suggested.
基金supported by National Natural Science Foundation of China(No.62201074),Reliable Mechanism for Edge Collaboration Service in Highly Dynamic Scenarios.
文摘With the exponential growth of mobile terminals and the widespread adoption of Internet of Things(IoT)technologies,an increasing number of devices rely on wireless local area networks(WLAN)for data transmission.To address this demand,deploying more access points(APs)has become an inevitable trend.While this approach enhances network coverage and capacity,it also exacerbates co-channel interference(CCI).The multi-AP cooperation introduced in IEEE 802.11be(Wi-Fi 7)represents a paradigm shift from conventional single-AP architectures,offering a novel solution to CCI through joint resource scheduling across APs.However,designing efficient cooperation mechanisms and achieving optimal resource allocation in dense AP environment remain critical research challenges.To mitigate CCI in high-density WLANs,this paper proposes a radio resource allocation method based on 802.11be multi-AP cooperation.First,to reduce the network overhead associated with centralized AP management,we introduce a distributed interference-aware AP clustering method that groups APs into cooperative sets.Second,methods for multi-AP cooperation information exchange,and cooperation transmission processes are designed.To support network state collection,capability advertisement,and cooperative trigger execution at the protocol level,this paper enhances the 802.11 frame structure with dedicated fields for multi-AP cooperation.Finally,considering the mutual influence between power and channel allocation,this paper proposes a joint radio resource allocation algorithm that employs an enhanced genetic algorithm for resource unit(RU)allocation and Q-learning for power control,interconnected via an inner-outer dual-loop architecture.Simulation results demonstrate the effectiveness of the proposed CCI avoidance mechanism and radio resource allocation algorithm in enhancing throughput in dense WLAN scenarios.
文摘基于医院多业务接入复杂性与内外网协同需求,研究无线局域网(Wireless Local Area Network,WLAN)系统的拓扑架构、接入控制、调度机制及资源优化方法。阐述面向角色的动态接入控制策略,介绍覆盖建模与容量规划方法,并在仿真平台上构建典型场景,开展协同机制与传统机制的性能对比分析。分析结果表明,所提方案在吞吐量、时延控制、信道利用效率方面具有显著优势,具备良好的工程适用性与系统可扩展性。
文摘随着网络技术的持续演进,为满足日益增长的通信需求,急需对油气自控网络进行升级。基于虚拟交换实例(Virtual Switching Instance,VSI)/虚拟扩展局域网(Virtual eXtensible Local Area Network,VXLAN)隧道通信技术,开展网际互连协议第4版/网际互连协议第6版(Internet Protocol Version 4/Internet Protocol Version 6,IPv6)双栈部署与效能评估相关研究。通过确立双栈架构的设计原则与目标,构建分层网络架构,实现VSI/VXLAN隧道与IPv4/IPv6双栈架构的深度融合,完成核心网络设备与接入层网络的双栈部署,并实施安全域划分。基于多维度效能评估指标体系,采集多测点、多负载条件下的性能数据,量化评估网络的安全防护能力。实验结果表明,该方案可显著提升油气自控网络在协议兼容性、传输效率与安全性方面的综合性能,为其数字化升级提供理论支撑与实践路径。