Nowadays,the microgrid cluster is an important application scenario for energy trading.In trading,one of the most important research directions is the issue of pricing.To determine reasonable pricing for the microgrid...Nowadays,the microgrid cluster is an important application scenario for energy trading.In trading,one of the most important research directions is the issue of pricing.To determine reasonable pricing for the microgrid cluster,data communication is used to create the cyber-physical system(CPS),which can improve the observability of microgrids.Then,the following works are carried out in the CPS.In the physical layer:1)Regarding trading between microgrids and the load,based on the generalized game theory,an optimal pricing strategy is proposed,which takes into account the interactive relationships among microgrids and transforms the pricing problem into a Nikaido-Isoda function to obtain the optimal prices conveniently;2)Regarding peer-to-peer trading between two microgrids,based on evolutionary game theory and the penalty mechanism,the optimal sale price of the seller is selected with boundary rationality.In the cyber layer,regarding the communication interruption issue existing in pricing(i.e.,the game process),based on the principle of matching the performance of the path with the importance degree of the data,a dynamic regulating method of paths is proposed,i.e.,adopting a new path to re-transmit the interrupted data to the destination.Finally,the effect of the proposed strategies is verified by case studies.展开更多
A scheme of synchronized injection multi-quantum-well (MQW) laser system using optical couphng-feedback is presented for performing chaotic dual-directional secure communication. The performance characterization of ...A scheme of synchronized injection multi-quantum-well (MQW) laser system using optical couphng-feedback is presented for performing chaotic dual-directional secure communication. The performance characterization of chaos masking is investigated theoretically, the equation of synchronization demodulation is deduced and its root is also given. Chaos masking encoding with a rate of 5 Gbit/s and a modulation frequency of 1 GHz, chaos modulation with a rate of 0.2 Gbit/s and a modulation frequency of 0.2 GHz and chaos shifting key with a rate of 0.2 Gbit/s are numerically simulated, separately. The ratio of the signal to the absolute synchronous error and the time for achieving synchronous demodulation are analysed in detail. The results illustrate that the system has stronger privacy and good performances so that it can be applied in chaotic dual-directional high rate secure communications.展开更多
The embedded data acquistition technology in vehicle electronic system was discussed. This technology adopts the parallel working mode, gets vehicle electronic system data by communication. This technology can provide...The embedded data acquistition technology in vehicle electronic system was discussed. This technology adopts the parallel working mode, gets vehicle electronic system data by communication. This technology can provide us a lot of information on the electronic control unit, is very useful for the development of the vehicle electronic system, and can be used in diagnosis. The key points to this technology are the timer interrupt, A/D interrupt, communication interrupt and real time operation. This technology has been validated by the application in the electronic control mechanism transmission shifting system of the tank.展开更多
Aim To achieve multitask data procssing in a wireless alarm system by computer. Methods The alarm system was composed of hardware and software. The hardware was composed of a master master computer and slave transmi...Aim To achieve multitask data procssing in a wireless alarm system by computer. Methods The alarm system was composed of hardware and software. The hardware was composed of a master master computer and slave transmitters. On urgent ugent occasion, one or more of the transmitters transmitted alarm signals and the master computer received the signals; interruption, residence, graph and word processing were utilized in software to achieve multitiask data processing . Results The main computer can conduct precise and quick multitask data procesing in any condition so long as alarm signals are received. The processing speed is higher than ordinary alarm System. Conclusion The master computer can conduct safe and quick multitask data processing by way of reliable design of software and hardware , so there is no need of special processor.展开更多
基金This work was supported in part by the National Key Research and Development Program of China(2018YFA0702200)the National Natural Science Foundation of China(61933005,61833008)+6 种基金the Natural Science Foundation of Jiangsu Province of China(BK20220395)the Leading Technology Foundation Research Project of Jiangsu Province(BK20202011)the Natural Science Foundation of Jiangsu Universities(22KJB470024)Jiangsu Provincial Key Research and Development Program(BE2020001)Natural Science Foundation of Hebei Province of China(E2020203139)Natural Science Foundation of Nanjing University of Posts and Telecommunications(NY222032)the National Research Foundation of Korea(2020R1A2B5B02002002).
文摘Nowadays,the microgrid cluster is an important application scenario for energy trading.In trading,one of the most important research directions is the issue of pricing.To determine reasonable pricing for the microgrid cluster,data communication is used to create the cyber-physical system(CPS),which can improve the observability of microgrids.Then,the following works are carried out in the CPS.In the physical layer:1)Regarding trading between microgrids and the load,based on the generalized game theory,an optimal pricing strategy is proposed,which takes into account the interactive relationships among microgrids and transforms the pricing problem into a Nikaido-Isoda function to obtain the optimal prices conveniently;2)Regarding peer-to-peer trading between two microgrids,based on evolutionary game theory and the penalty mechanism,the optimal sale price of the seller is selected with boundary rationality.In the cyber layer,regarding the communication interruption issue existing in pricing(i.e.,the game process),based on the principle of matching the performance of the path with the importance degree of the data,a dynamic regulating method of paths is proposed,i.e.,adopting a new path to re-transmit the interrupted data to the destination.Finally,the effect of the proposed strategies is verified by case studies.
文摘A scheme of synchronized injection multi-quantum-well (MQW) laser system using optical couphng-feedback is presented for performing chaotic dual-directional secure communication. The performance characterization of chaos masking is investigated theoretically, the equation of synchronization demodulation is deduced and its root is also given. Chaos masking encoding with a rate of 5 Gbit/s and a modulation frequency of 1 GHz, chaos modulation with a rate of 0.2 Gbit/s and a modulation frequency of 0.2 GHz and chaos shifting key with a rate of 0.2 Gbit/s are numerically simulated, separately. The ratio of the signal to the absolute synchronous error and the time for achieving synchronous demodulation are analysed in detail. The results illustrate that the system has stronger privacy and good performances so that it can be applied in chaotic dual-directional high rate secure communications.
文摘The embedded data acquistition technology in vehicle electronic system was discussed. This technology adopts the parallel working mode, gets vehicle electronic system data by communication. This technology can provide us a lot of information on the electronic control unit, is very useful for the development of the vehicle electronic system, and can be used in diagnosis. The key points to this technology are the timer interrupt, A/D interrupt, communication interrupt and real time operation. This technology has been validated by the application in the electronic control mechanism transmission shifting system of the tank.
文摘Aim To achieve multitask data procssing in a wireless alarm system by computer. Methods The alarm system was composed of hardware and software. The hardware was composed of a master master computer and slave transmitters. On urgent ugent occasion, one or more of the transmitters transmitted alarm signals and the master computer received the signals; interruption, residence, graph and word processing were utilized in software to achieve multitiask data processing . Results The main computer can conduct precise and quick multitask data procesing in any condition so long as alarm signals are received. The processing speed is higher than ordinary alarm System. Conclusion The master computer can conduct safe and quick multitask data processing by way of reliable design of software and hardware , so there is no need of special processor.