The working principle of radio remote controlling of construction machinery should be that signals of the radio wave from the transmitter obtained in the receiver were controlled and then changed into electronic analo...The working principle of radio remote controlling of construction machinery should be that signals of the radio wave from the transmitter obtained in the receiver were controlled and then changed into electronic analog or digital signals which can be used to drive different actuators and mechanisms of the vehicle.The vehicle could be acted by following the controlling instructions sent by the operator.The best operation mode of construction machinery is suitable not only to manual operating but also to remote controlling in the same vehicle.The design methods of the hydraulic system used for the radio remote controlling of construction machinery are discussed.The design methods of hydraulic circuits for the actuators controlled by solenoid on-off type valves,hydro-electronic multi-way proportional valves,closed loop proportional servo driver or three-way proportional reducing valves are discussed in detail (with real example).The design methods of the power shift transmission of electro-hydraulic controlling,the devices of braking and the directional streering are discussed in this paper.展开更多
In order to avoid the system performance deterioration caused by the wireless fading channel and imperfect channel estimation in cognitive radio networks, the spectrum sharing problem with the consideration of feedbac...In order to avoid the system performance deterioration caused by the wireless fading channel and imperfect channel estimation in cognitive radio networks, the spectrum sharing problem with the consideration of feedback control information from the primary user is analyzed. An improved spectrum sharing algorithm based on the combination of the feedback control information and the optimization algorithm is proposed. The relaxation method is used to achieve the approximate spectrum sharing model, and the spectrum sharing strategy that satisfies the individual outage probability constraints can be obtained iteratively with the observed outage probability. Simulation results show that the proposed spectrum sharing algorithm can achieve the spectrum sharing strategy that satisfies the outage probability constraints and reduce the average outage probability without causing maximum transmission rate reduction of the secondary user.展开更多
The basic theory and principle of the artificial Controlled Source Radio Magneto Telluric(CSRMT) method is studied and a novel CSRMT transmitter in kH z frequency band is designed. The specific circuit and measured re...The basic theory and principle of the artificial Controlled Source Radio Magneto Telluric(CSRMT) method is studied and a novel CSRMT transmitter in kH z frequency band is designed. The specific circuit and measured results of some key modules in transmitter are presented, and some outdoor experimental tests have been carried out, which shows that the completed prototype of transmitter can generate a continuous sine current with frequency up to 35.33 k Hz, peak-to-peak amplitude up to 40 A, and realize a reliable transmitting mode with multi-frequency and high-current. The transmitter has a wide operating band, large magnetic moment and high waveform fidelity, and can meet the requirements of shallow geological exploration with high-resolution.展开更多
The secondary usage of spectrum has been investigated in Cognitive Radio(CR) network to resolving the spectrum scarcity issue in wireless communication.When Primary Users(PU) who own the spectrum appear,spectrum hando...The secondary usage of spectrum has been investigated in Cognitive Radio(CR) network to resolving the spectrum scarcity issue in wireless communication.When Primary Users(PU) who own the spectrum appear,spectrum handoff is needed to maintain the communications of Secondary Users.But the decision making of spectrum handoff is a challenge issue for CR network,because the input of decision making,which obtain through spectrum sensing,is heterogeneous and inexact.In this paper we will use fuzzy logic control theory to solve this issue and make use of new information for handoff operation:the probability of PU's occupancy at a certain channel.Our new algorithm can make more intelligent decision compared to simple traditional spectrum handoff decision making and reduce the probability of spectrum handoff,also the performance of SU's communication can be enhanced.展开更多
Transmission Control Protocol (TCP) is the most important transport layer protocol being used nowadays. It suffers from many problems over mobile networks especially over Cognitive Radio (CR). CR is one of the latest ...Transmission Control Protocol (TCP) is the most important transport layer protocol being used nowadays. It suffers from many problems over mobile networks especially over Cognitive Radio (CR). CR is one of the latest mobile technologies that brings its own share of problems for TCP. The buffer overflow for CR secondary network relay node can affect the performance of TCP. The contribution of this paper is the novel cross-layer model being used to evaluate the effect of the TCP congestion control on the secondary relay node buffer size in Cognitive Radio Network (CRN). The performance has been assessed by buffer overflow probability.展开更多
This paper considers a price-based power control problem in the cognitive radio networks(CRNs).The primary user(PU) can admit secondary users(SUs) to access if their interference powers are all under the interference ...This paper considers a price-based power control problem in the cognitive radio networks(CRNs).The primary user(PU) can admit secondary users(SUs) to access if their interference powers are all under the interference power constraint. In order to access the spectrum, the SUs need to pay for their interference power.The PU first decides the price for each SU to maximize its revenue. Then, each SU controls its transmit power to maximize its revenue based on a non-cooperative game. The interaction between the PU and the SUs is modeled as a Stackelberg game. Using the backward induction, a revenue function of the PU is expressed as a non-convex function of the transmit power of the SUs. To find the optimal price for the PU, we rewrite the revenue maximization problem of the PU as a monotone optimization by variable substitution. Based on the monotone optimization, a novel price-based power control algorithm is proposed. Simulation results show the convergence and the effectiveness of the proposed algorithm compared to the non-uniform pricing algorithm.展开更多
Malicious activities or policy violations have been a concern for the past years. For example, many people have been victims of robbery on vehicles. A conceptual diagram of an Intrusion Detection System (IDS) [1] [2] ...Malicious activities or policy violations have been a concern for the past years. For example, many people have been victims of robbery on vehicles. A conceptual diagram of an Intrusion Detection System (IDS) [1] [2] for vehicles with remote signaling using an Arduino controller and radio-frequency technology is proposed in this paper. To address malicious activities on vehicles, two aspects are considered here, namely: notifier and detector. Firstly, an object-oriented C module that puts on and off a controller (installed inside the vehicle) and an anti-theft electronic editing that powered using an alternator and supported by a back-up battery are implemented. Secondly, a magnetic intrusion sensor, controlled by a proximity detector using radio-frequency technology, has been installed on each vehicle door. To enable IDS, a user needs to activate the monitoring system when leaving their vehicle. This is done using a remote system. In case the user does not activate the monitoring system while leaving the vehicle, a 5-meter-proximity detector will automatically lock the system and set off the monitoring system whenever the user is outside the detection zone. The detection zone is a 5-meter radius area centered at the controller. Here, monitoring consists of geolocating any intruders within the detection zone. This means, if any of the vehicle doors is opened while the system is still locked, the controller will activate the vehicle alarm for a few seconds, thereafter send an SMS notification to the owner. The system automatically unlocks as soon as the proximity detector is within the detection zone. The contribution of this paper, as compared to other similar work, is to reinforce the electronic implementation of IDS.展开更多
There is a problem of unfairness in allocation of radio resources among heterogeneous mobile terminals in heterogeneous wireless networks. Low-capability mobile terminals (such as single-mode terminals) suffer high ca...There is a problem of unfairness in allocation of radio resources among heterogeneous mobile terminals in heterogeneous wireless networks. Low-capability mobile terminals (such as single-mode terminals) suffer high call blocking probability whereas high-capability mobile terminals (such as quad-mode terminals) experience very low call blocking probability, in the same heterogeneous wireless network. This paper proposes a Terminal-Modality-Based Joint Call Admission Control (TJCAC) algorithm to reduce this problem of unfairness. The proposed TJCAC algorithm makes call admission decisions based on mobile terminal modality (capability), network load, and radio access technology (RAT) terminal support index. The objectives of the proposed TJCAC algorithm are to reduce call blocking/dropping probability, and ensure fairness in allocation of radio resources among heterogeneous mobile terminals in heterogeneous networks. An analytical model is developed to evaluate the performance of the proposed TJCAC scheme in terms of call blocking/dropping probability in a heterogeneous wireless network. The performance of the proposed TJCAC algorithm is compared with that of other JCAC algorithms. Results show that the proposed algorithm reduces call blocking/dropping probability in the networks, and ensure fairness in allocation of radio resources among heterogeneous terminals.展开更多
In this paper, aerodynamic actuation characteristics of radio-frequency(RF) discharge plasma are studied and a method is proposed for shock wave control based on RF discharge. Under the static condition, a RF diffuse ...In this paper, aerodynamic actuation characteristics of radio-frequency(RF) discharge plasma are studied and a method is proposed for shock wave control based on RF discharge. Under the static condition, a RF diffuse glow discharge can be observed; under the supersonic inflow, the plasma is blown downstream but remains continuous and stable.Time-resolved schlieren is used for flow field visualization. It is found that RF discharge not only leads to continuous energy deposition on the electrode surface but also induces a compression wave. Under the supersonic inflow condition, a weak oblique shock wave is induced by discharge. Experimental results of the shock wave control indicate that the applied actuation can disperse the bottom structure of the ramp-induced oblique shock wave, which is also observed in the extracted shock wave structure after image processing. More importantly, this control effect can be maintained steadily due to the continuous high-frequency(MHz) discharge. Finally, correlations for schlieren images and numerical simulations are employed to further explore the flow control mechanism. It is observed that the vortex in the boundary layer increases after the application of actuation, meaning that the boundary layer in the downstream of the actuation position is thickened. This is equivalent to covering a layer of low-density smooth wall around the compression corner and on the ramp surface, thereby weakening the compressibility at the compression corner. Our results demonstrate the ability of RF plasma aerodynamic actuation to control the supersonic airflow.展开更多
铁路无线电监测是监测和排查无线电干扰、维护铁路无线电波秩序、保障铁路运行效率和运输安全、支撑铁路无线电管理的关键技术手段。通过对铁路无线电监测需求进行分析,提出一种集云计算、云存储、数据治理、海量数据挖掘、应用定制于...铁路无线电监测是监测和排查无线电干扰、维护铁路无线电波秩序、保障铁路运行效率和运输安全、支撑铁路无线电管理的关键技术手段。通过对铁路无线电监测需求进行分析,提出一种集云计算、云存储、数据治理、海量数据挖掘、应用定制于一体的铁路无线电监测系统管控分析平台解决方案。该方案拟通过构建以国家铁路局无线电监测中心和各监管局中心(路局中心)为核心,以车站为边缘节点的三级系统架构,实现监测数据的统一管理和有效共享,并结合地理信息系统(Geographic Information System,GIS)数据关联技术,可视化显示铁路线路、铁路台站分布、信号分布、干扰提示等信息。该平台可有效促进监测数据在频率管理、事中事后监管、行政处理等无线电管理工作中的应用,提升铁路无线电应急处置和快速响应能力。展开更多
One of the challenging tasks in cognitive radio(CR) networks is to agree on a common control channel to exchange control information. This paper presents a novel medium access control(MAC) protocol for CR network whic...One of the challenging tasks in cognitive radio(CR) networks is to agree on a common control channel to exchange control information. This paper presents a novel medium access control(MAC) protocol for CR network which efficiently and intelligently establishes a common control channel between CR nodes. The proposed protocol is the first CR MAC protocol which is hybrid in nature and lies between global common control channel(GCCC) and non-GCCC family of MAC protocols. The dynamic nature of the protocol makes the CR nodes converge on a newly found control channel quicker whenever the interference from a licensed user is sensed. The analytical results show that the dynamic, hybrid and adaptive nature of proposed protocol yields higher throughputs when compared with other CR MAC protocols.展开更多
The scarcity of bandwidth in the radio spectrum has become more vital since the demand for more and more wireless applications has increased. Most of the spectrum bands have been allocated although many studies have s...The scarcity of bandwidth in the radio spectrum has become more vital since the demand for more and more wireless applications has increased. Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time. The problem of unavailability of spectrum and inefficiency in its utilization has been smartly addressed by the cognitive radio (CR) technology which is an opportunistic network that senses the environment, observes the network changes, and then uses knowledge gained from the prior interaction with the network to make intelligent decisions by dynamically adapting their transmission characteristics. In this paper, some of the decentralized adaptive medium access control (MAC) protocols for CR networks have been critically analyzed, and a novel adaptive MAC protocol for CR networks, decentralized non-global MAC (DNG-MAC), has been proposed. The results show the DNG-MAC outperforms other CR-MAC protocols in terms of time and energy efficiency.展开更多
文摘The working principle of radio remote controlling of construction machinery should be that signals of the radio wave from the transmitter obtained in the receiver were controlled and then changed into electronic analog or digital signals which can be used to drive different actuators and mechanisms of the vehicle.The vehicle could be acted by following the controlling instructions sent by the operator.The best operation mode of construction machinery is suitable not only to manual operating but also to remote controlling in the same vehicle.The design methods of the hydraulic system used for the radio remote controlling of construction machinery are discussed.The design methods of hydraulic circuits for the actuators controlled by solenoid on-off type valves,hydro-electronic multi-way proportional valves,closed loop proportional servo driver or three-way proportional reducing valves are discussed in detail (with real example).The design methods of the power shift transmission of electro-hydraulic controlling,the devices of braking and the directional streering are discussed in this paper.
基金supported by the National Natural Science Foundation of China (61073183)the Natural Science Foundation for the Youth of Heilongjiang Province (QC2012C070)
文摘In order to avoid the system performance deterioration caused by the wireless fading channel and imperfect channel estimation in cognitive radio networks, the spectrum sharing problem with the consideration of feedback control information from the primary user is analyzed. An improved spectrum sharing algorithm based on the combination of the feedback control information and the optimization algorithm is proposed. The relaxation method is used to achieve the approximate spectrum sharing model, and the spectrum sharing strategy that satisfies the individual outage probability constraints can be obtained iteratively with the observed outage probability. Simulation results show that the proposed spectrum sharing algorithm can achieve the spectrum sharing strategy that satisfies the outage probability constraints and reduce the average outage probability without causing maximum transmission rate reduction of the secondary user.
文摘The basic theory and principle of the artificial Controlled Source Radio Magneto Telluric(CSRMT) method is studied and a novel CSRMT transmitter in kH z frequency band is designed. The specific circuit and measured results of some key modules in transmitter are presented, and some outdoor experimental tests have been carried out, which shows that the completed prototype of transmitter can generate a continuous sine current with frequency up to 35.33 k Hz, peak-to-peak amplitude up to 40 A, and realize a reliable transmitting mode with multi-frequency and high-current. The transmitter has a wide operating band, large magnetic moment and high waveform fidelity, and can meet the requirements of shallow geological exploration with high-resolution.
基金Supported by the High-Tech Research and Development Program (863 Program) of China (No. 2009AA011801 and 2009AA012002)the National Fundamental Research Program of China (No. A1420080150)+3 种基金the National Basic Research Program (973 Program) of China (No. 2009CB320405)National Grand Special Science and Technology Project of China (No. 2008ZX03005-001, No. 2009ZX03007-004, No. 2009ZX03005-002, No. 2009ZX 03005-004, No. 2010ZX03006-002-02)the Foundation Project of National Key Laboratory of Science and Technology on Communications (No. 9140C0202061004)Special Project on Broadband Wireless Access sponsored by Huawei co., ltd
文摘The secondary usage of spectrum has been investigated in Cognitive Radio(CR) network to resolving the spectrum scarcity issue in wireless communication.When Primary Users(PU) who own the spectrum appear,spectrum handoff is needed to maintain the communications of Secondary Users.But the decision making of spectrum handoff is a challenge issue for CR network,because the input of decision making,which obtain through spectrum sensing,is heterogeneous and inexact.In this paper we will use fuzzy logic control theory to solve this issue and make use of new information for handoff operation:the probability of PU's occupancy at a certain channel.Our new algorithm can make more intelligent decision compared to simple traditional spectrum handoff decision making and reduce the probability of spectrum handoff,also the performance of SU's communication can be enhanced.
文摘Transmission Control Protocol (TCP) is the most important transport layer protocol being used nowadays. It suffers from many problems over mobile networks especially over Cognitive Radio (CR). CR is one of the latest mobile technologies that brings its own share of problems for TCP. The buffer overflow for CR secondary network relay node can affect the performance of TCP. The contribution of this paper is the novel cross-layer model being used to evaluate the effect of the TCP congestion control on the secondary relay node buffer size in Cognitive Radio Network (CRN). The performance has been assessed by buffer overflow probability.
基金the National Natural Science Foundation of China(Nos.61172067 and 61371086)the National High Technology Research and Development Program(863)of China(No.2014AA01A701)
文摘This paper considers a price-based power control problem in the cognitive radio networks(CRNs).The primary user(PU) can admit secondary users(SUs) to access if their interference powers are all under the interference power constraint. In order to access the spectrum, the SUs need to pay for their interference power.The PU first decides the price for each SU to maximize its revenue. Then, each SU controls its transmit power to maximize its revenue based on a non-cooperative game. The interaction between the PU and the SUs is modeled as a Stackelberg game. Using the backward induction, a revenue function of the PU is expressed as a non-convex function of the transmit power of the SUs. To find the optimal price for the PU, we rewrite the revenue maximization problem of the PU as a monotone optimization by variable substitution. Based on the monotone optimization, a novel price-based power control algorithm is proposed. Simulation results show the convergence and the effectiveness of the proposed algorithm compared to the non-uniform pricing algorithm.
文摘Malicious activities or policy violations have been a concern for the past years. For example, many people have been victims of robbery on vehicles. A conceptual diagram of an Intrusion Detection System (IDS) [1] [2] for vehicles with remote signaling using an Arduino controller and radio-frequency technology is proposed in this paper. To address malicious activities on vehicles, two aspects are considered here, namely: notifier and detector. Firstly, an object-oriented C module that puts on and off a controller (installed inside the vehicle) and an anti-theft electronic editing that powered using an alternator and supported by a back-up battery are implemented. Secondly, a magnetic intrusion sensor, controlled by a proximity detector using radio-frequency technology, has been installed on each vehicle door. To enable IDS, a user needs to activate the monitoring system when leaving their vehicle. This is done using a remote system. In case the user does not activate the monitoring system while leaving the vehicle, a 5-meter-proximity detector will automatically lock the system and set off the monitoring system whenever the user is outside the detection zone. The detection zone is a 5-meter radius area centered at the controller. Here, monitoring consists of geolocating any intruders within the detection zone. This means, if any of the vehicle doors is opened while the system is still locked, the controller will activate the vehicle alarm for a few seconds, thereafter send an SMS notification to the owner. The system automatically unlocks as soon as the proximity detector is within the detection zone. The contribution of this paper, as compared to other similar work, is to reinforce the electronic implementation of IDS.
文摘There is a problem of unfairness in allocation of radio resources among heterogeneous mobile terminals in heterogeneous wireless networks. Low-capability mobile terminals (such as single-mode terminals) suffer high call blocking probability whereas high-capability mobile terminals (such as quad-mode terminals) experience very low call blocking probability, in the same heterogeneous wireless network. This paper proposes a Terminal-Modality-Based Joint Call Admission Control (TJCAC) algorithm to reduce this problem of unfairness. The proposed TJCAC algorithm makes call admission decisions based on mobile terminal modality (capability), network load, and radio access technology (RAT) terminal support index. The objectives of the proposed TJCAC algorithm are to reduce call blocking/dropping probability, and ensure fairness in allocation of radio resources among heterogeneous mobile terminals in heterogeneous networks. An analytical model is developed to evaluate the performance of the proposed TJCAC scheme in terms of call blocking/dropping probability in a heterogeneous wireless network. The performance of the proposed TJCAC algorithm is compared with that of other JCAC algorithms. Results show that the proposed algorithm reduces call blocking/dropping probability in the networks, and ensure fairness in allocation of radio resources among heterogeneous terminals.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.11472306,51407197,and 51507187)
文摘In this paper, aerodynamic actuation characteristics of radio-frequency(RF) discharge plasma are studied and a method is proposed for shock wave control based on RF discharge. Under the static condition, a RF diffuse glow discharge can be observed; under the supersonic inflow, the plasma is blown downstream but remains continuous and stable.Time-resolved schlieren is used for flow field visualization. It is found that RF discharge not only leads to continuous energy deposition on the electrode surface but also induces a compression wave. Under the supersonic inflow condition, a weak oblique shock wave is induced by discharge. Experimental results of the shock wave control indicate that the applied actuation can disperse the bottom structure of the ramp-induced oblique shock wave, which is also observed in the extracted shock wave structure after image processing. More importantly, this control effect can be maintained steadily due to the continuous high-frequency(MHz) discharge. Finally, correlations for schlieren images and numerical simulations are employed to further explore the flow control mechanism. It is observed that the vortex in the boundary layer increases after the application of actuation, meaning that the boundary layer in the downstream of the actuation position is thickened. This is equivalent to covering a layer of low-density smooth wall around the compression corner and on the ramp surface, thereby weakening the compressibility at the compression corner. Our results demonstrate the ability of RF plasma aerodynamic actuation to control the supersonic airflow.
文摘铁路无线电监测是监测和排查无线电干扰、维护铁路无线电波秩序、保障铁路运行效率和运输安全、支撑铁路无线电管理的关键技术手段。通过对铁路无线电监测需求进行分析,提出一种集云计算、云存储、数据治理、海量数据挖掘、应用定制于一体的铁路无线电监测系统管控分析平台解决方案。该方案拟通过构建以国家铁路局无线电监测中心和各监管局中心(路局中心)为核心,以车站为边缘节点的三级系统架构,实现监测数据的统一管理和有效共享,并结合地理信息系统(Geographic Information System,GIS)数据关联技术,可视化显示铁路线路、铁路台站分布、信号分布、干扰提示等信息。该平台可有效促进监测数据在频率管理、事中事后监管、行政处理等无线电管理工作中的应用,提升铁路无线电应急处置和快速响应能力。
文摘One of the challenging tasks in cognitive radio(CR) networks is to agree on a common control channel to exchange control information. This paper presents a novel medium access control(MAC) protocol for CR network which efficiently and intelligently establishes a common control channel between CR nodes. The proposed protocol is the first CR MAC protocol which is hybrid in nature and lies between global common control channel(GCCC) and non-GCCC family of MAC protocols. The dynamic nature of the protocol makes the CR nodes converge on a newly found control channel quicker whenever the interference from a licensed user is sensed. The analytical results show that the dynamic, hybrid and adaptive nature of proposed protocol yields higher throughputs when compared with other CR MAC protocols.
文摘The scarcity of bandwidth in the radio spectrum has become more vital since the demand for more and more wireless applications has increased. Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time. The problem of unavailability of spectrum and inefficiency in its utilization has been smartly addressed by the cognitive radio (CR) technology which is an opportunistic network that senses the environment, observes the network changes, and then uses knowledge gained from the prior interaction with the network to make intelligent decisions by dynamically adapting their transmission characteristics. In this paper, some of the decentralized adaptive medium access control (MAC) protocols for CR networks have been critically analyzed, and a novel adaptive MAC protocol for CR networks, decentralized non-global MAC (DNG-MAC), has been proposed. The results show the DNG-MAC outperforms other CR-MAC protocols in terms of time and energy efficiency.