期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
下位机PLC与上位机PC的通讯处理研究 被引量:1
1
作者 彭召升 宋诚 李俊杰 《软件导刊》 2007年第8期30-31,共2页
介绍了PC与PLC的通讯技术以及在监控系统中的应用。阐述了MPI网络中PC与PLC之间数据交换的实现过程,并给出了相应的通讯程序实例。
关键词 监控系统 MPI 可编程逻辑控制器 工业控制计算机 通讯处理
下载PDF
通讯处理中的密码技术 被引量:1
2
作者 王立群 王成明 《基础自动化》 CSCD 1997年第5期52-53,共2页
关键词 密码 通讯处理 共有键密码 公开键密码
下载PDF
一种相控阵雷达的通讯处理器设计
3
作者 王梅 董荣 《电子制作》 2019年第24期9-11,共3页
本文介绍一种基于FPGA嵌入式可编程逻辑芯片的通讯处理器,该通讯处理器是二维相控阵雷达的重要组成部分,可转发主控分系统对天线车各种设备的控制信息、控制参数、触发同步,监视高频箱温湿度等各设备状态信息,对各分系统进行监测、控制... 本文介绍一种基于FPGA嵌入式可编程逻辑芯片的通讯处理器,该通讯处理器是二维相控阵雷达的重要组成部分,可转发主控分系统对天线车各种设备的控制信息、控制参数、触发同步,监视高频箱温湿度等各设备状态信息,对各分系统进行监测、控制和异常情况下的保护。 展开更多
关键词 通讯处理 FPGA 控制检测
下载PDF
Multitask Data Processing in a Wireless Alarm System
4
作者 刘杰 韩月秋 宋雯霞 《Journal of Beijing Institute of Technology》 EI CAS 1998年第3期311-315,共5页
Aim To achieve multitask data procssing in a wireless alarm system by computer. Methods The alarm system was composed of hardware and software. The hardware was composed of a master master computer and slave transmi... Aim To achieve multitask data procssing in a wireless alarm system by computer. Methods The alarm system was composed of hardware and software. The hardware was composed of a master master computer and slave transmitters. On urgent ugent occasion, one or more of the transmitters transmitted alarm signals and the master computer received the signals; interruption, residence, graph and word processing were utilized in software to achieve multitiask data processing . Results The main computer can conduct precise and quick multitask data procesing in any condition so long as alarm signals are received. The processing speed is higher than ordinary alarm System. Conclusion The master computer can conduct safe and quick multitask data processing by way of reliable design of software and hardware , so there is no need of special processor. 展开更多
关键词 alarm system COMMUNICATION multitasks processing INTERRUPTION RESIDENCE
下载PDF
Energy-Efficient Trajectory Planning for UAV-Aided Secure Communication 被引量:13
5
作者 Qian Wang Zhi Chen Hang Li 《China Communications》 SCIE CSCD 2018年第5期51-60,共10页
Wireless communication with unmanned aerial vehicles(UAVs) has aroused great research interest recently. This paper is concerned with the UAV's trajectory planning problem for secrecy energy efficiency maximizatio... Wireless communication with unmanned aerial vehicles(UAVs) has aroused great research interest recently. This paper is concerned with the UAV's trajectory planning problem for secrecy energy efficiency maximization(SEEM) in the UAV communication system. Specifically, we jointly consider the secrecy throughput and UAV's energy consumption in a three-node(fixed-wing UAV-aided source, destination, and eavesdropper) wiretap channel. By ignoring the energy consumption on radiation and signal processing, the system's secrecy energy efficiency is defined as the total secrecy rate normalized by the UAV's propulsion energy consumption within a given time horizon. Nonetheless, the SEEM problem is nonconvex and thus is intractable to solve. As a compromise, we propose an iterative algorithm based on sequential convex programming(SCP) and Dinkelbach's method to seek a suboptimal solution for SEEM. The algorithm only needs to solve convex problems, and thus is computationally efficient to implement. Additionally, we prove that the proposed algorithm has Karush-KuhnTucker(KKT) point convergence guarantee. Lastly, simulation results demonstrate the efficacy of our proposed algorithm in improving the secrecy energy efficiency for the UAV communication system. 展开更多
关键词 physical layer security UAV-aided communications secrecy energy efficiency trajectory planning
下载PDF
A Scalable Communication Mechanism in Service Emergence Based on Bio-network
6
作者 孙宏彬 丁永生 《Journal of Donghua University(English Edition)》 EI CAS 2008年第4期384-388,共5页
A scalable communication mechanism is proposed for service emergence based on bio-network.Service emergence is a novel model inspired by the characteristics of emergence and self-evolution in biological neuroendocrine... A scalable communication mechanism is proposed for service emergence based on bio-network.Service emergence is a novel model inspired by the characteristics of emergence and self-evolution in biological neuroendocrine and immune system,emergent communication means a group communication of mobile bio-entities.A series of protocol and algorithm are presented within frequently bio-entities migration and failure,it includes distribution and parallelization of message propagation method,a token-ring protocol that considerably improves the performance of emergence,and failure detection mechanisms.Experiment results show the desired capability via the proposed solution. 展开更多
关键词 service emergence COMMUNICATION bio-entity PROTOCOL
下载PDF
Study of Signal Processing Algorithm in the Receiving End of Through-the-Earth Communications of Elastic Wave
7
作者 郭银景 杨军 +1 位作者 穆卫涛 陈赓 《Journal of Measurement Science and Instrumentation》 CAS 2010年第2期166-169,共4页
In the research of elastic wave signal detection algorithm, a method based on adaptive wavelet analysis and segmentation threshold processing of the channel noise removal methods is suggested to overcome the effect of... In the research of elastic wave signal detection algorithm, a method based on adaptive wavelet analysis and segmentation threshold processing of the channel noise removal methods is suggested to overcome the effect of noise, which is prcduced by absorption loss, scattering loss, reflection loss and multi-path effect during the elastic wave in the transmission undelgroound. The method helps to realize extraction and recovery of weak signal of elastic wave from the multi-path channel, and simulation study is carded out about wavelet de-noising effects of the elastic wave and obtained satisfactory results. 展开更多
关键词 through-tbe-earth oommunications of elastic wave weak signal detection adaptive wavelet analysis
下载PDF
Chaotic digital cryptosystem using serial peripheral interface protocol and its ds PIC implementation 被引量:1
8
作者 Rodrigo MéNDEZ-RAMíREZ Adrian ARELLANO-DELGADO +2 位作者 César CRUZ-HERNáNDEZ Fausto ABUNDIZ-PéREZ Rigoberto MARTíNEZ-CLARK 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第2期165-179,共15页
The current massive use of digital communications demands a secure link by using an embedded system(ES) with data encryption at the protocol level. The serial peripheral interface(SPI) protocol is commonly used by... The current massive use of digital communications demands a secure link by using an embedded system(ES) with data encryption at the protocol level. The serial peripheral interface(SPI) protocol is commonly used by manufacturers of ESs and integrated circuits for applications in areas such as wired and wireless communications. We present the design and experimental implementation of a chaotic encryption and decryption algorithm applied to the SPI communication protocol. The design of the chaotic encryption algorithm along with its counterpart in the decryption is based on the chaotic Hénon map and two methods for blur and permute(in combination with DNA sequences). The SPI protocol is configured in 16 bits to synchronize a transmitter and a receiver considering a symmetric key. Results are experimentally proved using two low-cost dsPIC microcontrollers as ESs. The SPI digital-to-analog converter is used to process, acquire, and reconstruct confidential messages based on its properties for digital signal processing. Finally, security of the cryptogram is proved by a statistical test. The digital processing capacity of the algorithm is validated by dsPIC microcontrollers. 展开更多
关键词 Chaotic systems Statistical tests Embedded systems dsPIC microcontroller Serial peripheral interface (SPI)protocol
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部