An automobile test controlling and managing system with computer network is introduced. The architecture of the local network, hardware structure, software structure, design of the test process, and error tolerating r...An automobile test controlling and managing system with computer network is introduced. The architecture of the local network, hardware structure, software structure, design of the test process, and error tolerating redundant design in work position substituting are presented. At last, the pivotal questions solved are discussed. With an advanced structure, this system is multi functional and flexible. Furthermore, advanced computer technology is adopted to improve its technical degree.展开更多
Underwater Acoustic Sensor Network(UASN) has attracted significant attention because of its great influence on ocean exploration and monitoring. On account of the unique characteristics of underwater environment, loca...Underwater Acoustic Sensor Network(UASN) has attracted significant attention because of its great influence on ocean exploration and monitoring. On account of the unique characteristics of underwater environment, localization, as one of the fundamental tasks in UASNs, is a more challenging work than in terrestrial sensor networks. A survey of the ranging algorithms and the network architectures varied with different applications in UASNs is provided in this paper. Algorithms used to estimate the coordinates of the UASNs nodes are classified into two categories: rangebased and range-free. In addition, we analyze the architectures of UASNs based on different applications, and compare their performances from the aspects of communication cost, accuracy, coverage and so on. Open research issues which would affect the accuracy of localization are also discussed, including MAC protocols, sound speed and time synchronization.展开更多
This paper discusses a transport protocol and its formal description techniques for local network. The transport layer function, the transport services and a transport protocol design in a local network architecture m...This paper discusses a transport protocol and its formal description techniques for local network. The transport layer function, the transport services and a transport protocol design in a local network architecture model are presented. A transport protocol specification using the finite state automata (FSA) is given. The correctness of the protocol is verified by using the reachability tree technique with respect to the protocol properties of completeness, deadlock and livelock freeness, termination and reachability.展开更多
Underwater sensor network can achieve the unmanned environmental monitoring and military monitoring missions.Underwater acoustic sensor node cannot rely on the GPS to position itself,and the traditional indirect posit...Underwater sensor network can achieve the unmanned environmental monitoring and military monitoring missions.Underwater acoustic sensor node cannot rely on the GPS to position itself,and the traditional indirect positioning methods used in Ad Hoc networks are not fully applicable to the localization of underwater acoustic sensor networks.In this paper,we introduce an improved underwater acoustic network localization algorithm.The algorithm processes the raw data before localization calculation to enhance the tolerance of random noise.We reduce the redundancy of the calculation results by using a more accurate basic algorithm and an adjusted calculation strategy.The improved algorithm is more suitable for the underwater acoustic sensor network positioning.展开更多
A method of transmission and monitoring in local area network(LAN) for the welding seam video information of binocular vision welding robot is proposed.This paper uses MPEG-4 video CODEC functions of DivX,video for Wi...A method of transmission and monitoring in local area network(LAN) for the welding seam video information of binocular vision welding robot is proposed.This paper uses MPEG-4 video CODEC functions of DivX,video for Windows(VFW) video capture technology,multi-threaded network communication idea and WinSock Socket in Visual C++ 6.0.In the end,client/server(C/S) communication model based on TCP/IP protocol has been developed.Experimental results show that the method can achieve the multiple welding seam video's real-time transmission in LAN.Moreover,the Canny operator is used to realize the edge feature extraction of the seam image which is captured by the client,so that the edge of the seam extracted is continuous and clear.展开更多
This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries l...This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries launch deauthentication flood attacks cutting users' connection, the connection managers will automatically research the last access point's extended service set identifier (ESSID) and then re-establish connection. However, such re-connection can lead the users to a fake access point with the same ESSID set by attackers. As the attackers hide behind users' access points, they can pass AL's authentication and security schemes, e.g. secure socket layer (SSL). We have proved that they can even spy on users' account details, passwords, data and privacy.展开更多
In order to overcome the system non-linearity and uncertainty inherent in magnetic bearing systems, a GA(genetic algnrithm)-based PID neural network controller is designed and trained tO emulate the operation of a c...In order to overcome the system non-linearity and uncertainty inherent in magnetic bearing systems, a GA(genetic algnrithm)-based PID neural network controller is designed and trained tO emulate the operation of a complete system (magnetic bearing, controller, and power amplifiers). The feasibility of using a neural network to control nonlinear magnetic bearing systems with unknown dynamics is demonstrated. The key concept of the control scheme is to use GA to evaluate the candidate solutions (chromosomes), increase the generalization ability of PID neural network and avoid suffering from the local minima problem in network learning due to the use of gradient descent learning method. The simulation results show that the proposed architecture provides well robust performance and better reinforcement learning capability in controlling magnetic bearing systems.展开更多
Through the Three Gorges well network, we examine different coseismic changes in water temperature caused by local earthquakes since 2008, and offer a mechanistic explanation.The relations between the coseismic change...Through the Three Gorges well network, we examine different coseismic changes in water temperature caused by local earthquakes since 2008, and offer a mechanistic explanation.The relations between the coseismic changes in water temperature and the parameters of distant and local earthquakes are deduced.展开更多
A dist ributed optimal local double loop (DOLDL) network is presented. Emphasis is laid on the topology and distributed routing algorithms for the DOLDL. On the basis of building an abstract model, a set of definition...A dist ributed optimal local double loop (DOLDL) network is presented. Emphasis is laid on the topology and distributed routing algorithms for the DOLDL. On the basis of building an abstract model, a set of definitions and theorems are described and proved. An algorithm which can optimize the double loop networks is presented. The optimal values of the topologic parameters for the DOLDL have been obtained by the algorithm, and these numerical results are analyzed. The study shows that the bounds of the optimal diameter d and average hop distance a for this class of networks are [3N- 2]≤d≤[3N ] and (5N/9 (N-1))-(3N -1.8)<a<(5N/9(N-1)) (3N -0.9),respectively (N is the number of nodes in the network ). A class of the distributed routing algorithms for the DOLDL and the implementation procedure of an adaptive fault-tolerant algorithm are proposed and analyzed. The correctness of the algorithm has also been verified by simulating.展开更多
In this paper, a local model network H-infinity control is proposed for CE-150 helicopter stabilization. The proposed strategy capitalizes on recent developments on H-infinity control and its promising results in robu...In this paper, a local model network H-infinity control is proposed for CE-150 helicopter stabilization. The proposed strategy capitalizes on recent developments on H-infinity control and its promising results in robust stabilization of plants under unstructured uncertainties. CE-150 helicopters are known for their varying operating conditions along with external disturbances. Therefore, local model networks are introduced for their adaptive feature and since they provide a powerful combination of fuzzy logic and conventional linear control techniques to control nonlinear systems without the added computational burden of soft-computing techniques. Using the fact that the system can be linearized at different operating points, a mixed sensitivity H-infinity controller is designed for the linearized system, and combined within a network to make transitions between them. The proposed control structure ensures robustness, decoupling of the system dynamics while achieving good performance. A comparison is carried-out against the well-known proportional-integral-derivative (PID) control technique. Results are presented to illustrate the controller's performance in various operating conditions.展开更多
The detectability and reliability analysis for the local seismic network is performed employing by Bungum and Husebye technique. The events were relocated using standard computer codes for hypocentral locations. The d...The detectability and reliability analysis for the local seismic network is performed employing by Bungum and Husebye technique. The events were relocated using standard computer codes for hypocentral locations. The detectability levels are estimated from the twenty-five years of recorded data in terms of 50%, 90% and 100% cumulative detectability thresholds, which were derived from frequency-magnitude distribution. From this analysis the 100% level of detectability of the network is M L=1.7 for events which occur within the network. The accuracy in hypocentral solutions of the network is investigated by considering the fixed real hypocenter within the network. The epicentral errors are found to be less than 4 km when the events occur within the network. Finally, the problems faced during continuous operation of the local network, which effects its detectability, are discussed.展开更多
This paper presents a structured methodology for local network design engineering (SMLNDE). A complex and fuzzy project for local network design can be decomposed into a set of simple and particular activities using t...This paper presents a structured methodology for local network design engineering (SMLNDE). A complex and fuzzy project for local network design can be decomposed into a set of simple and particular activities using the SMLNDE. The SMLNDE allows rigorous requirements definition and permits the exhaustive consideration of the large number of factors influencing local network design engineering. The complete and clear design documentations and an optimal design can also be provided by the methodology. The SMLNDE has been implemented using the structured analysis and design technique. The study shows that the SMLNDE is an effective design methodology for the large and complex local networks.展开更多
The ability to estimate earthquake source locations,along with the appraisal of relevant uncertainties,is paramount in monitoring both natural and human-induced micro-seismicity.For this purpose,a monitoring network m...The ability to estimate earthquake source locations,along with the appraisal of relevant uncertainties,is paramount in monitoring both natural and human-induced micro-seismicity.For this purpose,a monitoring network must be designed to minimize the location errors introduced by geometrically unbalanced networks.In this study,we first review different sources of errors relevant to the localization of seismic events,how they propagate through localization algorithms,and their impact on outcomes.We then propose a quantitative method,based on a Monte Carlo approach,to estimate the uncertainty in earthquake locations that is suited to the design,optimization,and assessment of the performance of a local seismic monitoring network.To illustrate the performance of the proposed approach,we analyzed the distribution of the localization uncertainties and their related dispersion for a highly dense grid of theoretical hypocenters in both the horizontal and vertical directions using an actual monitoring network layout.The results expand,quantitatively,the qualitative indications derived from purely geometrical parameters(azimuthal gap(AG))and classical detectability maps.The proposed method enables the systematic design,optimization,and evaluation of local seismic monitoring networks,enhancing monitoring accuracy in areas proximal to hydrocarbon production,geothermal fields,underground natural gas storage,and other subsurface activities.This approach aids in the accurate estimation of earthquake source locations and their associated uncertainties,which are crucial for assessing and mitigating seismic risks,thereby enabling the implementation of proactive measures to minimize potential hazards.From an operational perspective,reliably estimating location accuracy is crucial for evaluating the position of seismogenic sources and assessing possible links between well activities and the onset of seismicity.展开更多
The network coding is a new technology in the field of information in 21st century. It could enhance the network throughput and save the energy consumption, and is mainly based on the single transmission rate. However...The network coding is a new technology in the field of information in 21st century. It could enhance the network throughput and save the energy consumption, and is mainly based on the single transmission rate. However, with the development of wireless network and equipment, wireless local network MAC protocols have already supported the multi-rate transmission. This paper investigates the optimal relay selection problem based on network coding. Firstly, the problem is formulated as an optimization problem. Moreover, a relay algorithm based on network coding is proposed and the transmission time gain of our algorithm over the traditional relay algorithm is analyzed. Lastly, we compare total transmission time and the energy consumption of our proposed algorithm, Network Coding with Relay Assistance (NCRA), Transmission Request (TR), and the Direct Transmission (DT) without relay algorithm by adopting IEEE 802.11b. The simulation results demonstrate that our algorithm that improves the coding opportunity by the cooperation of the relay nodes leads to the transmission time decrease of up to 17% over the traditional relay algorithms.展开更多
A new method that is applicable to local seismic networks to estimate the azimuth and slowness of teleseismic signals is introduced in the paper. The method is based on the correlation between the arrival times and st...A new method that is applicable to local seismic networks to estimate the azimuth and slowness of teleseismic signals is introduced in the paper. The method is based on the correlation between the arrival times and station positions. The analyzed results indicate that the azimuth and slowness of teleseismic signals can be accurately estimated by the method. Average errors for azimuth and slowness measurements obtained by this method using data of Xian Digital Telemetry Seismic Network are 2.0?and 0.34 s/(?, respectively. The conclusions drawn from this study indicate that this method may be very useful to interpret teleseismic records of local seismic networks.展开更多
This paper introduces a novel robot for outer surface inspection of boiler tubes. The paper describes the hardware system, wireless communication strategy, communication procedure and system software of the robot. The...This paper introduces a novel robot for outer surface inspection of boiler tubes. The paper describes the hardware system, wireless communication strategy, communication procedure and system software of the robot. The WLAN technology is used in the robot. It solves the problem of shielding generated by iron boiler and 11Mbps bandwidth made it possible for video and control stream real-time transmit within the same channel. Though TCP/IP protocol is robust, serial server is a transparent channel but cannot detect error and retransmit the data. In order to improve the reliability of serial communication, a new communication protocol is proposed. Key words boiler tubes - mobile robotics - wireless local area network Project Supported by the National High-Tech Program (Grant No. 2002AA420080)展开更多
A distibuted optimal local double loop(DOLDL) network is presented. Emphasis is laid on the topology and distributed routing algorithms for the DOLDL. On the basis of building an abstract model, a set of definitions a...A distibuted optimal local double loop(DOLDL) network is presented. Emphasis is laid on the topology and distributed routing algorithms for the DOLDL. On the basis of building an abstract model, a set of definitions and theorems are described and proved. An algorithm which can optimize the double loop networks is presented. The optimal values of the topologic parameters for the DOLDL have been obtained by the algorithm, and these numerical results are analyzed. The study shows that the bounds of the optimal diameter (d) and average hop distance (a) for this class of networks are [square-root 3N -2] less-than-or-equal-to d less-than-or-equal-to [square-root 3N+1] and (5N/9(N-1)) (square-root 3N-1.8) < a < (5N/9 (N-1)). (square-root 3N - 0.23), respectively (N is the number of nodes in the network. (3 less-than-or-equal-to N less-than-or-equal-to 10(4)). A class of the distributed routing algorithms for the DOLDL and the implementation procedure of an adaptive fault-tolerant algorithm are proposed. The correctness of the algorithm has been also verified by simulating.展开更多
IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local ...IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local area network(WLAN)through radio waves,its communication is exposed to the possibility of being attacked by illegitimate users.Moreover,the security design of the wireless structure is vulnerable to versatile attacks.For example,the attacker can imitate genuine features,rendering classificationbased methods inaccurate in differentiating between real and false messages.Althoughmany security standards have been proposed over the last decades to overcome many wireless network attacks,effectively detecting such attacks is crucial in today’s real-world applications.This paper presents a novel resource exhaustion attack detection scheme(READS)to detect resource exhaustion attacks effectively.The proposed scheme can differentiate between the genuine and fake management frames in the early stages of the attack such that access points can effectively mitigate the consequences of the attack.The scheme is built through learning from clustered samples using artificial neural networks to identify the genuine and rogue resource exhaustion management frames effectively and efficiently in theWLAN.The proposed scheme consists of four modules whichmake it capable to alleviates the attack impact more effectively than the related work.The experimental results show the effectiveness of the proposed technique by gaining an 89.11%improvement compared to the existing works in terms of detection.展开更多
The concept and the characteristic of spread spectrum technology of knowledge network based on information integration environment are given at first. And the basic principle of the wireless network of knowledge and i...The concept and the characteristic of spread spectrum technology of knowledge network based on information integration environment are given at first. And the basic principle of the wireless network of knowledge and information is recommended. Then a project alternatives using the spread spectrum technology and wireless network is given to build a across-the abroad knowledge network system.展开更多
This paper sets up a mathematical model of switching network and switching function by utilizing graph theory to describe the logical function of different paths.The function varies with open and closed states of air ...This paper sets up a mathematical model of switching network and switching function by utilizing graph theory to describe the logical function of different paths.The function varies with open and closed states of air doors in a complex mine air sub network, and the computer program for solving the switching function of complex networks are offered. It gives the method for discriminating a reversible branch in a complex network by means of the switching function, and the method of counter inverted logical control of airflow inversion by means of open and short circuit conversion of key branches. The research has solved the problem of the stablization of air flow for normal ventination and reversing ventination in a diagonal network.展开更多
文摘An automobile test controlling and managing system with computer network is introduced. The architecture of the local network, hardware structure, software structure, design of the test process, and error tolerating redundant design in work position substituting are presented. At last, the pivotal questions solved are discussed. With an advanced structure, this system is multi functional and flexible. Furthermore, advanced computer technology is adopted to improve its technical degree.
基金supported by National Natural Science Foundation of China under Grants 61001067,61371093and 61172105Natural Science Foundation of Zhejiang Prov.China under Grants LY13D060001
文摘Underwater Acoustic Sensor Network(UASN) has attracted significant attention because of its great influence on ocean exploration and monitoring. On account of the unique characteristics of underwater environment, localization, as one of the fundamental tasks in UASNs, is a more challenging work than in terrestrial sensor networks. A survey of the ranging algorithms and the network architectures varied with different applications in UASNs is provided in this paper. Algorithms used to estimate the coordinates of the UASNs nodes are classified into two categories: rangebased and range-free. In addition, we analyze the architectures of UASNs based on different applications, and compare their performances from the aspects of communication cost, accuracy, coverage and so on. Open research issues which would affect the accuracy of localization are also discussed, including MAC protocols, sound speed and time synchronization.
文摘This paper discusses a transport protocol and its formal description techniques for local network. The transport layer function, the transport services and a transport protocol design in a local network architecture model are presented. A transport protocol specification using the finite state automata (FSA) is given. The correctness of the protocol is verified by using the reachability tree technique with respect to the protocol properties of completeness, deadlock and livelock freeness, termination and reachability.
基金performed in the Project "The Research of Cluster Structure Based Underwater Acoustic Communication Network Topology Algorithm"supported by National Natural Science Foundation of China(No.61101164)
文摘Underwater sensor network can achieve the unmanned environmental monitoring and military monitoring missions.Underwater acoustic sensor node cannot rely on the GPS to position itself,and the traditional indirect positioning methods used in Ad Hoc networks are not fully applicable to the localization of underwater acoustic sensor networks.In this paper,we introduce an improved underwater acoustic network localization algorithm.The algorithm processes the raw data before localization calculation to enhance the tolerance of random noise.We reduce the redundancy of the calculation results by using a more accurate basic algorithm and an adjusted calculation strategy.The improved algorithm is more suitable for the underwater acoustic sensor network positioning.
基金the National Natural Science Foundation of China (No.61165008)the Natural Science Foundation of Jiangxi Province (No.20114BAB206004)the Project of Jiangxi Provincial Education Department(No.GJJ12038)
文摘A method of transmission and monitoring in local area network(LAN) for the welding seam video information of binocular vision welding robot is proposed.This paper uses MPEG-4 video CODEC functions of DivX,video for Windows(VFW) video capture technology,multi-threaded network communication idea and WinSock Socket in Visual C++ 6.0.In the end,client/server(C/S) communication model based on TCP/IP protocol has been developed.Experimental results show that the method can achieve the multiple welding seam video's real-time transmission in LAN.Moreover,the Canny operator is used to realize the edge feature extraction of the seam image which is captured by the client,so that the edge of the seam extracted is continuous and clear.
基金the National Science Council (No. NSC-99-2219-E-033-001)the Foundation of the Chung Yuan Christian University (1004) (No. CYCU-EECS.9801)
文摘This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries launch deauthentication flood attacks cutting users' connection, the connection managers will automatically research the last access point's extended service set identifier (ESSID) and then re-establish connection. However, such re-connection can lead the users to a fake access point with the same ESSID set by attackers. As the attackers hide behind users' access points, they can pass AL's authentication and security schemes, e.g. secure socket layer (SSL). We have proved that they can even spy on users' account details, passwords, data and privacy.
基金This project is supported by National Natural Science Foundation of China (No. 5880203).
文摘In order to overcome the system non-linearity and uncertainty inherent in magnetic bearing systems, a GA(genetic algnrithm)-based PID neural network controller is designed and trained tO emulate the operation of a complete system (magnetic bearing, controller, and power amplifiers). The feasibility of using a neural network to control nonlinear magnetic bearing systems with unknown dynamics is demonstrated. The key concept of the control scheme is to use GA to evaluate the candidate solutions (chromosomes), increase the generalization ability of PID neural network and avoid suffering from the local minima problem in network learning due to the use of gradient descent learning method. The simulation results show that the proposed architecture provides well robust performance and better reinforcement learning capability in controlling magnetic bearing systems.
基金supported by the China Three Gorges Corporation Research Fund (SXSN/3354)
文摘Through the Three Gorges well network, we examine different coseismic changes in water temperature caused by local earthquakes since 2008, and offer a mechanistic explanation.The relations between the coseismic changes in water temperature and the parameters of distant and local earthquakes are deduced.
文摘A dist ributed optimal local double loop (DOLDL) network is presented. Emphasis is laid on the topology and distributed routing algorithms for the DOLDL. On the basis of building an abstract model, a set of definitions and theorems are described and proved. An algorithm which can optimize the double loop networks is presented. The optimal values of the topologic parameters for the DOLDL have been obtained by the algorithm, and these numerical results are analyzed. The study shows that the bounds of the optimal diameter d and average hop distance a for this class of networks are [3N- 2]≤d≤[3N ] and (5N/9 (N-1))-(3N -1.8)<a<(5N/9(N-1)) (3N -0.9),respectively (N is the number of nodes in the network ). A class of the distributed routing algorithms for the DOLDL and the implementation procedure of an adaptive fault-tolerant algorithm are proposed and analyzed. The correctness of the algorithm has also been verified by simulating.
文摘In this paper, a local model network H-infinity control is proposed for CE-150 helicopter stabilization. The proposed strategy capitalizes on recent developments on H-infinity control and its promising results in robust stabilization of plants under unstructured uncertainties. CE-150 helicopters are known for their varying operating conditions along with external disturbances. Therefore, local model networks are introduced for their adaptive feature and since they provide a powerful combination of fuzzy logic and conventional linear control techniques to control nonlinear systems without the added computational burden of soft-computing techniques. Using the fact that the system can be linearized at different operating points, a mixed sensitivity H-infinity controller is designed for the linearized system, and combined within a network to make transitions between them. The proposed control structure ensures robustness, decoupling of the system dynamics while achieving good performance. A comparison is carried-out against the well-known proportional-integral-derivative (PID) control technique. Results are presented to illustrate the controller's performance in various operating conditions.
文摘The detectability and reliability analysis for the local seismic network is performed employing by Bungum and Husebye technique. The events were relocated using standard computer codes for hypocentral locations. The detectability levels are estimated from the twenty-five years of recorded data in terms of 50%, 90% and 100% cumulative detectability thresholds, which were derived from frequency-magnitude distribution. From this analysis the 100% level of detectability of the network is M L=1.7 for events which occur within the network. The accuracy in hypocentral solutions of the network is investigated by considering the fixed real hypocenter within the network. The epicentral errors are found to be less than 4 km when the events occur within the network. Finally, the problems faced during continuous operation of the local network, which effects its detectability, are discussed.
文摘This paper presents a structured methodology for local network design engineering (SMLNDE). A complex and fuzzy project for local network design can be decomposed into a set of simple and particular activities using the SMLNDE. The SMLNDE allows rigorous requirements definition and permits the exhaustive consideration of the large number of factors influencing local network design engineering. The complete and clear design documentations and an optimal design can also be provided by the methodology. The SMLNDE has been implemented using the structured analysis and design technique. The study shows that the SMLNDE is an effective design methodology for the large and complex local networks.
文摘The ability to estimate earthquake source locations,along with the appraisal of relevant uncertainties,is paramount in monitoring both natural and human-induced micro-seismicity.For this purpose,a monitoring network must be designed to minimize the location errors introduced by geometrically unbalanced networks.In this study,we first review different sources of errors relevant to the localization of seismic events,how they propagate through localization algorithms,and their impact on outcomes.We then propose a quantitative method,based on a Monte Carlo approach,to estimate the uncertainty in earthquake locations that is suited to the design,optimization,and assessment of the performance of a local seismic monitoring network.To illustrate the performance of the proposed approach,we analyzed the distribution of the localization uncertainties and their related dispersion for a highly dense grid of theoretical hypocenters in both the horizontal and vertical directions using an actual monitoring network layout.The results expand,quantitatively,the qualitative indications derived from purely geometrical parameters(azimuthal gap(AG))and classical detectability maps.The proposed method enables the systematic design,optimization,and evaluation of local seismic monitoring networks,enhancing monitoring accuracy in areas proximal to hydrocarbon production,geothermal fields,underground natural gas storage,and other subsurface activities.This approach aids in the accurate estimation of earthquake source locations and their associated uncertainties,which are crucial for assessing and mitigating seismic risks,thereby enabling the implementation of proactive measures to minimize potential hazards.From an operational perspective,reliably estimating location accuracy is crucial for evaluating the position of seismogenic sources and assessing possible links between well activities and the onset of seismicity.
基金Supported by Anhui Natural Science Foundation, China(No.1308085MF87, 128085MF89)Open Fund of State Key Laboratory for Novel Software Technology,Nanjing University,China (No.KFKT2011B18)Hefei University of Technology Ph.D. Foundation (No.2010HGBZ-0552)
文摘The network coding is a new technology in the field of information in 21st century. It could enhance the network throughput and save the energy consumption, and is mainly based on the single transmission rate. However, with the development of wireless network and equipment, wireless local network MAC protocols have already supported the multi-rate transmission. This paper investigates the optimal relay selection problem based on network coding. Firstly, the problem is formulated as an optimization problem. Moreover, a relay algorithm based on network coding is proposed and the transmission time gain of our algorithm over the traditional relay algorithm is analyzed. Lastly, we compare total transmission time and the energy consumption of our proposed algorithm, Network Coding with Relay Assistance (NCRA), Transmission Request (TR), and the Direct Transmission (DT) without relay algorithm by adopting IEEE 802.11b. The simulation results demonstrate that our algorithm that improves the coding opportunity by the cooperation of the relay nodes leads to the transmission time decrease of up to 17% over the traditional relay algorithms.
基金Foundation of Verification Researches for Arm Control Technology
文摘A new method that is applicable to local seismic networks to estimate the azimuth and slowness of teleseismic signals is introduced in the paper. The method is based on the correlation between the arrival times and station positions. The analyzed results indicate that the azimuth and slowness of teleseismic signals can be accurately estimated by the method. Average errors for azimuth and slowness measurements obtained by this method using data of Xian Digital Telemetry Seismic Network are 2.0?and 0.34 s/(?, respectively. The conclusions drawn from this study indicate that this method may be very useful to interpret teleseismic records of local seismic networks.
文摘This paper introduces a novel robot for outer surface inspection of boiler tubes. The paper describes the hardware system, wireless communication strategy, communication procedure and system software of the robot. The WLAN technology is used in the robot. It solves the problem of shielding generated by iron boiler and 11Mbps bandwidth made it possible for video and control stream real-time transmit within the same channel. Though TCP/IP protocol is robust, serial server is a transparent channel but cannot detect error and retransmit the data. In order to improve the reliability of serial communication, a new communication protocol is proposed. Key words boiler tubes - mobile robotics - wireless local area network Project Supported by the National High-Tech Program (Grant No. 2002AA420080)
文摘A distibuted optimal local double loop(DOLDL) network is presented. Emphasis is laid on the topology and distributed routing algorithms for the DOLDL. On the basis of building an abstract model, a set of definitions and theorems are described and proved. An algorithm which can optimize the double loop networks is presented. The optimal values of the topologic parameters for the DOLDL have been obtained by the algorithm, and these numerical results are analyzed. The study shows that the bounds of the optimal diameter (d) and average hop distance (a) for this class of networks are [square-root 3N -2] less-than-or-equal-to d less-than-or-equal-to [square-root 3N+1] and (5N/9(N-1)) (square-root 3N-1.8) < a < (5N/9 (N-1)). (square-root 3N - 0.23), respectively (N is the number of nodes in the network. (3 less-than-or-equal-to N less-than-or-equal-to 10(4)). A class of the distributed routing algorithms for the DOLDL and the implementation procedure of an adaptive fault-tolerant algorithm are proposed. The correctness of the algorithm has been also verified by simulating.
基金The manuscript APC is supported by the grant name(UMS No.DFK2005)“Smart Vertical farming Technology for Temperate vegetable cultivation in Sabah:practising smart automation system using IR and AI technology in agriculture 4.0”.
文摘IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local area network(WLAN)through radio waves,its communication is exposed to the possibility of being attacked by illegitimate users.Moreover,the security design of the wireless structure is vulnerable to versatile attacks.For example,the attacker can imitate genuine features,rendering classificationbased methods inaccurate in differentiating between real and false messages.Althoughmany security standards have been proposed over the last decades to overcome many wireless network attacks,effectively detecting such attacks is crucial in today’s real-world applications.This paper presents a novel resource exhaustion attack detection scheme(READS)to detect resource exhaustion attacks effectively.The proposed scheme can differentiate between the genuine and fake management frames in the early stages of the attack such that access points can effectively mitigate the consequences of the attack.The scheme is built through learning from clustered samples using artificial neural networks to identify the genuine and rogue resource exhaustion management frames effectively and efficiently in theWLAN.The proposed scheme consists of four modules whichmake it capable to alleviates the attack impact more effectively than the related work.The experimental results show the effectiveness of the proposed technique by gaining an 89.11%improvement compared to the existing works in terms of detection.
基金This paper is supported by National Natural Science Foundation of China (NSFC) (No. 70472039, 70272023).
文摘The concept and the characteristic of spread spectrum technology of knowledge network based on information integration environment are given at first. And the basic principle of the wireless network of knowledge and information is recommended. Then a project alternatives using the spread spectrum technology and wireless network is given to build a across-the abroad knowledge network system.
文摘This paper sets up a mathematical model of switching network and switching function by utilizing graph theory to describe the logical function of different paths.The function varies with open and closed states of air doors in a complex mine air sub network, and the computer program for solving the switching function of complex networks are offered. It gives the method for discriminating a reversible branch in a complex network by means of the switching function, and the method of counter inverted logical control of airflow inversion by means of open and short circuit conversion of key branches. The research has solved the problem of the stablization of air flow for normal ventination and reversing ventination in a diagonal network.