期刊文献+
共找到19篇文章
< 1 >
每页显示 20 50 100
Neural-Network-Based Control for Discrete-Time Nonlinear Systems with Input Saturation Under Stochastic Communication Protocol 被引量:10
1
作者 Xueli Wang Derui Ding +1 位作者 Hongli Dong Xian-Ming Zhang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第4期766-778,共13页
In this paper,an adaptive dynamic programming(ADP)strategy is investigated for discrete-time nonlinear systems with unknown nonlinear dynamics subject to input saturation.To save the communication resources between th... In this paper,an adaptive dynamic programming(ADP)strategy is investigated for discrete-time nonlinear systems with unknown nonlinear dynamics subject to input saturation.To save the communication resources between the controller and the actuators,stochastic communication protocols(SCPs)are adopted to schedule the control signal,and therefore the closed-loop system is essentially a protocol-induced switching system.A neural network(NN)-based identifier with a robust term is exploited for approximating the unknown nonlinear system,and a set of switch-based updating rules with an additional tunable parameter of NN weights are developed with the help of the gradient descent.By virtue of a novel Lyapunov function,a sufficient condition is proposed to achieve the stability of both system identification errors and the update dynamics of NN weights.Then,a value iterative ADP algorithm in an offline way is proposed to solve the optimal control of protocol-induced switching systems with saturation constraints,and the convergence is profoundly discussed in light of mathematical induction.Furthermore,an actor-critic NN scheme is developed to approximate the control law and the proposed performance index function in the framework of ADP,and the stability of the closed-loop system is analyzed in view of the Lyapunov theory.Finally,the numerical simulation results are presented to demonstrate the effectiveness of the proposed control scheme. 展开更多
关键词 Adaptive dynamic programming(ADP) constrained inputs neural network(NN) stochastic communication protocols(SCPs) suboptimal control
下载PDF
ICPFuzzer:proprietary communication protocol fuzzing by using machine learning and feedback strategies 被引量:2
2
作者 Pei-Yi Lin Chia-Wei Tien +1 位作者 Ting-Chun Huang Chin-Wei Tien 《Cybersecurity》 EI CSCD 2021年第1期427-441,共15页
The fuzzing test is able to discover various vulnerabilities and has more chances to hit the zero-day targets.And ICS(Industrial control system)is currently facing huge security threats and requires security standards... The fuzzing test is able to discover various vulnerabilities and has more chances to hit the zero-day targets.And ICS(Industrial control system)is currently facing huge security threats and requires security standards,like ISO 62443,to ensure the quality of the device.However,some industrial proprietary communication protocols can be customized and have complicated structures,the fuzzing system cannot quickly generate test data that adapt to various protocols.It also struggles to define the mutation field without having prior knowledge of the protocols.Therefore,we propose a fuzzing system named ICPFuzzer that uses LSTM(Long short-term memory)to learn the features of a protocol and generates mutated test data automatically.We also use the responses of testing and adjust the weight strategies to further test the device under testing(DUT)to find more data that cause unusual connection status.We verified the effectiveness of the approach by comparing with the open-source and commercial fuzzers.Furthermore,in a real case,we experimented with the DLMS/COSEM for a smart meter and found that the test data can cause a unusual response.In summary,ICPFuzzer is a black-box fuzzing system that can automatically execute the testing process and reveal vulnerabilities that interrupt and crash industrial control communication.Not only improves the quality of ICS but also improves safety. 展开更多
关键词 Industrial communication protocol Network protocol fuzzing Long short-term memory(LSTM) Industrial control system(ICS)
原文传递
Manufacturing Communication: DCOM-MMS-based Approach for Flexible Manufacturing System
3
作者 周炳海 余传猛 曹永上 《Journal of Donghua University(English Edition)》 EI CAS 2005年第4期36-40,共5页
A design approach of manufacturing communication is presented for flexible manufacturing system in this paper. The primary objective aims at making the flexible manufacturing control system provided with interoperabil... A design approach of manufacturing communication is presented for flexible manufacturing system in this paper. The primary objective aims at making the flexible manufacturing control system provided with interoperability and reconfigurability. Based on describing manufacturing message specification (MMS) and distributed component object model (DCOM), a client/server manufacturing communication model is built with MMS standard and DCOM middleware, and the communication interfaces between MMS client and MMS server are designed with Microsoft interface definition language (MIDL) and abstract syntax notation one (ASN.1) of MMS services. As a result, DCOM and MMS integration leads to such client/ server communication capabilities independent of different operating systems and manufacturing devices in flexible manufacturing automation environment. Finally, to verify the new design approach, a prototype system of robot control system has been implemented in MS 2000 Server/Professional Operating System and VC++ 6.0 Developer Environments. 展开更多
关键词 Flexible manufacturing system manufacturing message specification distributed object communication protocol control system.
下载PDF
A Reliability Aware Protocol for Cooperative Communication in Cognitive Radio Networks 被引量:1
4
作者 Munam Ali Shah Si-Jing Zhang Hong-Ji Yang 《International Journal of Automation and computing》 EI CSCD 2019年第1期84-92,共9页
One of the challenging tasks in cognitive radio(CR) networks is to agree on a common control channel to exchange control information. This paper presents a novel medium access control(MAC) protocol for CR network whic... One of the challenging tasks in cognitive radio(CR) networks is to agree on a common control channel to exchange control information. This paper presents a novel medium access control(MAC) protocol for CR network which efficiently and intelligently establishes a common control channel between CR nodes. The proposed protocol is the first CR MAC protocol which is hybrid in nature and lies between global common control channel(GCCC) and non-GCCC family of MAC protocols. The dynamic nature of the protocol makes the CR nodes converge on a newly found control channel quicker whenever the interference from a licensed user is sensed. The analytical results show that the dynamic, hybrid and adaptive nature of proposed protocol yields higher throughputs when compared with other CR MAC protocols. 展开更多
关键词 COGNITIVE RADIO COMMON CONTROL channel co-operative communication MEDIUM access control(MAC)protocols DTMC
原文传递
MULTIPLE ELECTRONIC CONTROL UNITS CALIBRATION SYSTEM BASED ON EXPLICIT CALIBRATION PROTOCOL AND J1939 PROTOCOL 被引量:3
5
作者 ZHU Keqing XU Quankui YANG Lin ZHUO Bin 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2008年第1期42-46,共5页
The rising number of electronic control units (ECUs) in vehicles and the decreasing time to market have led to the need for advanced methods of calibration. A multi-ECU calibration system was developed based on the ... The rising number of electronic control units (ECUs) in vehicles and the decreasing time to market have led to the need for advanced methods of calibration. A multi-ECU calibration system was developed based on the explicit calibration protocol (XCP) and J1939 communication protocol to satisfy the need of calibrating multiple ECUs simultaneously. The messages in the controller area network (CAN) are defined in the J1939 protocol. Each CAN node can get its own calibration messages and information from other ECUs, and block other messages by qualifying the CAN messages with priority, source or destination address. The data field of the calibration message is designed with the XCP, with CAN acting as the transport layer. The calibration sessions are setup with the event-triggered XCP driver in the master node and the responding XCP driver in the slave nodes. Mirroring calibration variables from ROM to RAM enables the user to calibrate ECUs online. The application example shows that the multi-ECU calibration system can calibrate multiple ECUs simultaneously, and the main program can also accomplish its calculation and send commands to the actuators in time. By the multi-ECU calibration system, the calibration effort and time can be reduced and the variables in ECU can get a better match with the variables of other ECUs. 展开更多
关键词 Electronic control unit (ECU) Calibration Explicit calibration protocol (XCP) J1939 communication protocol Controlled area network (CAN)
下载PDF
An Efficient MPPT Tracking in Solar PV System with Smart Grid Enhancement Using CMCMAC Protocol
6
作者 B.Jegajothi Sundaram Arumugam +3 位作者 Neeraj Kumar Shukla I.Kathir P.Yamunaa Monia Digra 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2417-2437,共21页
Renewable energy sources like solar,wind,and hydro are becoming increasingly popular due to the fewer negative impacts they have on the environment.Because,Since the production of renewable energy sources is still in ... Renewable energy sources like solar,wind,and hydro are becoming increasingly popular due to the fewer negative impacts they have on the environment.Because,Since the production of renewable energy sources is still in the process of being created,photovoltaic(PV)systems are commonly utilized for installation situations that are acceptable,clean,and simple.This study presents an adaptive artificial intelligence approach that can be used for maximum power point tracking(MPPT)in solar systems with the help of an embedded controller.The adaptive method incorporates both the Whale Optimization Algorithm(WOA)and the Artificial Neural Network(ANN).The WOA was implemented to enhance the process of the ANN model’s training,and the ANN model was developed using the WOA.In addition to this,the inverter circuit is connected to the smart grid system,and the strengthening of the smart grid is achieved through the implementation of the CMCMAC protocol.This protocol prevents interference between customers and the organizations that provide their utilities.Using a protocol known as Cross-Layer Multi-Channel MAC(CMCMAC),the effect of interference is removed using the way that was suggested.Also,with the utilization of the ZIGBEE communication technology,bidirectional communication is made possible.The strategy that was suggested has been put into practice,and the results have shown that the PV system produces an output power of 73.32 KW and an efficiency of 98.72%.In addition to this,a built-in regulator is utilized to validate the proposed model.In this paper,the results of various experiments are analyzed,and a comparison is made between the suggested WOA with the ANN controller approach and others,such as the Particle Swarm Optimization(PSO)based MPPT and the Cuckoo Search(CS)based MPPT.By examining the comparison findings,it was determined that the adaptive AI-based embedded controller was superior to the other alternatives. 展开更多
关键词 DC/DC converter MPPT controller Artificial Neural Network(ANN)algorithm ZIGBEE communication CMCMAC protocol Smart Grid(SG)
下载PDF
Self-organization of Reconfigurable Protocol Stack for Networked Control Systems 被引量:1
7
作者 Chun-Jie Zhou Hui Chen Yuan-Qing Qin Yu-Feng Shi Guang-Can Yu 《International Journal of Automation and computing》 EI 2011年第2期221-235,共15页
In networked control systems (NCS),the control performance depends on not only the control algorithm but also the communication protocol stack.The performance degradation introduced by the heterogeneous and dynamic ... In networked control systems (NCS),the control performance depends on not only the control algorithm but also the communication protocol stack.The performance degradation introduced by the heterogeneous and dynamic communication environment has intensified the need for the reconfigurable protocol stack.In this paper,a novel architecture for the reconfigurable protocol stack is proposed,which is a unified specification of the protocol components and service interfaces supporting both static and dynamic reconfiguration for existing industrial communication standards.Within the architecture,a triple-level self-organization structure is designed to manage the dynamic reconfiguration procedure based on information exchanges inside and outside the protocol stack.Especially,the protocol stack can be self-adaptive to various environment and system requirements through the reconfiguration of working mode,routing and scheduling table.Finally,the study on the protocol of dynamic address management is conducted for the system of controller area network (CAN).The results show the efficiency of our self-organizing architecture for the implementation of a reconfigurable protocol stack. 展开更多
关键词 Networked control system (NCS) communication network SELF-ORGANIZATION protocol stack RECONFIGURATION
下载PDF
新型冠状病毒肺炎疫情防控期间急诊骨折患者流行病学特点及治疗策略 被引量:5
8
作者 王振中 吴宏华 +7 位作者 王京 孙志坚 尹晨 滕星 杨帆 苏永刚 肖鸿鹄 吴新宝 《骨科临床与研究杂志》 2020年第3期146-150,共5页
目的揭示新型冠状病毒肺炎(COVID-19)疫情防控期间急诊骨折患者的流行病学特点,并探讨相应的治疗策略。方法收集2019年12月至2020年2月北京积水潭医院创伤骨科急诊骨折患者的流行病学资料,统计患者数量、致伤因素、骨折类型、年龄、性... 目的揭示新型冠状病毒肺炎(COVID-19)疫情防控期间急诊骨折患者的流行病学特点,并探讨相应的治疗策略。方法收集2019年12月至2020年2月北京积水潭医院创伤骨科急诊骨折患者的流行病学资料,统计患者数量、致伤因素、骨折类型、年龄、性别以及手术和保守治疗比例,并以桡骨远端骨折为例介绍相应的治疗策略。结果COVID-19疫情防控期间创伤骨科急诊骨折患者总数变化不明显;低能量损伤比例为96.9%,四肢简单骨折比例为70.3%,高龄患者占38%,均较上年同期增高;手术治疗患者比例由上年同期的9%下降至6%。骨折患者的治疗策略较以往有所变化。结论COVID-19疫情防控期间创伤骨科急诊骨折患者流行病学特点发生变化,采取有针对性的治疗策略是必要的。 展开更多
关键词 骨折 流行病学 治疗方案 急诊室 医院 传染病控制 冠状病毒科感染 肺炎 病毒性
下载PDF
Control System Design and Implementation at Flexible, Distributed Offshore Sensor Test Sites in the Yangtze Estuary Area
9
作者 HU Qingsong JIANG Chao +5 位作者 DU Lin LI Jun CHEN Leilei XIANG Peng ZHANG Hongcheng RAHMAN Hafiz Abd ur 《Journal of Ocean University of China》 SCIE CAS CSCD 2021年第2期285-295,共11页
Marine in situ testing is a necessary step for stereotyping newly developed marine sensors. The use of test sites in the Yangtze Estuary area, which has high turbidity and abundant nutrients, can effectively reduce th... Marine in situ testing is a necessary step for stereotyping newly developed marine sensors. The use of test sites in the Yangtze Estuary area, which has high turbidity and abundant nutrients, can effectively reduce the needed testing time owing to its harsh conditions. Five test stations were established, and a floating buoy and fixed test equipment were designed. A control system, including a sensor connection, data processor, video remote transmission, and corresponding control algorithm, was developed. The control system enabled the nondestructive monitoring of biological attachments and bidirectional, real-time communication between an upper server on land and the control system at the test sites. The dissolved oxygen(DO), temperature, and pH data of DOS600 and DPS600 sensors were compared with those of AP2000 sensors. Temperature recording using the DOS600 sensor was performed nearly as well as that of the AP2000 sensor. The mean DO values(standard deviations) were 8.414 mg L-1(2.068) and 6.896 mg L-1(1.235) for the DOS600 and AP2000 sensors, respectively, indicating that the DOS600 performance was unsatisfactory. The pH recording of the DPS600 was slightly worse than that of the AP2000 sensor. Experimental results showed that the DO value was more easily affected by the buoy movement of waves compared to the pH and temperature. Moreover, data fluctuations showed that the DO and pH parameters were more vulnerable to biofouling than temperature. Waves and biofouling create a harsh test environment, and the performance difference between the developed sensors and a standard sensor can be obtained in a short time period. 展开更多
关键词 offshore sensor test sites Yangtze Estuary control system communication protocol MICROWAVE sensor detection data analysis
下载PDF
Design and Implementation of Distributed Numerical Control in Flexible Manufacturing System
10
作者 周炳海 余传猛 +1 位作者 奚立峰 曹永上 《Journal of Donghua University(English Edition)》 EI CAS 2004年第1期1-6,共6页
To monitor, control and manage the work process of computer numerical control machine tools in a flexible manufacturing system (FMS) effectively, the distributed numerical coutrol (distributed-NC) software should be i... To monitor, control and manage the work process of computer numerical control machine tools in a flexible manufacturing system (FMS) effectively, the distributed numerical coutrol (distributed-NC) software should be innovated with the characteristics of modularization and reconfiguration. In this paper, firstly, distributed-NC functions in the FMS environment are described. Then, we present a design and development method of the real time distributed-NC that is on the basis of the re-coufigurable software and hardware platform and with an object-oriented model concept. Finally, to verify the proposed method, the distributed-NC software has been implemented in VC++ 6.0 and has been tested in connection with the different physical flexible manufacturing shops. 展开更多
关键词 flexible manufacturing system distributed numerical control communication protocol computer numerical control.
下载PDF
TCP Window Based Congestion Control -Slow-Start Approach
11
作者 Kolawole I. Oyeyinka Ayodeji O. Oluwatope +3 位作者 Adio. T. Akinwale Olusegun Folorunso Ganiyu A. Aderounmu Olatunde O. Abiona 《Communications and Network》 2011年第2期85-98,共14页
Transmission control protocol (TCP) has undergone several transformations. Several proposals have been put forward to change the mechanisms of TCP congestion control to improve its performance. A line of research tend... Transmission control protocol (TCP) has undergone several transformations. Several proposals have been put forward to change the mechanisms of TCP congestion control to improve its performance. A line of research tends to reduce speed in the face of congestion thereby penalizing itself. In this group are the window based congestion control algorithms that use the size of congestion window to determine transmission speed. The two main algorithm of window based congestion control are the congestion avoidance and the slow start. The aim of this study is to survey the various modifications of window based congestion control. Much work has been done on congestion avoidance hence specific attention is placed on the slow start in order to motivate a new direction of research in network utility maximization. Mathematical modeling of the internet is discussed and proposals to improve TCP startup were reviewed. There are three lines of research on the improvement of slow start. A group uses the estimation of certain parameters to determine initial speed. The second group uses bandwidth estimation while the last group uses explicit request for network assistance to determine initial startup speed. The problems of each proposal are analyzed and a multiple startup for TCP is proposed. Multiple startups for TCP specify that startup speed is selectable from an n-arry set of algorithms. We then introduced the e-speed start which uses the prevailing network condition to determine a suitable starting speed. 展开更多
关键词 Data communication Network protocols TCP CONGESTION Control Slow-Start (Keywords)
下载PDF
Design and Implementation of Computer Network Remote Control System
12
作者 Xiaohui ZHANG 《International Journal of Technology Management》 2015年第2期101-104,共4页
The paper analyze and design and implement a remote control system based on network. A computer network remote control system mainly includes server, client and the control information. Server registration information... The paper analyze and design and implement a remote control system based on network. A computer network remote control system mainly includes server, client and the control information. Server registration information realize the user command; client provides network hardware, software and other system resources, the system response message and then feedback service instruction; control information transmission layer implementation using TCPflP protocol to control information including control of resources and control commands etc.. This paper adopts centralized network control system model, the structure of the network system realize unified observation, control, coordination, and control of high efficiency. The use of key technologies, such as Socket and COM to realize the goal of computer hardware resource control, software resource management and other functions. 展开更多
关键词 Remote Control System Control SOCKET communication protocol
下载PDF
The Remote Monitoring System Research Based on Embedded Web Server
13
作者 Ying ZHOU 《International Journal of Technology Management》 2015年第6期101-103,共3页
The paper analyze and design and implement a remote control system based on embedded web server network. A computer network remote control system mainly includes server, client and the control information. Server regi... The paper analyze and design and implement a remote control system based on embedded web server network. A computer network remote control system mainly includes server, client and the control information. Server registration information realize the user command; client provides network hardware, software and other system resources, the system response message and then feedback service instruction. The research results show that, the embedded web server can be assigned to the field device user information through the browser, field device data also can access to the browser through the web server. In order to achieve remote monitoring, control, diagnostics and configuration of the equipment. 展开更多
关键词 Remote Control Embedded system SOCKET communication protocol
下载PDF
Three Projects of Intelligent Distribution Automation System in East Asia
14
作者 B.N. Ha S.W. Lee C.H. Shin M.J. Jang G.W. Nam 《Journal of Energy and Power Engineering》 2011年第2期179-183,共5页
Intelligent distribution automation system (IDAS) was developed based on distribution automation system that was installed in all distribution offices of Korea. IDAS was designed the combined system with the functio... Intelligent distribution automation system (IDAS) was developed based on distribution automation system that was installed in all distribution offices of Korea. IDAS was designed the combined system with the function of supervisory control and data acquisition (SCADA) and distribution automation system (DAS) for network operation from substation to high voltage customer, and it has been installed in Vietnam, China and Indonesia. This paper explains the project scope, system configuration, and the function of each sy stem. 展开更多
关键词 SCADA (supervisory control and data acquisition) DAS (distribution automation system) RTU (remote tenninal unit) FTU (feeder remote unit) communication media protocol.
下载PDF
Formal verification of safety protocol in train control system 被引量:6
15
作者 ZHANG Yan TANG Tao +4 位作者 LI KePing MERA Jose Manuel ZHU Li ZHAO Lin XU TianHua 《Science China(Technological Sciences)》 SCIE EI CAS 2011年第11期3078-3090,共13页
In order to satisfy the safety-critical requirements,the train control system(TCS) often employs a layered safety communication protocol to provide reliable services.However,both description and verification of the sa... In order to satisfy the safety-critical requirements,the train control system(TCS) often employs a layered safety communication protocol to provide reliable services.However,both description and verification of the safety protocols may be formidable due to the system complexity.In this paper,interface automata(IA) are used to describe the safety service interface behaviors of safety communication protocol.A formal verification method is proposed to describe the safety communication protocols using IA and translate IA model into PROMELA model so that the protocols can be verified by the model checker SPIN.A case study of using this method to describe and verify a safety communication protocol is included.The verification results illustrate that the proposed method is effective to describe the safety protocols and verify deadlocks,livelocks and several mandatory consistency properties.A prototype of safety protocols is also developed based on the presented formally verifying method. 展开更多
关键词 train control system safety communication protocol interface automata VERIFICATION
原文传递
An Analysis on Decentralized Adaptive MAC Protocols for Cognitive Radio Networks 被引量:1
16
作者 Munam Ali Shah Sijing Zhang Carsten Maple 《International Journal of Automation and computing》 EI CSCD 2013年第1期46-52,共7页
The scarcity of bandwidth in the radio spectrum has become more vital since the demand for more and more wireless applications has increased. Most of the spectrum bands have been allocated although many studies have s... The scarcity of bandwidth in the radio spectrum has become more vital since the demand for more and more wireless applications has increased. Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time. The problem of unavailability of spectrum and inefficiency in its utilization has been smartly addressed by the cognitive radio (CR) technology which is an opportunistic network that senses the environment, observes the network changes, and then uses knowledge gained from the prior interaction with the network to make intelligent decisions by dynamically adapting their transmission characteristics. In this paper, some of the decentralized adaptive medium access control (MAC) protocols for CR networks have been critically analyzed, and a novel adaptive MAC protocol for CR networks, decentralized non-global MAC (DNG-MAC), has been proposed. The results show the DNG-MAC outperforms other CR-MAC protocols in terms of time and energy efficiency. 展开更多
关键词 Cognitive radio medium access control (MAC) protocols common control channel cooperative communication
原文传递
Kalman filtering for linear singular systems subject to round-robin protocol
17
作者 Ashna Goel Shovan Bhaumik Nutan Kumar Tomar 《Control Theory and Technology》 EI 2024年第4期543-551,共9页
This paper introduces a Kalman-type recursive state estimator for a class of discrete-time stochastic linear singular systems where the measurements are carried part by part periodically following a scheduling algorit... This paper introduces a Kalman-type recursive state estimator for a class of discrete-time stochastic linear singular systems where the measurements are carried part by part periodically following a scheduling algorithm.We consider that the system is in a network with limited allotted bandwidth,which refers to a situation where the total available bandwidth for data transmission through the network is limited.This limitation can occur for various reasons,such as network congestion,resource allocation policies,or bandwidth limitations imposed by network administrators.In such networks,the entire measurement vector cannot be transmitted to the estimator instantly.Thus,managing a network with a limited allotted bandwidth requires careful planning,monitoring,and implementing some scheduling strategies to optimize the use of measured data while estimating the system states.We show that a scheduling method,namely,round-robin protocol,is suitable for singular systems to deal with such a scenario.The upper bound of the prior error covariance is studied via a periodic Riccati equation(PRE).To retain the boundedness of prior error covariance,the stability of the PRE is examined by the observability properties of the round-robin-induced system.Finally,a simulation example is presented to show the effectiveness of the designed filtering scheme. 展开更多
关键词 Networked control systems communication constraints Round-robin protocol Singular systems Filtering
原文传递
Spectral efficient half-duplex relaying with interference suppression
18
作者 LI Xing-zheng,LIU Yuan-an,XIE Gang,CHANG Ling-jun,HAN Xiao Key Laboratory of Universal Wireless Communications,Ministry of Education,Beijing University of Posts and Telecommunications,Beijing 100876,China 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2010年第6期19-24,共6页
Two-hop relaying systems suffer spectral efficiency loss due to the half-duplex property of relays. This paper proposes an efficient relaying protocol which can recover the spectral efficiency loss but still work with... Two-hop relaying systems suffer spectral efficiency loss due to the half-duplex property of relays. This paper proposes an efficient relaying protocol which can recover the spectral efficiency loss but still work with half-duplex relays. However,there exists inter-relay interference which degrades the performance of the protocol. With this consideration,a power control policy is derived to suppress the interference using game theory,and then an algorithm is given to facilitate distributed implementation. Furthermore,impact of deploying more destination antennas on performance of the relaying protocol is investigated. Simulation results show that,with the power control policy,the proposed relaying protocol can achieve high spectral efficiency. 展开更多
关键词 relaying protocol distributed power control cooperative communication decode-and-forward relay game theory
原文传递
A novel hybrid cybersecurity scheme against false data injection attacks in automated power systems
19
作者 Shahbaz Hussain S.M.Suhail Hussain +5 位作者 Marziyeh Hemmati Atif Iqbal Rashid Alammari Stefano Zanero Enrico Ragaini Giambattista Gruosso 《Protection and Control of Modern Power Systems》 SCIE EI 2023年第3期1-15,共15页
The conventional power systems are evolving as smart grids.In recent times cyberattacks on smart grids have been increasing.Among different attacks,False Data Injection(FDI)is considered as an emerging threat that has... The conventional power systems are evolving as smart grids.In recent times cyberattacks on smart grids have been increasing.Among different attacks,False Data Injection(FDI)is considered as an emerging threat that has significant impact.By exploiting the vulnerabilities of IEC 61850 Generic Object-Oriented Substation Events(GOOSE)and Sam-pled Values(SV)attackers can launch different FDI attacks.In this paper,a real-time set up capable of simulating FDI on GOOSE and SV protocols is developed to evaluate the impact of such attacks on power grid.IEC 62351 stipulates cybersecurity guidelines for GOOSE and SV,but only at communication or Information Technology(IT)level.Hence there is a need to develop a holistic security both at IT and Operation Technology(OT)level.In this regard,a novel sequence content resolver-based hybrid security scheme suitable to tackle FDI attacks on GOOSE and SV is proposed.Furthermore,the computational performance of the proposed hybrid security scheme is presented to demonstrate its applicability to the time critical GOOSE and SV protocols. 展开更多
关键词 Cyberattacks False data injection Real time digital simulation IEC 61850 communication protocols Control authority COUNTERMEASURES
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部