Aim To achieve multitask data procssing in a wireless alarm system by computer. Methods The alarm system was composed of hardware and software. The hardware was composed of a master master computer and slave transmi...Aim To achieve multitask data procssing in a wireless alarm system by computer. Methods The alarm system was composed of hardware and software. The hardware was composed of a master master computer and slave transmitters. On urgent ugent occasion, one or more of the transmitters transmitted alarm signals and the master computer received the signals; interruption, residence, graph and word processing were utilized in software to achieve multitiask data processing . Results The main computer can conduct precise and quick multitask data procesing in any condition so long as alarm signals are received. The processing speed is higher than ordinary alarm System. Conclusion The master computer can conduct safe and quick multitask data processing by way of reliable design of software and hardware , so there is no need of special processor.展开更多
Wireless communication with unmanned aerial vehicles(UAVs) has aroused great research interest recently. This paper is concerned with the UAV's trajectory planning problem for secrecy energy efficiency maximizatio...Wireless communication with unmanned aerial vehicles(UAVs) has aroused great research interest recently. This paper is concerned with the UAV's trajectory planning problem for secrecy energy efficiency maximization(SEEM) in the UAV communication system. Specifically, we jointly consider the secrecy throughput and UAV's energy consumption in a three-node(fixed-wing UAV-aided source, destination, and eavesdropper) wiretap channel. By ignoring the energy consumption on radiation and signal processing, the system's secrecy energy efficiency is defined as the total secrecy rate normalized by the UAV's propulsion energy consumption within a given time horizon. Nonetheless, the SEEM problem is nonconvex and thus is intractable to solve. As a compromise, we propose an iterative algorithm based on sequential convex programming(SCP) and Dinkelbach's method to seek a suboptimal solution for SEEM. The algorithm only needs to solve convex problems, and thus is computationally efficient to implement. Additionally, we prove that the proposed algorithm has Karush-KuhnTucker(KKT) point convergence guarantee. Lastly, simulation results demonstrate the efficacy of our proposed algorithm in improving the secrecy energy efficiency for the UAV communication system.展开更多
A scalable communication mechanism is proposed for service emergence based on bio-network.Service emergence is a novel model inspired by the characteristics of emergence and self-evolution in biological neuroendocrine...A scalable communication mechanism is proposed for service emergence based on bio-network.Service emergence is a novel model inspired by the characteristics of emergence and self-evolution in biological neuroendocrine and immune system,emergent communication means a group communication of mobile bio-entities.A series of protocol and algorithm are presented within frequently bio-entities migration and failure,it includes distribution and parallelization of message propagation method,a token-ring protocol that considerably improves the performance of emergence,and failure detection mechanisms.Experiment results show the desired capability via the proposed solution.展开更多
In the research of elastic wave signal detection algorithm, a method based on adaptive wavelet analysis and segmentation threshold processing of the channel noise removal methods is suggested to overcome the effect of...In the research of elastic wave signal detection algorithm, a method based on adaptive wavelet analysis and segmentation threshold processing of the channel noise removal methods is suggested to overcome the effect of noise, which is prcduced by absorption loss, scattering loss, reflection loss and multi-path effect during the elastic wave in the transmission undelgroound. The method helps to realize extraction and recovery of weak signal of elastic wave from the multi-path channel, and simulation study is carded out about wavelet de-noising effects of the elastic wave and obtained satisfactory results.展开更多
The current massive use of digital communications demands a secure link by using an embedded system(ES) with data encryption at the protocol level. The serial peripheral interface(SPI) protocol is commonly used by...The current massive use of digital communications demands a secure link by using an embedded system(ES) with data encryption at the protocol level. The serial peripheral interface(SPI) protocol is commonly used by manufacturers of ESs and integrated circuits for applications in areas such as wired and wireless communications. We present the design and experimental implementation of a chaotic encryption and decryption algorithm applied to the SPI communication protocol. The design of the chaotic encryption algorithm along with its counterpart in the decryption is based on the chaotic Hénon map and two methods for blur and permute(in combination with DNA sequences). The SPI protocol is configured in 16 bits to synchronize a transmitter and a receiver considering a symmetric key. Results are experimentally proved using two low-cost dsPIC microcontrollers as ESs. The SPI digital-to-analog converter is used to process, acquire, and reconstruct confidential messages based on its properties for digital signal processing. Finally, security of the cryptogram is proved by a statistical test. The digital processing capacity of the algorithm is validated by dsPIC microcontrollers.展开更多
文摘Aim To achieve multitask data procssing in a wireless alarm system by computer. Methods The alarm system was composed of hardware and software. The hardware was composed of a master master computer and slave transmitters. On urgent ugent occasion, one or more of the transmitters transmitted alarm signals and the master computer received the signals; interruption, residence, graph and word processing were utilized in software to achieve multitiask data processing . Results The main computer can conduct precise and quick multitask data procesing in any condition so long as alarm signals are received. The processing speed is higher than ordinary alarm System. Conclusion The master computer can conduct safe and quick multitask data processing by way of reliable design of software and hardware , so there is no need of special processor.
基金supported in part by the National Natural Science Foundation of China under Grant 61631004 and 61571089
文摘Wireless communication with unmanned aerial vehicles(UAVs) has aroused great research interest recently. This paper is concerned with the UAV's trajectory planning problem for secrecy energy efficiency maximization(SEEM) in the UAV communication system. Specifically, we jointly consider the secrecy throughput and UAV's energy consumption in a three-node(fixed-wing UAV-aided source, destination, and eavesdropper) wiretap channel. By ignoring the energy consumption on radiation and signal processing, the system's secrecy energy efficiency is defined as the total secrecy rate normalized by the UAV's propulsion energy consumption within a given time horizon. Nonetheless, the SEEM problem is nonconvex and thus is intractable to solve. As a compromise, we propose an iterative algorithm based on sequential convex programming(SCP) and Dinkelbach's method to seek a suboptimal solution for SEEM. The algorithm only needs to solve convex problems, and thus is computationally efficient to implement. Additionally, we prove that the proposed algorithm has Karush-KuhnTucker(KKT) point convergence guarantee. Lastly, simulation results demonstrate the efficacy of our proposed algorithm in improving the secrecy energy efficiency for the UAV communication system.
基金Supported in part by the Key Project of the National Nature Science Foundation of China(No.60534020)the National Nature Science Foundation of China(No.60474037)Programfor New Century Excellent Talents in University(No.NCET-04-415)
文摘A scalable communication mechanism is proposed for service emergence based on bio-network.Service emergence is a novel model inspired by the characteristics of emergence and self-evolution in biological neuroendocrine and immune system,emergent communication means a group communication of mobile bio-entities.A series of protocol and algorithm are presented within frequently bio-entities migration and failure,it includes distribution and parallelization of message propagation method,a token-ring protocol that considerably improves the performance of emergence,and failure detection mechanisms.Experiment results show the desired capability via the proposed solution.
文摘In the research of elastic wave signal detection algorithm, a method based on adaptive wavelet analysis and segmentation threshold processing of the channel noise removal methods is suggested to overcome the effect of noise, which is prcduced by absorption loss, scattering loss, reflection loss and multi-path effect during the elastic wave in the transmission undelgroound. The method helps to realize extraction and recovery of weak signal of elastic wave from the multi-path channel, and simulation study is carded out about wavelet de-noising effects of the elastic wave and obtained satisfactory results.
基金Project supported by the CONACYT,México(No.166654)
文摘The current massive use of digital communications demands a secure link by using an embedded system(ES) with data encryption at the protocol level. The serial peripheral interface(SPI) protocol is commonly used by manufacturers of ESs and integrated circuits for applications in areas such as wired and wireless communications. We present the design and experimental implementation of a chaotic encryption and decryption algorithm applied to the SPI communication protocol. The design of the chaotic encryption algorithm along with its counterpart in the decryption is based on the chaotic Hénon map and two methods for blur and permute(in combination with DNA sequences). The SPI protocol is configured in 16 bits to synchronize a transmitter and a receiver considering a symmetric key. Results are experimentally proved using two low-cost dsPIC microcontrollers as ESs. The SPI digital-to-analog converter is used to process, acquire, and reconstruct confidential messages based on its properties for digital signal processing. Finally, security of the cryptogram is proved by a statistical test. The digital processing capacity of the algorithm is validated by dsPIC microcontrollers.