This paper thoroughly studies a control system with control allocation for a manned submersible in deep sea being developed in China. The proposed control system consists of a neural-network-based direct adaptive cont...This paper thoroughly studies a control system with control allocation for a manned submersible in deep sea being developed in China. The proposed control system consists of a neural-network-based direct adaptive controller and a dynamic control allocation module. A control energy cost function is used as the optimization criteria of the control allocation module, and weighted pseudo-inverse is used to find the solution of the control allocation problem. In the presence of bounded unknown disturbance and neural networks approximation error, stability of the closed-loop control system of manned submersible is proved with Lyaponov theory. The feasibility and validity of the proposed control system is further verified through experiments conducted on a semi-physical simulation platform for the manned submersible in deep sea.展开更多
This paper introduces architectures of two types optical packet switched metropolitan area networks and their media access control protocols. We have designed related network simulation systems. With these simulation...This paper introduces architectures of two types optical packet switched metropolitan area networks and their media access control protocols. We have designed related network simulation systems. With these simulation systems, the characteristics and performance of the two MANs can be achieved.展开更多
This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries l...This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries launch deauthentication flood attacks cutting users' connection, the connection managers will automatically research the last access point's extended service set identifier (ESSID) and then re-establish connection. However, such re-connection can lead the users to a fake access point with the same ESSID set by attackers. As the attackers hide behind users' access points, they can pass AL's authentication and security schemes, e.g. secure socket layer (SSL). We have proved that they can even spy on users' account details, passwords, data and privacy.展开更多
基金This project is financially supported by the National High Technology Research Development Programof China(863Program)(Grant No.2002AA401003)
文摘This paper thoroughly studies a control system with control allocation for a manned submersible in deep sea being developed in China. The proposed control system consists of a neural-network-based direct adaptive controller and a dynamic control allocation module. A control energy cost function is used as the optimization criteria of the control allocation module, and weighted pseudo-inverse is used to find the solution of the control allocation problem. In the presence of bounded unknown disturbance and neural networks approximation error, stability of the closed-loop control system of manned submersible is proved with Lyaponov theory. The feasibility and validity of the proposed control system is further verified through experiments conducted on a semi-physical simulation platform for the manned submersible in deep sea.
文摘This paper introduces architectures of two types optical packet switched metropolitan area networks and their media access control protocols. We have designed related network simulation systems. With these simulation systems, the characteristics and performance of the two MANs can be achieved.
基金the National Science Council (No. NSC-99-2219-E-033-001)the Foundation of the Chung Yuan Christian University (1004) (No. CYCU-EECS.9801)
文摘This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries launch deauthentication flood attacks cutting users' connection, the connection managers will automatically research the last access point's extended service set identifier (ESSID) and then re-establish connection. However, such re-connection can lead the users to a fake access point with the same ESSID set by attackers. As the attackers hide behind users' access points, they can pass AL's authentication and security schemes, e.g. secure socket layer (SSL). We have proved that they can even spy on users' account details, passwords, data and privacy.