With the explosive increasing number of connecting devices such as smart phones, vehicles,drones, and satellites in the wireless networks, how to manage and control such a huge number of networking nodes has become a ...With the explosive increasing number of connecting devices such as smart phones, vehicles,drones, and satellites in the wireless networks, how to manage and control such a huge number of networking nodes has become a great challenge. In this paper, we combine the advantages of centralized networks and distributed networks approaches for vehicular networks with the aid of Unmanned Aerial Vehicle(UAV), and propose a Center-controlled Multihop Wireless(CMW) networking scheme consisting of data transmission plane performed by vehicles and the network control plane implemented by the UAV.Besides, we jointly explore the advantages of Medium Access Control(MAC) protocols in the link layer and routing schemes in the network layer to facilitate the multi-hop data transmission for the ground vehicles.Particularly, the network control plane in the UAV can manage the whole network effectively via fully exploiting the acquired network topology information and traffic requests from each vehicle, and implements various kinds of control based on different traffic demands, which can enhance the networking flexibility and scalability significantly in vehicular networks.Simulation results validate the advantages of the proposed scheme compared with existing methods.展开更多
In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation...In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation,individual similarity function,group similarity function,direct trust assessment function,and generalized predictive control,this model can guarantee the trust of an end user and users in its network.Compared with traditional measurement model,the model considers different characteristics of various networks.The trusted measurement policies established according to different network environments have better adaptability.By constructing trusted group,the threats to trusted group will be reduced greatly.Utilizing trusted group to restrict individuals in network can ensure the fault tolerance of trustworthiness of trusted individuals and group.The simulation shows that this scheme can support behavior measurement more efficiently than traditional ones and the model resists viruses and Trojans more efficiently than older ones.展开更多
A nonlinear visual mapping model is presented to replace the image Jacobian relation for uncalibrated hand/eye coordination. A new visual tracking controller based on artificial neural network is designed. Simulation ...A nonlinear visual mapping model is presented to replace the image Jacobian relation for uncalibrated hand/eye coordination. A new visual tracking controller based on artificial neural network is designed. Simulation results show that this method can drive the static tracking error to zero quickly and keep good robustness and adaptability at the same time. In addition, the algorithm is very easy to be implemented with low computational complexity.展开更多
Nearly all real-world networks are complex networks and usually are in danger of collapse.Therefore,it is crucial to exploit and understand the mechanisms of network attacks and provide better protection for network f...Nearly all real-world networks are complex networks and usually are in danger of collapse.Therefore,it is crucial to exploit and understand the mechanisms of network attacks and provide better protection for network functionalities.Network dismantling aims to find the smallest set of nodes such that after their removal the network is broken into connected components of sub-extensive size.To overcome the limitations and drawbacks of existing network dismantling methods,this paper focuses on network dismantling problem and proposes a neighbor-loop structure based centrality metric,NL,which achieves a balance between computational efficiency and evaluation accuracy.In addition,we design a novel method combining NL-based nodes-removing,greedy tree-breaking and reinsertion.Moreover,we compare five baseline methods with our algorithm on ten widely used real-world networks and three types of model networks including Erd€os-Renyi random networks,Watts-Strogatz smallworld networks and Barabasi-Albert scale-free networks with different network generation parameters.Experimental results demonstrate that our proposed method outperforms most peer methods by obtaining a minimal set of targeted attack nodes.Furthermore,the insights gained from this study may be of assistance to future practical research into real-world networks.展开更多
This paper presented a joint resource allocation(RA) and admission control(AC) mechanism in software defined mobile networks(SDMNs). In this mechanism, the joint RA and AC problem can be formulated as an optimization ...This paper presented a joint resource allocation(RA) and admission control(AC) mechanism in software defined mobile networks(SDMNs). In this mechanism, the joint RA and AC problem can be formulated as an optimization problem with the aim of maximizing the number of admitted users while simultaneously minimizing the number of allocated channels. Since the primal problem is modeled to be a mixed integer nonlinear problem(MINLP), we attain the suboptimal solutions to the primal MINLP by convex relaxation. Additionally, with the global information collected by the SDMNs controller, a centralized joint RA and AC(CJRA)algorithm is proposed by the Lagrange dual decomposition technique to obtain the global optimum. Meanwhile, we propose an OpenFlow rules placement strategy to realize CJRA in an efficient way. Moreover, a distributed algorithm is also developed to find the local optimum, showing a performance benchmark for the centralized one. Finally, simulation results show that the proposed centralized algorithm admits more users compared with the distributed.展开更多
In this paper, electrical energy quality and its indices in ship electric networks are introduced, especially the meaning of electrical energy quality terms in voltage and active and reactive power distribution indice...In this paper, electrical energy quality and its indices in ship electric networks are introduced, especially the meaning of electrical energy quality terms in voltage and active and reactive power distribution indices. Then methods of measurement of marine electrical energy indices are introduced in details and a microprocessor measurement-diagnosis system with the function of measurement and control is designed. Afterwards, estimation and control of electrical power quality of marine electrical power networks are introduced. And finally, according to the existing method of measurement and control of electrical power quality in ship power networks, the improvement of relative method is proposed.展开更多
To discover and identify the influential nodes in any complex network has been an important issue.It is a significant factor in order to control over the network.Through control on a network,any information can be spr...To discover and identify the influential nodes in any complex network has been an important issue.It is a significant factor in order to control over the network.Through control on a network,any information can be spread and stopped in a short span of time.Both targets can be achieved,since network of information can be extended and as well destroyed.So,information spread and community formation have become one of the most crucial issues in the world of SNA(Social Network Analysis).In this work,the complex network of twitter social network has been formalized and results are analyzed.For this purpose,different network metrics have been utilized.Visualization of the network is provided in its original form and then filter out(different percentages)from the network to eliminate the less impacting nodes and edges for better analysis.This network is analyzed according to different centrality measures,like edge-betweenness,betweenness centrality,closeness centrality and eigenvector centrality.Influential nodes are detected and their impact is observed on the network.The communities are analyzed in terms of network coverage considering theMinimum Spanning Tree,shortest path distribution and network diameter.It is found that these are the very effective ways to find influential and central nodes from such big social networks like Facebook,Instagram,Twitter,LinkedIn,etc.展开更多
The stable operation of the central air conditioning water system always is a major difficulty for the control profession. Paper focus on the water system with multi variable, strong coupling, nonlinear, large time de...The stable operation of the central air conditioning water system always is a major difficulty for the control profession. Paper focus on the water system with multi variable, strong coupling, nonlinear, large time delay characteristics, presented use feed forward coupling compensation method, to eliminate the coupling effect between temperature and pressure. In this paper, the Elman neural network controller is designed for the first time, and the simulation results show that the response time of Elman neural network controller is shorter, the system is more stable and the overshoot is small.展开更多
In this paper,an active network measurement platform is proposed which is a combination of hardware and software.Its innovation lies in the high performance of hardware combined with features that the software is easy...In this paper,an active network measurement platform is proposed which is a combination of hardware and software.Its innovation lies in the high performance of hardware combined with features that the software is easy to program,which retains software flexibility at the same time.By improving the precision of packet timestamp programmable hardware equipment,it provides packet sending control more accurately and supports the microsecond packet interval.We have implemented a model on the NetMagic platform,and done some experiments to analyze the accuracy difference of the user,the kernel and hardware timestamp.展开更多
With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality...With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the in- ternal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that if one vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem. To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC—the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC’s constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper.展开更多
This paper concerned with the quantized synchronization analysis problem. The scope of state vectors of dynamic systems, based on the matrix measure, is estimated. By using the general intermittent control, some simpl...This paper concerned with the quantized synchronization analysis problem. The scope of state vectors of dynamic systems, based on the matrix measure, is estimated. By using the general intermittent control, some simple yet generic criteria are derived ensuring the exponential stability of dynamic systems. Then, both the general intermittent networked controller and the quantized parameters can be designed, which guarantee that the nodes of the complex network are synchronized. Finally, simulation examples are given to illustrate the effectiveness and feasibility of the proposed method.展开更多
The influence of a node in a network can be characterized by its macroscopic properties such as eigenvector centrality. An issue of significant theoretical and practical interest is to modify the influence or roles of...The influence of a node in a network can be characterized by its macroscopic properties such as eigenvector centrality. An issue of significant theoretical and practical interest is to modify the influence or roles of the nodes in a network, and recent advances indicate that this can be achieved by just controlling a subset of nodes: the socalled controllers. However, the relationship between the structural properties of a network and its controllability, e.g., the control of node importance, is still not well understood. Here we systematically" explore this relationship by constructing scale-free networks with a fixed degree sequence and tunable network characteristics. We calculate the relative size (nc*) of the minimai controlling set required to controi the importance of each individual node in a network. It is found that while clustering has no significant impact on nc*, changes in degree-degree correlations, heterogeneity and the average degree of networks demonstrate a discernible impact on its controllability.展开更多
In industrial control systems,the utilization of deep learning based methods achieves improvements for anomaly detection.However,most current methods ignore the association of inner components in industrial control sy...In industrial control systems,the utilization of deep learning based methods achieves improvements for anomaly detection.However,most current methods ignore the association of inner components in industrial control systems.In industrial control systems,an anomaly component may affect the neighboring components;therefore,the connective relationship can help us to detect anomalies effectively.In this paper,we propose a centrality-aware graph convolution network(CAGCN)for anomaly detection in industrial control systems.Unlike the traditional graph convolution network(GCN)model,we utilize the concept of centrality to enhance the ability of graph convolution networks to deal with the inner relationship in industrial control systems.Our experiments show that compared with GCN,our CAGCN has a better ability to utilize this relationship between components in industrial control systems.The performances of the model are evaluated on the Secure Water Treatment(SWaT)dataset and the Water Distribution(WADI)dataset,the two most common industrial control systems datasets in the field of industrial anomaly detection.The experimental results show that our CAGCN achieves better results on precision,recall,and F1 score than the state-of-the-art methods.展开更多
In this paper, the data-based control problem is investigated for a class of networked nonlinear systems with measurement noise as well as packet dropouts in the feedback and forward channels. The measurement noise an...In this paper, the data-based control problem is investigated for a class of networked nonlinear systems with measurement noise as well as packet dropouts in the feedback and forward channels. The measurement noise and the number of consecutive packet dropouts in both channels are assumed to be random but bounded. A data-based networked predictive control method is proposed, in which a sequence of control increment predictions are calculated in the controller based on the measured output error, and based on the control increment predictions received by the actuator, a proper control action is obtained and applied to the plant according to the real-time number of consecutive packet dropouts at each sampling instant. Then the stability analysis is performed for the networked closedloop system. Finally, the effectiveness of the proposed method is illustrated by a numerical example.展开更多
基金supported in part by the National Natural Science Foundation of China under Grant 62071283,Grant 61771296,Grant 61872228 and Grant 62271513in part by the Natural Science Basic Research Plan in Shaanxi Province of China under Grant 2018JQ6048 and Grant 2018JZ6006+3 种基金in part by Shaanxi Key Industrial Innovation Chain Project in Industrial Domain under Grant 2020ZDLGY15-09in part by Guang Dong Basic and Applied Basic Research Foundation under Grant 2021A1515012631in part by China Postdoctoral Science Foundation under Grant 2016M600761in part by the Fundamental Research Funds for the Central Universities under Grant GK202003075 and Grant GK202103016。
文摘With the explosive increasing number of connecting devices such as smart phones, vehicles,drones, and satellites in the wireless networks, how to manage and control such a huge number of networking nodes has become a great challenge. In this paper, we combine the advantages of centralized networks and distributed networks approaches for vehicular networks with the aid of Unmanned Aerial Vehicle(UAV), and propose a Center-controlled Multihop Wireless(CMW) networking scheme consisting of data transmission plane performed by vehicles and the network control plane implemented by the UAV.Besides, we jointly explore the advantages of Medium Access Control(MAC) protocols in the link layer and routing schemes in the network layer to facilitate the multi-hop data transmission for the ground vehicles.Particularly, the network control plane in the UAV can manage the whole network effectively via fully exploiting the acquired network topology information and traffic requests from each vehicle, and implements various kinds of control based on different traffic demands, which can enhance the networking flexibility and scalability significantly in vehicular networks.Simulation results validate the advantages of the proposed scheme compared with existing methods.
基金This work was supported by the National Basic Research Pro-gram of China under Crant No.2007CB311100 Funds of Key Lab of Fujlan Province University Network Security and Cryp- toll1009+3 种基金 the National Science Foundation for Young Scholars of China under Crant No.61001091 Beijing Nature Science Foundation under Crant No. 4122012 "Next-Generation Broad-band Wireless Mobile Communication Network" National Sci-ence and Technology Major Special Issue Funding under Grant No. 2012ZX03002003 Funding Program for Academic tturmn Resources Development in Institutions of Higher Learning Under the Jurisdiction of Beijing Municipality of Chi-na.
文摘In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation,individual similarity function,group similarity function,direct trust assessment function,and generalized predictive control,this model can guarantee the trust of an end user and users in its network.Compared with traditional measurement model,the model considers different characteristics of various networks.The trusted measurement policies established according to different network environments have better adaptability.By constructing trusted group,the threats to trusted group will be reduced greatly.Utilizing trusted group to restrict individuals in network can ensure the fault tolerance of trustworthiness of trusted individuals and group.The simulation shows that this scheme can support behavior measurement more efficiently than traditional ones and the model resists viruses and Trojans more efficiently than older ones.
基金This project was supported by the National Natural Science Foundation (No. 69875010).
文摘A nonlinear visual mapping model is presented to replace the image Jacobian relation for uncalibrated hand/eye coordination. A new visual tracking controller based on artificial neural network is designed. Simulation results show that this method can drive the static tracking error to zero quickly and keep good robustness and adaptability at the same time. In addition, the algorithm is very easy to be implemented with low computational complexity.
基金the National Natural Science Foundation of China under Grants 61871209 and 61901210,in part by Artificial Intelligence and Intelligent Transportation Joint Technical Center of HUST and Hubei Chutian Intelligent Transportation Co.,LTD under project”Intelligent Transportation Operation Monitoring Network and System”.
文摘Nearly all real-world networks are complex networks and usually are in danger of collapse.Therefore,it is crucial to exploit and understand the mechanisms of network attacks and provide better protection for network functionalities.Network dismantling aims to find the smallest set of nodes such that after their removal the network is broken into connected components of sub-extensive size.To overcome the limitations and drawbacks of existing network dismantling methods,this paper focuses on network dismantling problem and proposes a neighbor-loop structure based centrality metric,NL,which achieves a balance between computational efficiency and evaluation accuracy.In addition,we design a novel method combining NL-based nodes-removing,greedy tree-breaking and reinsertion.Moreover,we compare five baseline methods with our algorithm on ten widely used real-world networks and three types of model networks including Erd€os-Renyi random networks,Watts-Strogatz smallworld networks and Barabasi-Albert scale-free networks with different network generation parameters.Experimental results demonstrate that our proposed method outperforms most peer methods by obtaining a minimal set of targeted attack nodes.Furthermore,the insights gained from this study may be of assistance to future practical research into real-world networks.
基金supported by the National Natural Science Foundation of China under Grant No.61701284,61472229,31671588 and 61801270the China Postdoctoral Science Foundation Funded Project under Grant No2017M622233+2 种基金the Application Research Project for Postdoctoral Researchers of Qingdao,the Scientific Research Foundation of Shandong University of Science and Technology for Recruited Talents under Grant No.2016RCJJ010the Sci.&Tech.DevelopmentFund of Shandong Province of China underGrant No.2016ZDJS02A11,ZR2017BF015and ZR2017MF027the Taishan Scholar Climbing Program of Shandong Province,and SDUST Research Fund under Grant No.2015TDJH102
文摘This paper presented a joint resource allocation(RA) and admission control(AC) mechanism in software defined mobile networks(SDMNs). In this mechanism, the joint RA and AC problem can be formulated as an optimization problem with the aim of maximizing the number of admitted users while simultaneously minimizing the number of allocated channels. Since the primal problem is modeled to be a mixed integer nonlinear problem(MINLP), we attain the suboptimal solutions to the primal MINLP by convex relaxation. Additionally, with the global information collected by the SDMNs controller, a centralized joint RA and AC(CJRA)algorithm is proposed by the Lagrange dual decomposition technique to obtain the global optimum. Meanwhile, we propose an OpenFlow rules placement strategy to realize CJRA in an efficient way. Moreover, a distributed algorithm is also developed to find the local optimum, showing a performance benchmark for the centralized one. Finally, simulation results show that the proposed centralized algorithm admits more users compared with the distributed.
文摘In this paper, electrical energy quality and its indices in ship electric networks are introduced, especially the meaning of electrical energy quality terms in voltage and active and reactive power distribution indices. Then methods of measurement of marine electrical energy indices are introduced in details and a microprocessor measurement-diagnosis system with the function of measurement and control is designed. Afterwards, estimation and control of electrical power quality of marine electrical power networks are introduced. And finally, according to the existing method of measurement and control of electrical power quality in ship power networks, the improvement of relative method is proposed.
文摘To discover and identify the influential nodes in any complex network has been an important issue.It is a significant factor in order to control over the network.Through control on a network,any information can be spread and stopped in a short span of time.Both targets can be achieved,since network of information can be extended and as well destroyed.So,information spread and community formation have become one of the most crucial issues in the world of SNA(Social Network Analysis).In this work,the complex network of twitter social network has been formalized and results are analyzed.For this purpose,different network metrics have been utilized.Visualization of the network is provided in its original form and then filter out(different percentages)from the network to eliminate the less impacting nodes and edges for better analysis.This network is analyzed according to different centrality measures,like edge-betweenness,betweenness centrality,closeness centrality and eigenvector centrality.Influential nodes are detected and their impact is observed on the network.The communities are analyzed in terms of network coverage considering theMinimum Spanning Tree,shortest path distribution and network diameter.It is found that these are the very effective ways to find influential and central nodes from such big social networks like Facebook,Instagram,Twitter,LinkedIn,etc.
文摘The stable operation of the central air conditioning water system always is a major difficulty for the control profession. Paper focus on the water system with multi variable, strong coupling, nonlinear, large time delay characteristics, presented use feed forward coupling compensation method, to eliminate the coupling effect between temperature and pressure. In this paper, the Elman neural network controller is designed for the first time, and the simulation results show that the response time of Elman neural network controller is shorter, the system is more stable and the overshoot is small.
基金Supported by the National High Technology Research and Development Programme of China(No.2007AA01Z416)"New Start" Academic Research Projects of Beijing Union University(No.ZK201204)
文摘In this paper,an active network measurement platform is proposed which is a combination of hardware and software.Its innovation lies in the high performance of hardware combined with features that the software is easy to program,which retains software flexibility at the same time.By improving the precision of packet timestamp programmable hardware equipment,it provides packet sending control more accurately and supports the microsecond packet interval.We have implemented a model on the NetMagic platform,and done some experiments to analyze the accuracy difference of the user,the kernel and hardware timestamp.
基金This work was supported in part by the National Natural Science Foundation of China (11562006, 11661025), the Outstanding Young Teachers Training in Higher Education Institutions of Guangxi (gxqg022014025), and the Natural Science Foundation of Guangxi Province (2015GXNSFAA139013).
基金Project (No. 60373088) supported by the National Natural ScienceFoundation of China
文摘With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the in- ternal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that if one vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem. To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC—the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC’s constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper.
文摘This paper concerned with the quantized synchronization analysis problem. The scope of state vectors of dynamic systems, based on the matrix measure, is estimated. By using the general intermittent control, some simple yet generic criteria are derived ensuring the exponential stability of dynamic systems. Then, both the general intermittent networked controller and the quantized parameters can be designed, which guarantee that the nodes of the complex network are synchronized. Finally, simulation examples are given to illustrate the effectiveness and feasibility of the proposed method.
基金Supported by Foundations of SiChuan Educational Committee under Grant No 13ZB0198the National Natural Science Foundation of China under Grant Nos 61104224,81373531,61104143 and 61573107The Science and Technology Fund Project of SWPU(2013XJR011)
文摘The influence of a node in a network can be characterized by its macroscopic properties such as eigenvector centrality. An issue of significant theoretical and practical interest is to modify the influence or roles of the nodes in a network, and recent advances indicate that this can be achieved by just controlling a subset of nodes: the socalled controllers. However, the relationship between the structural properties of a network and its controllability, e.g., the control of node importance, is still not well understood. Here we systematically" explore this relationship by constructing scale-free networks with a fixed degree sequence and tunable network characteristics. We calculate the relative size (nc*) of the minimai controlling set required to controi the importance of each individual node in a network. It is found that while clustering has no significant impact on nc*, changes in degree-degree correlations, heterogeneity and the average degree of networks demonstrate a discernible impact on its controllability.
基金supported by the Chinese Academy of Sciences through the Strategic Priority Research Program under Grant No.XDC02020400.
文摘In industrial control systems,the utilization of deep learning based methods achieves improvements for anomaly detection.However,most current methods ignore the association of inner components in industrial control systems.In industrial control systems,an anomaly component may affect the neighboring components;therefore,the connective relationship can help us to detect anomalies effectively.In this paper,we propose a centrality-aware graph convolution network(CAGCN)for anomaly detection in industrial control systems.Unlike the traditional graph convolution network(GCN)model,we utilize the concept of centrality to enhance the ability of graph convolution networks to deal with the inner relationship in industrial control systems.Our experiments show that compared with GCN,our CAGCN has a better ability to utilize this relationship between components in industrial control systems.The performances of the model are evaluated on the Secure Water Treatment(SWaT)dataset and the Water Distribution(WADI)dataset,the two most common industrial control systems datasets in the field of industrial anomaly detection.The experimental results show that our CAGCN achieves better results on precision,recall,and F1 score than the state-of-the-art methods.
基金supported in part by the National Natural Science Foundation of China under Grant Nos.61673023,61203230,61273104,61333003,61210012,and 61490701the Beijing Municipal Natural Science Foundation under Grant No.4152014+3 种基金the Great Wall Scholar Candidate Training Program of North China University of Technology(NCUT)the Excellent Youth Scholar Nurturing Program of NCUTthe Outstanding Young Scientist Award Foundation of Shandong Province of China under Grant No.BS2013DX015the Research Fund for the Taishan Scholar Project of Shandong Province of China
文摘In this paper, the data-based control problem is investigated for a class of networked nonlinear systems with measurement noise as well as packet dropouts in the feedback and forward channels. The measurement noise and the number of consecutive packet dropouts in both channels are assumed to be random but bounded. A data-based networked predictive control method is proposed, in which a sequence of control increment predictions are calculated in the controller based on the measured output error, and based on the control increment predictions received by the actuator, a proper control action is obtained and applied to the plant according to the real-time number of consecutive packet dropouts at each sampling instant. Then the stability analysis is performed for the networked closedloop system. Finally, the effectiveness of the proposed method is illustrated by a numerical example.