Traditional air conditioner used to be in local control mode. However, with the development of modern information technology, the control of air conditioner will have to support many more functions. As a first step ...Traditional air conditioner used to be in local control mode. However, with the development of modern information technology, the control of air conditioner will have to support many more functions. As a first step in such a development, we have implemented a remote monitoring system of unitary air conditioners, using the manufacturing message specification (MMS). MMS is an OSI application protocol designed for the remote control and monitoring of real devices. The functions supported are those that an operator would do normally at the console of the unitary air conditioner. Due to the accomplishment of UMCS (Unitary air conditioner MMS Control System), there will be a leap of the application of MMS and the control technology of unitary air conditioner.展开更多
Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert cha...Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert channd's algorithms of the IPv4 and IPv6 are presented, which enable automatic channeling upon IPv4/v6 nodes with non-IPv4-compatible address, and the key transmission is achieved by using this channel in the embedded Internet terminal. The result shows that the covert channel's algorithm, which we implemented if, set correct, the messages of this covert channel might go through the gateway and enter the local area network.展开更多
Supervisory control is a very popular paradigm for computer-controlled systems.Knowledge and tracking the control effect of every control operation is crucial to the control tasks.In the paper,we present a message-arr...Supervisory control is a very popular paradigm for computer-controlled systems.Knowledge and tracking the control effect of every control operation is crucial to the control tasks.In the paper,we present a message-array-based mechanism to track control effects in supervisory control software.A novel data type,message array,is designed to efficiently support this tracking mechanism.The operation algorithms,adding algorithm(AA),removing algorithm(RA),and scheduler algorithm(SA)are proposed to operate the tracking messages in message array,which forms the special first input X output(FIXO)strategy of message array.Automatically tracking,recording,and rolling back are the characteristics of our tracking mechanism.We implement this messagearray-based mechanism on the famous human machine interface(HMI)software platform-proficy iFix,and construct experiments to evaluate the performance of the mechanism in various cases.The results show our mechanism can be well satisfied with supervisory control software.展开更多
The Internet Control Message Protocol(ICMP)covert tunnel refers to a network attack that encapsulates malicious data in the data part of the ICMP protocol for transmission.Its concealment is stronger and it is not eas...The Internet Control Message Protocol(ICMP)covert tunnel refers to a network attack that encapsulates malicious data in the data part of the ICMP protocol for transmission.Its concealment is stronger and it is not easy to be discovered.Most detection methods are detecting the existence of channels instead of clarifying specific attack intentions.In this paper,we propose an ICMP covert tunnel attack intent detection framework ICMPTend,which includes five steps:data collection,feature dictionary construction,data preprocessing,model construction,and attack intent prediction.ICMPTend can detect a variety of attack intentions,such as shell attacks,sensitive directory access,communication protocol traffic theft,filling tunnel reserved words,and other common network attacks.We extract features from five types of attack intent found in ICMP channels.We build a multi-dimensional dictionary of malicious features,including shell attacks,sensitive directory access,communication protocol traffic theft,filling tunnel reserved words,and other common network attack keywords.For the high-dimensional and independent characteristics of ICMP traffic,we use a support vector machine(SVM)as a multi-class classifier.The experimental results show that the average accuracy of ICMPTend is 92%,training ICMPTend only takes 55 s,and the prediction time is only 2 s,which can effectively identify the attack intention of ICMP.展开更多
Time-sensitive networks(TSNs)support not only traditional best-effort communications but also deterministic communications,which send each packet at a deterministic time so that the data transmissions of networked con...Time-sensitive networks(TSNs)support not only traditional best-effort communications but also deterministic communications,which send each packet at a deterministic time so that the data transmissions of networked control systems can be precisely scheduled to guarantee hard real-time constraints.No-wait scheduling is suitable for such TSNs and generates the schedules of deterministic communications with the minimal network resources so that all of the remaining resources can be used to improve the throughput of best-effort communications.However,due to inappropriate message fragmentation,the realtime performance of no-wait scheduling algorithms is reduced.Therefore,in this paper,joint algorithms of message fragmentation and no-wait scheduling are proposed.First,a specification for the joint problem based on optimization modulo theories is proposed so that off-the-shelf solvers can be used to find optimal solutions.Second,to improve the scalability of our algorithm,the worst-case delay of messages is analyzed,and then,based on the analysis,a heuristic algorithm is proposed to construct low-delay schedules.Finally,we conduct extensive test cases to evaluate our proposed algorithms.The evaluation results indicate that,compared to existing algorithms,the proposed joint algorithm improves schedulability by up to 50%.展开更多
Objective: To compare the efficacy of a short messaging service (SMS) text messaging and phone reminder to im-prove attendance rates at a health promotion center. Methods: A total of 1 859 participants who had schedul...Objective: To compare the efficacy of a short messaging service (SMS) text messaging and phone reminder to im-prove attendance rates at a health promotion center. Methods: A total of 1 859 participants who had scheduled appointments in the health promotion center of our hospital from April 2007 to May 2007 were enrolled in the study and randomly assigned into 3 groups: control (no reminder) group,SMS text messaging reminder group and telephone reminder group. Attendance rates and costs of interventions were collected. Results: A total of 1848 participants were eligible for analysis. Attendance rates of control,SMS and telephone groups were 80.5%,87.5% and 88.3%,respectively. The attendance rates were significantly higher in SMS and telephone groups than that in the control group,with odds ratio 1.698,95% confidence interval 1.224 to 2.316,P=0.001 in the SMS group,and odds ratio 1.829,95% confidence interval 1.333 to 2.509,P<0.001 in the telephone group. However,there was no difference between the SMS group and the telephone group (P=0.670). The cost effectiveness analysis showed that the cost per attendance for the SMS group (0.31 Yuan) was significantly lower than that for the telephone group (0.48 Yuan). Conclusion: SMS and telephone are effective reminders for improving attendance rate at a health promotion center. SMS reminder may be more cost-effective compared with the telephone reminder.展开更多
The control and data planes are decoupled in software-defined networking(SDN),which enables both planes to evolve independently,and brings about many advantages such as high flexibility,programmability,and rapid imple...The control and data planes are decoupled in software-defined networking(SDN),which enables both planes to evolve independently,and brings about many advantages such as high flexibility,programmability,and rapid implementation of new network protocols.However,in order to improve the scalability of the control plane at present,some control functionalities are added to the data plane,which is probably to impact on the generality of the data plane.The key challenge of adding control functionalities to the data plane is to strike a careful balance between the generality of the data plane and the scalability of the control plane.We propose some basic principles that both control and data planes should comply with,based on the evolutionary trend of SDN.Moreover,we take two approaches for reference according to the principles,viewed from the control messages in OpenFlow-based SDN.Our evaluations demonstrate that the approaches can maintain the generality of the data plane and improve the scalability of the control plane.展开更多
This paper describes the system modelling, architecture design and implementation of the observatory control system (OCS) of the LAMOST (Large Area Multi-Object Fibre Spectroscopic Telescope). The software-reuse t...This paper describes the system modelling, architecture design and implementation of the observatory control system (OCS) of the LAMOST (Large Area Multi-Object Fibre Spectroscopic Telescope). The software-reuse technique, object-oriented technique, component and framework based software-developing methodology are used in the system architecture and implementation. The architecture of OCS is established based on a component-based layered system using many patterns such as the MVC (Model/View/Controller) and proxy. For the effective and safe exchange of commands and status between OCS and the subsystem, a unified message bus is defined and three protocols, namely a command acceptance/rejection protocol, a command execution feedback protocol and a status handling protocol, are proposed. The interface protocol between all the subsystems is defined. The full utilization of advanced computer technologies including the database, distributed computing, real-time computing, standard data exchange and expert system technologies has benefited the OCS software development.展开更多
Controller area network(CAN) is a widely used fieldbus protocol in various industrial applications.To understand the network behavior under errors for the optimal design of networked control systems, the message respo...Controller area network(CAN) is a widely used fieldbus protocol in various industrial applications.To understand the network behavior under errors for the optimal design of networked control systems, the message response time of the CAN network needs to be analyzed. In this study, a novel delay time distribution analysis method for the response messages is proposed when considering errors. In this method the complex message queues are decomposed into typical message patterns and cases. First, a stochastic fault model is developed, and the probability factor is defined to calculate the error distribution. Then the message delay time distribution for the single slave node configuration is analyzed based on the error distribution. Next, based on the delay time distribution analysis of typical patterns and cases, an analysis framework of message delay time distribution for the master/slave configuration is developed. The testbed is constructed and case studies are conducted to demonstrate the proposed methodology under different network configurations. Experimental results show that the delay time distributions calculated by the proposed method agree well with the actual observations.展开更多
为了提高控制器局域网络(controller area network,CAN)通信的实时性,文章基于时间触发CAN(time-triggered CAN,TTCAN)协议,采用verilog硬件描述语言设计实现TTCAN总线控制器。该控制器可在经典CAN模式与TTCAN模式之间进行切换,同时兼...为了提高控制器局域网络(controller area network,CAN)通信的实时性,文章基于时间触发CAN(time-triggered CAN,TTCAN)协议,采用verilog硬件描述语言设计实现TTCAN总线控制器。该控制器可在经典CAN模式与TTCAN模式之间进行切换,同时兼容可变速率CAN(CAN with flexible data rate,CAN FD)协议下的高速通信。实验结果证明,相较于经典CAN总线控制器,该TTCAN总线控制器能够减少在高总线负载率下周期性报文的发送延时,在全波特率范围内且总线负载率大于等于60%的情况下,能够减少75%以上的CAN报文发送延时。展开更多
文摘Traditional air conditioner used to be in local control mode. However, with the development of modern information technology, the control of air conditioner will have to support many more functions. As a first step in such a development, we have implemented a remote monitoring system of unitary air conditioners, using the manufacturing message specification (MMS). MMS is an OSI application protocol designed for the remote control and monitoring of real devices. The functions supported are those that an operator would do normally at the console of the unitary air conditioner. Due to the accomplishment of UMCS (Unitary air conditioner MMS Control System), there will be a leap of the application of MMS and the control technology of unitary air conditioner.
基金Supported by the National Natural Science Foun-dation of China (90104005 ,66973034)
文摘Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert channd's algorithms of the IPv4 and IPv6 are presented, which enable automatic channeling upon IPv4/v6 nodes with non-IPv4-compatible address, and the key transmission is achieved by using this channel in the embedded Internet terminal. The result shows that the covert channel's algorithm, which we implemented if, set correct, the messages of this covert channel might go through the gateway and enter the local area network.
文摘Supervisory control is a very popular paradigm for computer-controlled systems.Knowledge and tracking the control effect of every control operation is crucial to the control tasks.In the paper,we present a message-array-based mechanism to track control effects in supervisory control software.A novel data type,message array,is designed to efficiently support this tracking mechanism.The operation algorithms,adding algorithm(AA),removing algorithm(RA),and scheduler algorithm(SA)are proposed to operate the tracking messages in message array,which forms the special first input X output(FIXO)strategy of message array.Automatically tracking,recording,and rolling back are the characteristics of our tracking mechanism.We implement this messagearray-based mechanism on the famous human machine interface(HMI)software platform-proficy iFix,and construct experiments to evaluate the performance of the mechanism in various cases.The results show our mechanism can be well satisfied with supervisory control software.
基金This research was supported by National Natural Science Foundation of China(Grant Nos.61972048,62072051).
文摘The Internet Control Message Protocol(ICMP)covert tunnel refers to a network attack that encapsulates malicious data in the data part of the ICMP protocol for transmission.Its concealment is stronger and it is not easy to be discovered.Most detection methods are detecting the existence of channels instead of clarifying specific attack intentions.In this paper,we propose an ICMP covert tunnel attack intent detection framework ICMPTend,which includes five steps:data collection,feature dictionary construction,data preprocessing,model construction,and attack intent prediction.ICMPTend can detect a variety of attack intentions,such as shell attacks,sensitive directory access,communication protocol traffic theft,filling tunnel reserved words,and other common network attacks.We extract features from five types of attack intent found in ICMP channels.We build a multi-dimensional dictionary of malicious features,including shell attacks,sensitive directory access,communication protocol traffic theft,filling tunnel reserved words,and other common network attack keywords.For the high-dimensional and independent characteristics of ICMP traffic,we use a support vector machine(SVM)as a multi-class classifier.The experimental results show that the average accuracy of ICMPTend is 92%,training ICMPTend only takes 55 s,and the prediction time is only 2 s,which can effectively identify the attack intention of ICMP.
基金partially supported by National Key Research and Development Program of China(2018YFB1700200)National Natural Science Foundation of China(61972389,61903356,61803368,U1908212)+2 种基金Youth Innovation Promotion Association of the Chinese Academy of Sciences,National Science and Technology Major Project(2017ZX02101007-004)Liaoning Provincial Natural Science Foundation of China(2020-MS-034,2019-YQ-09)China Postdoctoral Science Foundation(2019M661156)。
文摘Time-sensitive networks(TSNs)support not only traditional best-effort communications but also deterministic communications,which send each packet at a deterministic time so that the data transmissions of networked control systems can be precisely scheduled to guarantee hard real-time constraints.No-wait scheduling is suitable for such TSNs and generates the schedules of deterministic communications with the minimal network resources so that all of the remaining resources can be used to improve the throughput of best-effort communications.However,due to inappropriate message fragmentation,the realtime performance of no-wait scheduling algorithms is reduced.Therefore,in this paper,joint algorithms of message fragmentation and no-wait scheduling are proposed.First,a specification for the joint problem based on optimization modulo theories is proposed so that off-the-shelf solvers can be used to find optimal solutions.Second,to improve the scalability of our algorithm,the worst-case delay of messages is analyzed,and then,based on the analysis,a heuristic algorithm is proposed to construct low-delay schedules.Finally,we conduct extensive test cases to evaluate our proposed algorithms.The evaluation results indicate that,compared to existing algorithms,the proposed joint algorithm improves schedulability by up to 50%.
基金Project supported by the Health Promotion Center of Sir Run Run Shaw Hospital, School of Medicine, Zhejiang University, China
文摘Objective: To compare the efficacy of a short messaging service (SMS) text messaging and phone reminder to im-prove attendance rates at a health promotion center. Methods: A total of 1 859 participants who had scheduled appointments in the health promotion center of our hospital from April 2007 to May 2007 were enrolled in the study and randomly assigned into 3 groups: control (no reminder) group,SMS text messaging reminder group and telephone reminder group. Attendance rates and costs of interventions were collected. Results: A total of 1848 participants were eligible for analysis. Attendance rates of control,SMS and telephone groups were 80.5%,87.5% and 88.3%,respectively. The attendance rates were significantly higher in SMS and telephone groups than that in the control group,with odds ratio 1.698,95% confidence interval 1.224 to 2.316,P=0.001 in the SMS group,and odds ratio 1.829,95% confidence interval 1.333 to 2.509,P<0.001 in the telephone group. However,there was no difference between the SMS group and the telephone group (P=0.670). The cost effectiveness analysis showed that the cost per attendance for the SMS group (0.31 Yuan) was significantly lower than that for the telephone group (0.48 Yuan). Conclusion: SMS and telephone are effective reminders for improving attendance rate at a health promotion center. SMS reminder may be more cost-effective compared with the telephone reminder.
文摘The control and data planes are decoupled in software-defined networking(SDN),which enables both planes to evolve independently,and brings about many advantages such as high flexibility,programmability,and rapid implementation of new network protocols.However,in order to improve the scalability of the control plane at present,some control functionalities are added to the data plane,which is probably to impact on the generality of the data plane.The key challenge of adding control functionalities to the data plane is to strike a careful balance between the generality of the data plane and the scalability of the control plane.We propose some basic principles that both control and data planes should comply with,based on the evolutionary trend of SDN.Moreover,we take two approaches for reference according to the principles,viewed from the control messages in OpenFlow-based SDN.Our evaluations demonstrate that the approaches can maintain the generality of the data plane and improve the scalability of the control plane.
基金supported by National Large-Scale Scientific ProjectsCAS K.C.Wong Post-doctoral Fellowships from CAS K.C. Wong Education Foundation
文摘This paper describes the system modelling, architecture design and implementation of the observatory control system (OCS) of the LAMOST (Large Area Multi-Object Fibre Spectroscopic Telescope). The software-reuse technique, object-oriented technique, component and framework based software-developing methodology are used in the system architecture and implementation. The architecture of OCS is established based on a component-based layered system using many patterns such as the MVC (Model/View/Controller) and proxy. For the effective and safe exchange of commands and status between OCS and the subsystem, a unified message bus is defined and three protocols, namely a command acceptance/rejection protocol, a command execution feedback protocol and a status handling protocol, are proposed. The interface protocol between all the subsystems is defined. The full utilization of advanced computer technologies including the database, distributed computing, real-time computing, standard data exchange and expert system technologies has benefited the OCS software development.
基金the National Natural Science Foundation of China (Nos. 51475422 and 51521064).
文摘Controller area network(CAN) is a widely used fieldbus protocol in various industrial applications.To understand the network behavior under errors for the optimal design of networked control systems, the message response time of the CAN network needs to be analyzed. In this study, a novel delay time distribution analysis method for the response messages is proposed when considering errors. In this method the complex message queues are decomposed into typical message patterns and cases. First, a stochastic fault model is developed, and the probability factor is defined to calculate the error distribution. Then the message delay time distribution for the single slave node configuration is analyzed based on the error distribution. Next, based on the delay time distribution analysis of typical patterns and cases, an analysis framework of message delay time distribution for the master/slave configuration is developed. The testbed is constructed and case studies are conducted to demonstrate the proposed methodology under different network configurations. Experimental results show that the delay time distributions calculated by the proposed method agree well with the actual observations.
文摘为了提高控制器局域网络(controller area network,CAN)通信的实时性,文章基于时间触发CAN(time-triggered CAN,TTCAN)协议,采用verilog硬件描述语言设计实现TTCAN总线控制器。该控制器可在经典CAN模式与TTCAN模式之间进行切换,同时兼容可变速率CAN(CAN with flexible data rate,CAN FD)协议下的高速通信。实验结果证明,相较于经典CAN总线控制器,该TTCAN总线控制器能够减少在高总线负载率下周期性报文的发送延时,在全波特率范围内且总线负载率大于等于60%的情况下,能够减少75%以上的CAN报文发送延时。