期刊文献+
共找到25篇文章
< 1 2 >
每页显示 20 50 100
The Effect of Key Nodes on theMalware Dynamics in the Industrial Control Network
1
作者 Qiang Fu JunWang +1 位作者 Changfu Si Jiawei Liu 《Computers, Materials & Continua》 SCIE EI 2024年第4期329-349,共21页
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is be... As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network. 展开更多
关键词 Key nodes dynamic model industrial control network SIMULATION
下载PDF
ZTE Records Highest Industry Growth for Optical Networking Solutions
2
《ZTE Communications》 2008年第3期19-19,共1页
ZTE Corporation has the highest industry sales growth in the area of Optical Networking (ON)last year,according tothe report published by
关键词 ZTE Records Highest industry Growth for Optical networking Solutions
下载PDF
Hybrid Power Bank Deployment Model for Energy Supply Coverage Optimization in Industrial Wireless Sensor Network
3
作者 Hang Yang Xunbo Li Witold Pedrycz 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1531-1551,共21页
Energy supply is one of the most critical challenges of wireless sensor networks(WSNs)and industrial wireless sensor networks(IWSNs).While research on coverage optimization problem(COP)centers on the network’s monito... Energy supply is one of the most critical challenges of wireless sensor networks(WSNs)and industrial wireless sensor networks(IWSNs).While research on coverage optimization problem(COP)centers on the network’s monitoring coverage,this research focuses on the power banks’energy supply coverage.The study of 2-D and 3-D spaces is typical in IWSN,with the realistic environment being more complex with obstacles(i.e.,machines).A 3-D surface is the field of interest(FOI)in this work with the established hybrid power bank deployment model for the energy supply COP optimization of IWSN.The hybrid power bank deployment model is highly adaptive and flexible for new or existing plants already using the IWSN system.The model improves the power supply to a more considerable extent with the least number of power bank deployments.The main innovation in this work is the utilization of a more practical surface model with obstacles and training while improving the convergence speed and quality of the heuristic algorithm.An overall probabilistic coverage rate analysis of every point on the FOI is provided,not limiting the scope to target points or areas.Bresenham’s algorithm is extended from 2-D to 3-D surface to enhance the probabilistic covering model for coverage measurement.A dynamic search strategy(DSS)is proposed to modify the artificial bee colony(ABC)and balance the exploration and exploitation ability for better convergence toward eliminating NP-hard deployment problems.Further,the cellular automata(CA)is utilized to enhance the convergence speed.The case study based on two typical FOI in the IWSN shows that the CA scheme effectively speeds up the optimization process.Comparative experiments are conducted on four benchmark functions to validate the effectiveness of the proposed method.The experimental results show that the proposed algorithm outperforms the ABC and gbest-guided ABC(GABC)algorithms.The results show that the proposed energy coverage optimization method based on the hybrid power bank deployment model generates more accurate results than the results obtained by similar algorithms(i.e.,ABC,GABC).The proposed model is,therefore,effective and efficient for optimization in the IWSN. 展开更多
关键词 Industrial wireless sensor network hybrid power bank deployment model:energy supply coverage optimization artificial bee colony algorithm radio frequency numerical function optimization
下载PDF
In-Depth Study of Potential-Based Routing and New Exploration of Its Scheduling Integration
4
作者 Jihoon Sung Yeunwoong Kyung 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第9期2891-2911,共21页
Industrial wireless mesh networks(WMNs)have been widely deployed in various industrial sectors,providing services such as manufacturing process monitoring,equipment control,and sensor data collection.A notable charact... Industrial wireless mesh networks(WMNs)have been widely deployed in various industrial sectors,providing services such as manufacturing process monitoring,equipment control,and sensor data collection.A notable characteristic of industrial WMNs is their distinct traffic pattern,where the majority of traffic flows originate from mesh nodes and are directed towards mesh gateways.In this context,this paper adopts and revisits a routing algorithm known as ALFA(autonomous load-balancing field-based anycast routing),tailored specifically for anycast(one-to-one-of-many)networking in WMNs,where traffic flows can be served through any one of multiple gateways.In essence,the scheme is a hybrid-type routing strategy that leverages the advantages of both back-pressure routing and geographic routing.Notably,its novelty lies in being developed by drawing inspiration from another field,specifically from the movement of charges in an electrostatic potential field.Expanding on the previous work,this paper explores further in-depth discussions that were not previously described,including a detailed description of the analogy between an electrostatic system and a WMN system based on precise mapping perspectives derived from intensive analysis,as well as discussions on anycast,numerical methods employed in devising the ALFA scheme,its characteristics,and complexity.It is worth noting that this paper addresses these previously unexplored aspects,representing significant contributions compared to previous works.As a completely new exploration,a new scheduling strategy is proposed that is compatible with the routing approach by utilizing the potential-based metric not only in routing but also in scheduling.This assigns higher medium access priority to links with a larger potential difference.Extensive simulation results demonstrate the superior performance of the proposed potential-based joint routing and scheduling scheme across various aspects within industrial WMN scenarios. 展开更多
关键词 Potential-based routing potential differential scheduling industrial wireless mesh networks
下载PDF
Time Delay Characteristic of Industrial Wireless Networks Based on IEEE 802.15.4a 被引量:2
5
作者 Tong-Tao Li Ting-Gang Jia +1 位作者 Min-Rui Fei Huo-Sheng Hu 《International Journal of Automation and computing》 EI 2011年第2期170-176,共7页
The IEEE 802.15.4a standard provides a framework for low-data-rate communication systems,typically sensor networks.In this paper,we established a realistic environment for the time delay characteristic of industrial n... The IEEE 802.15.4a standard provides a framework for low-data-rate communication systems,typically sensor networks.In this paper,we established a realistic environment for the time delay characteristic of industrial network based on IEEE 802.15.4a.Several sets of practical experiments are conducted to study its various features,including the effects of 1) numeral wireless nodes,2) numeral data packets,3) data transmissions with different upper-layer protocols,4) physical distance between nodes,and 5) adding and reducing the number of the wireless nodes.The results show that IEEE 802.15.4a is suitable for some industrial applications that have more relaxed throughput requirements and time-delay.Some issues that could degrade the network performance are also discussed. 展开更多
关键词 Time delay characteristic IEEE 802.15.4a industrial wireless network performance test sensor networks.
下载PDF
Novel MAC Layer Proposal for URLLC in IndustrialWireless Sensor Networks 被引量:2
6
作者 Mohsin Raza Sajjad Hussain +1 位作者 Hoa Le-Minh Nauman Aslam 《ZTE Communications》 2017年第B06期50-59,共10页
Ultra-reliable and low-latency communications(URLLC) has become a fundamental focus of future industrial wireless sensor net-works(IWSNs). With the evolution of automation and process control in industrial environment... Ultra-reliable and low-latency communications(URLLC) has become a fundamental focus of future industrial wireless sensor net-works(IWSNs). With the evolution of automation and process control in industrial environments, the need for increased reliabilityand reduced latencies in wireless communications is even pronounced. Furthermore, the 5G systems specifically target the URLLCin selected areas and industrial automation might turn into a suitable venue for future IWSNs, running 5G as a high speed inter-process linking technology. In this paper, a hybrid multi-channel scheme for performance and throughput enhancement of IWSNsis proposed. The scheme utilizes the multiple frequency channels to increase the overall throughput of the system along with theincrease in reliability. A special purpose frequency channel is defined, which facilitates the failed communications by retransmis-sions where the retransmission slots are allocated according to the priority level of failed communications of different nodes. Ascheduler is used to formulate priority based scheduling for retransmission in TDMA based communication slots of this channel.Furthermore, in carrier-sense multiple access with collision avoidance(CSMA/CA) based slots, a frequency polling is introducedto limit the collisions. Mathematical modelling for performance metrics is also presented. The performance of the proposed schemeis compared with that of IEEE802.15.4e, where the performance is evaluated on the basis of throughput, reliability and the num-ber of nodes accommodated in a cluster. The proposed scheme offers a notable increase in the reliability and throughput over theexisting IEEE802.15.4e Low Latency Deterministic Networks(LLDN) standard. 展开更多
关键词 industrial wireless sensor network(IWSN) IEEE802.15.4e Low Latency Deterministic network(LLDN) low latency communica-tions(LLC) ultra-reliable low latency communication(URLLC)
下载PDF
Incentive allocation of shared property in transportation industries with network characteristics
7
作者 GUO Xue-meng 《Chinese Business Review》 2007年第3期13-20,共8页
Industries with network characteristics always have some special features, which differ from the ordinary business companies. Some scholars hold the theoretical viewpoint that these industries bear the characteristics... Industries with network characteristics always have some special features, which differ from the ordinary business companies. Some scholars hold the theoretical viewpoint that these industries bear the characteristics of natural monopoly, externality, measurement difficulty, etc. However, all these theories can explain why the network industries, especially prominent in transportation industries, are confronted with many difficulties in their process of reform and reorganization. But, there is something deep-seated that can explain why network industries such as railway, highway, aviation, telecommunication, water, gas, etc. have the characteristics of natural monopoly. The paper holds that: (1) Shared property in transportation industries such as the network infrastructure, station and marshalling yard, dispatch and control right, serves more than two enterprises or even hundreds of relative enterprises. (2) Shared property makes it possible for great amount of product quantity to share the sunken cost. Therefore, economy of scale and economy of scope thus exist in transportation sectors, which is called network economy. (3) From the input and output relationships in transportation industries with network features, there exists a law of increasing returns to scale, which is opposite to the classic economy theory that diminishing returns to scale will appear finally. Why? It is because of the existence of shared property. Not only production cost, but also the transaction cost among transportation enterprises can be reduced. (4) We establish a quantitative model to testify the theory. The implication is that, the lack of incentive allocation is, if not all, one reason causing the usage inefficiency of the rights concerned. The low efficiency manifests in two aspects: the first one is the organization boundary, that is, transportation enterprises are not real enterprises at present. The second one is the so-called mixed task equilibrium of railway affairs. We haven't separated the shared property from the private ones. 展开更多
关键词 network industries shared property transportation sector incentive allocation
下载PDF
Design of IEEE1451.5 WTIM for Industrial Network Based on Ubiquitous Sensor Network
8
作者 Joung-han LEE In-ho CHOI Seung-ho HONG 《Journal of Measurement Science and Instrumentation》 CAS 2011年第1期42-46,共5页
Recently, the use of ubiquitous sensor network technology has spread vastly. The ubiquitous sensor networks are widely de- ployed in factory auttxnation as they provide effective measuring solution for instruments. Th... Recently, the use of ubiquitous sensor network technology has spread vastly. The ubiquitous sensor networks are widely de- ployed in factory auttxnation as they provide effective measuring solution for instruments. The wired/wireless network module, which provides the interface to connect to the u-sensor network, is needed but there is no perfect standardization about the interface. In this situation, the interface compatibility between measuring instrument can be maintained using the IEEEI451 international standard. In this paper, the Wireless Transducer Interface Mcduie (WTIM) based on IEEE1451.5 was designed. It coxnects to the measuring instnmnt, like the muiti-meter, power meter, and etc., to support the RS232 interface. As these devices cannot connect to network without a mod- ule, we use the WTIM to help these devices connect to network sys- ton. Its ftmction was verified through the ubiquitous network connection and data transfer between monitoring PC and measuring instrument. This technology is expected to reduce cost in order to construct the wireless industry automation system using existing devices. 展开更多
关键词 wireless industrial network ubiquitous sensor network IEEE1451 WTIM
下载PDF
A routing algorithm for industrial wireless network based on ISA100.11a
9
作者 王平 Yang Lihua +2 位作者 Wang Heng Wu Guanchen Dai Qingchao 《High Technology Letters》 EI CAS 2015年第1期46-53,共8页
ISA100.11 a industrial wireless network standard is based on a deterministic scheduling mechanism.For the timeslot delay caused by deterministic scheduling,a routing algorithm is presented for industrial environments.... ISA100.11 a industrial wireless network standard is based on a deterministic scheduling mechanism.For the timeslot delay caused by deterministic scheduling,a routing algorithm is presented for industrial environments.According to timeslot,superframe,links,channel and data retransmission of deterministic scheduling mechanisms that affect the design of the routing algorithm,the algorithm selects the link quality,timeslot delay and retransmission delay as the routing criteria and finds the optimum communication path by k shortest paths algorithm.Theoretical analysis and experimental verification show that the optimal paths selected by the algorithm not only have high link quality and low retransmission delay,but also meet the requirements of the deterministic scheduling.The algorithm can effectively solve the problem of packet loss and transmission delay during data transmission,and provide a valuable solution for efficient data transmission based on determinacy. 展开更多
关键词 industrial wireless network ISA100.11 a k shortest paths algorithm transmission delay link quality superframe
下载PDF
Dynamic Time Division Multiple Access Algorithm for Industrial Wireless Hierarchical Sensor Networks
10
作者 杨彦红 张晓彤 +1 位作者 罗琼 李文超 《China Communications》 SCIE CSCD 2013年第5期137-145,共9页
Industrial wireless sensor networks adopt a hierarchical structure with large numbers of sensors and routers. Time Division Multiple Access (TDMA) is regarded as an efficient method to reduce the probability of confli... Industrial wireless sensor networks adopt a hierarchical structure with large numbers of sensors and routers. Time Division Multiple Access (TDMA) is regarded as an efficient method to reduce the probability of confliction. In the intra-cluster part, the random color selection method is effective in reducing the retry times in an application. In the inter-cluster part, a quick assign algorithm and a dynamic maximum link algorithm are proposed to meet the quick networking or minimum frame size requirements. In the simulation, the dynamic maximum link algorithm produces higher reductions in the frame length than the quick assign algorithm. When the number of routers is 140, the total number of time slots is reduced by 25%. However, the first algorithm needs more control messages, and the average difference in the number of control messages is 3 410. Consequently, the dynamic maximum link algorithm is utilized for adjusting the link schedule to the minimum delay with a relatively high throughput rate, and the quick assign algorithm is utilized for speeding up the networking process. 展开更多
关键词 TDMA wireless sensor network industrial wireless sensor network
下载PDF
Integrated Architecture for Networking and Industrial Internet Identity
11
作者 LU Hua LI Xiaolu +1 位作者 XIE Renchao FENG Wei 《ZTE Communications》 2020年第1期24-35,共12页
Several excellent works have been done on the industrial Internet;however,some problems are still ahead,such as reliable security,heterogeneous compatibility,and system efficiency.Information-Centric Networking(ICN),a... Several excellent works have been done on the industrial Internet;however,some problems are still ahead,such as reliable security,heterogeneous compatibility,and system efficiency.Information-Centric Networking(ICN),an emerging paradigm for the future Internet,is expected to address the challenges of the industrial Internet to some extent.An integrated architecture for industrial network and identity resolution in the industrial Internet is proposed in this paper.A framework is also designed for the ICN-based industrial Network And Named Data Networking(NDN)based factory extranet with Software-Defined Networking(SDN).Moreover,an identity resolution architecture in the industrial Internet is proposed based on ICN paradigms with separate resolution nodes or with merging resolution and routing. 展开更多
关键词 ICN NDN industrial network industrial Internet identity
下载PDF
Comprehensive Analysis of Secure Data Aggregation Scheme for Industrial Wireless Sensor Network
12
作者 Weidong Fang Wuxiong Zhang +3 位作者 QianQian Zhao Xiaohong Ji Wei Chen Biruk Assefa 《Computers, Materials & Continua》 SCIE EI 2019年第8期583-599,共17页
As an Industrial Wireless Sensor Network(IWSN)is usually deployed in a harsh or unattended environment,the privacy security of data aggregation is facing more and more challenges.Currently,the data aggregation protoco... As an Industrial Wireless Sensor Network(IWSN)is usually deployed in a harsh or unattended environment,the privacy security of data aggregation is facing more and more challenges.Currently,the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating,alternately,the aim at enhancing the security of data.The performances of the secure data aggregation protocols are the trade-off of several metrics,which involves the transmission/fusion,the energy efficiency and the security in Wireless Sensor Network(WSN).Unfortunately,there is no paper in systematic analysis about the performance of the secure data aggregation protocols whether in IWSN or in WSN.In consideration of IWSN,we firstly review the security requirements and techniques in WSN data aggregation in this paper.Then,we give a holistic overview of the classical secure data aggregation protocols,which are divided into three categories:hop-by-hop encrypted data aggregation,end-to-end encrypted data aggregation and unencrypted secure data aggregation.Along this way,combining with the characteristics of industrial applications,we analyze the pros and cons of the existing security schemes in each category qualitatively,and realize that the security and the energy efficiency are suitable for IWSN.Finally,we make the conclusion about the techniques and approach in these categories,and highlight the future research directions of privacy preserving data aggregation in IWSN. 展开更多
关键词 Industrial wireless sensor network wireless sensor network cyber security secure data aggregation protocol
下载PDF
Charging Rate, Imposing and Allowancing Range of Universal Service Fund for Network Industries
13
作者 Bo Xu Zhongyi Zhao 《Chinese Business Review》 2003年第5期42-49,共8页
Universal service obligation of network industries, such as telecommunication, electric power, post, railway, and aviation, has greatly hampered the progress of their marketization reform. Establishing universal servi... Universal service obligation of network industries, such as telecommunication, electric power, post, railway, and aviation, has greatly hampered the progress of their marketization reform. Establishing universal service fund could be an efficient solution. This paper provides a method to calculate the charging rate, imposing and allowancing range of universal service fund for network industries, it also proves the feasibility of accomplishing universal service through universal service fund in network industries. 展开更多
关键词 universal service fund industry network
下载PDF
A New Intrusion Detection Algorithm AE-3WD for Industrial Control Network
14
作者 Yongzhong Li Cong Li +1 位作者 Yuheng Li Shipeng Zhang 《Journal of New Media》 2022年第4期205-217,共13页
In this paper,we propose a intrusion detection algorithm based on auto-encoder and three-way decisions(AE-3WD)for industrial control networks,aiming at the security problem of industrial control network.The ideology o... In this paper,we propose a intrusion detection algorithm based on auto-encoder and three-way decisions(AE-3WD)for industrial control networks,aiming at the security problem of industrial control network.The ideology of deep learning is similar to the idea of intrusion detection.Deep learning is a kind of intelligent algorithm and has the ability of automatically learning.It uses self-learning to enhance the experience and dynamic classification capabilities.We use deep learning to improve the intrusion detection rate and reduce the false alarm rate through learning,a denoising AutoEncoder and three-way decisions intrusion detection method AE-3WD is proposed to improve intrusion detection accuracy.In the processing,deep learning AutoEncoder is used to extract the features of high-dimensional data by combining the coefficient penalty and reconstruction loss function of the encode layer during the training mode.A multi-feature space can be constructed by multiple feature extractions from AutoEncoder,and then a decision for intrusion behavior or normal behavior is made by three-way decisions.NSL-KDD data sets are used to the experiments.The experiment results prove that our proposed method can extract meaningful features and effectively improve the performance of intrusion detection. 展开更多
关键词 Industrial control network security intrusion detection deep learning AutoEncoder three-way decision
下载PDF
Risk Management Situation and Strategic Analysis of Supply Chains of Small and Medium Enterprises in Luzhou Liquor Industry Development Zone
15
作者 Peng Xu 《International Journal of Technology Management》 2016年第7期64-67,共4页
After entering the information-based society, profound reform has happened in the business pattern of enterprises, and thecompetitive mode between traditional enterprises has been transformed into the competition betw... After entering the information-based society, profound reform has happened in the business pattern of enterprises, and thecompetitive mode between traditional enterprises has been transformed into the competition between supply chains in nowadays. The liquorindustry in Luzhou is the pillar industry of economy, which involves “Luzhou Old Cellar”, “Ichiro Liquor”and other large-scale enterpriseswith well-known brands. Besides, many small and medium-sized enterprises are developing and flourishing in Luzhou. Compared with thedevelopment of large enterprises, the development of small and medium sized enterprises has more uncertainty and risks. At present, Luzhou Cityis setting about to build Huangyi into a liquor centralized zone, which is also a clusterization strategy for industry development of Luzhou liquor.For Luzhou Liquor Zone, the implementation of supply chain management of small and medium-sized enterprises can greatly reduce the cost ofenterprises and improve effi ciency of operation. The growth and development of small and medium-sized enterprises in Luzhou Liquor Zone andthe promotion of advantages of industrial clusters are closely related to the risks of the supply chain. 展开更多
关键词 Risk Management of Supply Chain network Type Supply Chain of Liquor industry Development Zone Risk Prevention ofSupply Chain
下载PDF
AI-Driven FBMC-OQAM Signal Recognition via Transform Channel Convolution Strategy
16
作者 Zeliang An Tianqi Zhang +3 位作者 Debang Liu Yuqing Xu Gert Frølund Pedersen Ming Shen 《Computers, Materials & Continua》 SCIE EI 2023年第9期2817-2834,共18页
With the advent of the Industry 5.0 era,the Internet of Things(IoT)devices face unprecedented proliferation,requiring higher communications rates and lower transmission delays.Considering its high spectrum efficiency,... With the advent of the Industry 5.0 era,the Internet of Things(IoT)devices face unprecedented proliferation,requiring higher communications rates and lower transmission delays.Considering its high spectrum efficiency,the promising filter bank multicarrier(FBMC)technique using offset quadrature amplitude modulation(OQAM)has been applied to Beyond 5G(B5G)industry IoT networks.However,due to the broadcasting nature of wireless channels,the FBMC-OQAMindustry IoT network is inevitably vulnerable to adversary attacks frommalicious IoT nodes.The FBMC-OQAMindustry cognitive radio network(ICRNet)is proposed to ensure security at the physical layer to tackle the above challenge.As a pivotal step of ICRNet,blind modulation recognition(BMR)can detect and recognize the modulation type of malicious signals.The previous works need to accomplish the BMR task of FBMC-OQAM signals in ICRNet nodes.A novel FBMC BMR algorithm is proposed with the transform channel convolution network(TCCNet)rather than a complicated two-dimensional convolution.Firstly,this is achieved by designing a low-complexity binary constellation diagram(BCD)gridding matrix as the input of TCCNet.Then,a transform channel convolution strategy is developed to convert the image-like BCD matrix into a serieslike data format,accelerating the BMR process while keeping discriminative features.Monte Carlo experimental results demonstrate that the proposed TCCNet obtains a performance gain of 8%and 40%over the traditional inphase/quadrature(I/Q)-based and constellation diagram(CD)-based methods at a signal noise ratio(SNR)of 12 dB,respectively.Moreover,the proposed TCCNet can achieve around 29.682 and 2.356 times faster than existing CD-Alex Network(CD-AlexNet)and I/Q-Convolutional Long Deep Neural Network(I/Q-CLDNN)algorithms,respectively. 展开更多
关键词 Intelligent signal recognition FBMC-OQAM industrial cognitive radio networks binary constellation diagram transform channel convolution
下载PDF
Dragonfly Interaction Algorithm for Optimization of Queuing Delay in Industrial Wireless Networks
17
作者 Sanjay Bhardwaj Da-Hye Kim Dong-Seong Kim 《Journal of Bionic Engineering》 SCIE EI CSCD 2024年第1期447-485,共39页
In industrial wireless networks,data transmitted from source to destination are highly repetitive.This often leads to the queuing of the data,and poor management of the queued data results in excessive delays,increase... In industrial wireless networks,data transmitted from source to destination are highly repetitive.This often leads to the queuing of the data,and poor management of the queued data results in excessive delays,increased energy consumption,and packet loss.Therefore,a nature-inspired-based Dragonfly Interaction Optimization Algorithm(DMOA)is proposed for optimization of the queue delay in industrial wireless networks.The term“interaction”herein used is the characterization of the“flying movement”of the dragonfly towards damselflies(female dragonflies)for mating.As a result,interaction is represented as the flow of transmitted data packets,or traffic,from the source to the base station.This includes each and every feature of dragonfly movement as well as awareness of the rival dragonflies,predators,and damselflies for the desired optimization of the queue delay.These features are juxtaposed as noise and interference,which are further used in the calculation of industrial wireless metrics:latency,error rate(reliability),throughput,energy efficiency,and fairness for the optimization of the queue delay.Statistical analysis,convergence analysis,the Wilcoxon test,the Friedman test,and the classical as well as the 2014 IEEE Congress of Evolutionary Computation(CEC)on the benchmark functions are also used for the evaluation of DMOA in terms of its robustness and efficiency.The results demonstrate the robustness of the proposed algorithm for both classical and benchmarking functions of the IEEE CEC 2014.Furthermore,the accuracy and efficacy of DMOA were demonstrated by means of the convergence rate,Wilcoxon testing,and ANOVA.Moreover,fairness using Jain’s index in queue delay optimization in terms of throughput and latency,along with computational complexity,is also evaluated and compared with other algorithms.Simulation results show that DMOA exceeds other bio-inspired optimization algorithms in terms of fairness in queue delay management and average packet loss.The proposed algorithm is also evaluated for the conflicting objectives at Pareto Front,and its analysis reveals that DMOA finds a compromising solution between the objectives,thereby optimizing queue delay.In addition,DMOA on the Pareto front delivers much greater performance when it comes to optimizing the queuing delay for industry wireless networks. 展开更多
关键词 DRAGONFLY DAMSELFLY INTERACTION Queuing delay OPTIMIZATION Industrial wireless networks
原文传递
Edge Cloud Selection in Mobile Edge Computing(MEC)-Aided Applications for Industrial Internet of Things(IIoT)Services
18
作者 Dae-Young Kim SoYeon Lee +1 位作者 MinSeung Kim Seokhoon Kim 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2049-2060,共12页
In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to im... In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method. 展开更多
关键词 Industrial Internet of Things(IIoT)network IIoT service mobile edge computing(MEC) edge cloud selection MEC-aided application
下载PDF
Intelligent Manufacturing Systems in COVID‑19 Pandemic and Beyond:Framework and Impact Assessment 被引量:4
19
作者 Xingyu Li Baicun Wang +2 位作者 Chao Liu Theodor Freiheit Bogdan I.Epureanu 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2020年第4期1-5,共5页
Pandemics like COVID-19 have created a spreading and ever-higher healthy threat to the humans in the manufacturing system which incurs severe disruptions and complex issues to industrial networks.The intelligent manuf... Pandemics like COVID-19 have created a spreading and ever-higher healthy threat to the humans in the manufacturing system which incurs severe disruptions and complex issues to industrial networks.The intelligent manufacturing(IM)systems are promising to create a safe working environment by using the automated manufacturing assets which are monitored by the networked sensors and controlled by the intelligent decision-making algorithms.The relief of the production disruption by IM technologies facilitates the reconnection of the good and service flows in the network,which mitigates the severity of industrial chain disruption.In this study,we create a novel intelligent manufacturing framework for the production recovery under the pandemic and build an assessment model to evaluate the impacts of the IM technologies on industrial networks.Considering the constraints of the IM resources,we formulate an optimization model to schedule the allocation of IM resources according to the mutual market demands and the severity of the pandemic. 展开更多
关键词 Intelligent manufacturing system COVID-19 pandemic Industrial network Supply chain disruption OPTIMIZATION
下载PDF
A new real-time ethernet MAC protocol for time-critical applications 被引量:1
20
作者 沈钢 许晓鸣 +2 位作者 蔡云泽 何星 张卫东 《Journal of Central South University of Technology》 EI 2002年第1期54-58,共5页
The authors propose a new persistent transmission based real time Ethernet MAC protocol that provides a predictable upper bound for the delivery delay of real time frames. Moreover, it is compatible with the protocol ... The authors propose a new persistent transmission based real time Ethernet MAC protocol that provides a predictable upper bound for the delivery delay of real time frames. Moreover, it is compatible with the protocol used by the existing Ethernet controllers for conventional datagram traffic and thus standard Ethernet stations can be used in the system without any modification. The paper describes the protocol in detail and analyses the maximum delivery delay for real time traffic and the efficiency of the channel. 展开更多
关键词 real time ETHERNET multiple access protocol industrial control networks
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部