The research for remote monitoring of bridges is expected to develop methodologies and tools for collecting state data, monitoring the real-time status of the bridge from distance, and more importantly seeking a best ...The research for remote monitoring of bridges is expected to develop methodologies and tools for collecting state data, monitoring the real-time status of the bridge from distance, and more importantly seeking a best way for remote transmission of bridge monitoring system by comparing the characteristics of each scheme. This paper focuses on the solutions to remote transmission for state monitoring of bridges, which deals with the remote transmission system based on PSTN (Public Service Telephone Network), wireless sensor monitoring system and remote transmission using SDH (Synchronous Digital Hierarchy) network. As a result, a combination of wireless sensor monitoring system and the remote sensing system using SDH network is proposed to be the considered way for remote state monitoring of bridges.展开更多
A control scheme that integrates control technology with communication technology to solve the delay problem is introduced for a class of networked control systems: Networked Half-Link Systems (NHLS). Concretely, we u...A control scheme that integrates control technology with communication technology to solve the delay problem is introduced for a class of networked control systems: Networked Half-Link Systems (NHLS). Concretely, we use the master-slave clock synchronization technology to evaluate the delays online, and then the LQ optimal control based on delays is adopted to stabilize the controlled plant. During the clock synchronization process, the error of evaluated delays is inevitably induced from the clock synchronization error, which will deteriorate the system performances, and even make system unstable in certain cases. Hence, the discussions about the clock error, and the related control analysis and design are also developed. Specifically, we present the sufficient conditions of controller parameters that guarantee the system stability, and a controller design method based on the error of delays is addressed thereafter. The experiments based on a CANbus platform are fulfilled, and the experimental results verify the previous analytic results finally.展开更多
The wireless mesh networks trathc are of selt:snmlarlty and the network pertOrmance is degraded by seltsimillar traffic. Network coding is a new technology which improves network performance. An algorithm is presente...The wireless mesh networks trathc are of selt:snmlarlty and the network pertOrmance is degraded by seltsimillar traffic. Network coding is a new technology which improves network performance. An algorithm is presented that it uses network coding to reduce queue length and delay time when self-similar traffic occurs. Based on synchronization, data packets are classified by destination address and lengths. Simulation results show that with the proposed synchronization techniques, network coding, even in scenarios with burst self-similar traffic, where network coding could not have been deployed so far, increases throughput and lowers packet loss in wireless mesh networks.展开更多
Complex cyber-physical network refers to a new generatio~ of complex networks whose normal functioning significantly relies on tight interactions between its physical and cyber compo- nents. Many modern critical infra...Complex cyber-physical network refers to a new generatio~ of complex networks whose normal functioning significantly relies on tight interactions between its physical and cyber compo- nents. Many modern critical infrastructures can be appropriately modelled as complex cyber-physical networks. Typical examples of such infrastructures are electrical power grids, WWW, public trans- portation systems, state financial networks, and the Interact. These critical facilities play important roles in ensuring the stability of society as well as the development of economy. Advances in informa- tion and communication technology open opportunities for malicious attackers to launch coordinated attacks on cyber-physical critical facilities in networked infrastructures from any Interact-accessible place. Cybersecurity of complex cyber-physical networks has emerged as a hot topic within this con- text. In practice, it is also very crucial to understand the interplay between the evolution of underlying network structures and the collective dynamics on these complex networks and consequently to design efficient security control strategies to protect the evolution of these networks. In this paper, cybersecu- rity of complex cyber-physical networks is first outlined and then some security enhancing techniques, with particular emphasis on safety communications, attack detection and fault-tolerant control, are suggested. Furthermore, a new class of efficient secure the achievement of desirable pinning synchronization control strategies are proposed for guaranteeing behaviors in complex cyber-physical networks against malicious attacks on nodes. The authors hope that this paper motivates to design enhanced security strategies for complex cyber-physical network systems, to realize resilient and secure critical infrastructures.展开更多
基金the National Key Technologies R&D Program (No. 2002BA105C)
文摘The research for remote monitoring of bridges is expected to develop methodologies and tools for collecting state data, monitoring the real-time status of the bridge from distance, and more importantly seeking a best way for remote transmission of bridge monitoring system by comparing the characteristics of each scheme. This paper focuses on the solutions to remote transmission for state monitoring of bridges, which deals with the remote transmission system based on PSTN (Public Service Telephone Network), wireless sensor monitoring system and remote transmission using SDH (Synchronous Digital Hierarchy) network. As a result, a combination of wireless sensor monitoring system and the remote sensing system using SDH network is proposed to be the considered way for remote state monitoring of bridges.
文摘A control scheme that integrates control technology with communication technology to solve the delay problem is introduced for a class of networked control systems: Networked Half-Link Systems (NHLS). Concretely, we use the master-slave clock synchronization technology to evaluate the delays online, and then the LQ optimal control based on delays is adopted to stabilize the controlled plant. During the clock synchronization process, the error of evaluated delays is inevitably induced from the clock synchronization error, which will deteriorate the system performances, and even make system unstable in certain cases. Hence, the discussions about the clock error, and the related control analysis and design are also developed. Specifically, we present the sufficient conditions of controller parameters that guarantee the system stability, and a controller design method based on the error of delays is addressed thereafter. The experiments based on a CANbus platform are fulfilled, and the experimental results verify the previous analytic results finally.
基金Supported by the National Natural Science Foundation of China (60873082,61073186, 61073104, 60903058) China Postdoctoral Science Foundation (20090451108)the Science and Technology Planning Project of Hunan Province (2011FJ3237).
文摘The wireless mesh networks trathc are of selt:snmlarlty and the network pertOrmance is degraded by seltsimillar traffic. Network coding is a new technology which improves network performance. An algorithm is presented that it uses network coding to reduce queue length and delay time when self-similar traffic occurs. Based on synchronization, data packets are classified by destination address and lengths. Simulation results show that with the proposed synchronization techniques, network coding, even in scenarios with burst self-similar traffic, where network coding could not have been deployed so far, increases throughput and lowers packet loss in wireless mesh networks.
基金supported by the National Key Research and Development Program of China under Grant No.2016YFB0800401the National Nature Science Foundation of China under Grant Nos.61304168,61673104,and 61322302+3 种基金the Natural Science Foundation of Jiangsu Province of China under Grant No.BK20130595the National Ten Thousand Talent Program for Young Top-Notch Talents,the Six Talent Peaks of Jiangsu Province of China under Grant No.2014-DZXX-004the Doctoral Program of Higher Education of China under Grant No.20130092120030the Fundamental Research Funds for the Central Universities of China under Grant No.2242016K41030
文摘Complex cyber-physical network refers to a new generatio~ of complex networks whose normal functioning significantly relies on tight interactions between its physical and cyber compo- nents. Many modern critical infrastructures can be appropriately modelled as complex cyber-physical networks. Typical examples of such infrastructures are electrical power grids, WWW, public trans- portation systems, state financial networks, and the Interact. These critical facilities play important roles in ensuring the stability of society as well as the development of economy. Advances in informa- tion and communication technology open opportunities for malicious attackers to launch coordinated attacks on cyber-physical critical facilities in networked infrastructures from any Interact-accessible place. Cybersecurity of complex cyber-physical networks has emerged as a hot topic within this con- text. In practice, it is also very crucial to understand the interplay between the evolution of underlying network structures and the collective dynamics on these complex networks and consequently to design efficient security control strategies to protect the evolution of these networks. In this paper, cybersecu- rity of complex cyber-physical networks is first outlined and then some security enhancing techniques, with particular emphasis on safety communications, attack detection and fault-tolerant control, are suggested. Furthermore, a new class of efficient secure the achievement of desirable pinning synchronization control strategies are proposed for guaranteeing behaviors in complex cyber-physical networks against malicious attacks on nodes. The authors hope that this paper motivates to design enhanced security strategies for complex cyber-physical network systems, to realize resilient and secure critical infrastructures.