In this paper,an adaptive dynamic programming(ADP)strategy is investigated for discrete-time nonlinear systems with unknown nonlinear dynamics subject to input saturation.To save the communication resources between th...In this paper,an adaptive dynamic programming(ADP)strategy is investigated for discrete-time nonlinear systems with unknown nonlinear dynamics subject to input saturation.To save the communication resources between the controller and the actuators,stochastic communication protocols(SCPs)are adopted to schedule the control signal,and therefore the closed-loop system is essentially a protocol-induced switching system.A neural network(NN)-based identifier with a robust term is exploited for approximating the unknown nonlinear system,and a set of switch-based updating rules with an additional tunable parameter of NN weights are developed with the help of the gradient descent.By virtue of a novel Lyapunov function,a sufficient condition is proposed to achieve the stability of both system identification errors and the update dynamics of NN weights.Then,a value iterative ADP algorithm in an offline way is proposed to solve the optimal control of protocol-induced switching systems with saturation constraints,and the convergence is profoundly discussed in light of mathematical induction.Furthermore,an actor-critic NN scheme is developed to approximate the control law and the proposed performance index function in the framework of ADP,and the stability of the closed-loop system is analyzed in view of the Lyapunov theory.Finally,the numerical simulation results are presented to demonstrate the effectiveness of the proposed control scheme.展开更多
The fuzzing test is able to discover various vulnerabilities and has more chances to hit the zero-day targets.And ICS(Industrial control system)is currently facing huge security threats and requires security standards...The fuzzing test is able to discover various vulnerabilities and has more chances to hit the zero-day targets.And ICS(Industrial control system)is currently facing huge security threats and requires security standards,like ISO 62443,to ensure the quality of the device.However,some industrial proprietary communication protocols can be customized and have complicated structures,the fuzzing system cannot quickly generate test data that adapt to various protocols.It also struggles to define the mutation field without having prior knowledge of the protocols.Therefore,we propose a fuzzing system named ICPFuzzer that uses LSTM(Long short-term memory)to learn the features of a protocol and generates mutated test data automatically.We also use the responses of testing and adjust the weight strategies to further test the device under testing(DUT)to find more data that cause unusual connection status.We verified the effectiveness of the approach by comparing with the open-source and commercial fuzzers.Furthermore,in a real case,we experimented with the DLMS/COSEM for a smart meter and found that the test data can cause a unusual response.In summary,ICPFuzzer is a black-box fuzzing system that can automatically execute the testing process and reveal vulnerabilities that interrupt and crash industrial control communication.Not only improves the quality of ICS but also improves safety.展开更多
A design approach of manufacturing communication is presented for flexible manufacturing system in this paper. The primary objective aims at making the flexible manufacturing control system provided with interoperabil...A design approach of manufacturing communication is presented for flexible manufacturing system in this paper. The primary objective aims at making the flexible manufacturing control system provided with interoperability and reconfigurability. Based on describing manufacturing message specification (MMS) and distributed component object model (DCOM), a client/server manufacturing communication model is built with MMS standard and DCOM middleware, and the communication interfaces between MMS client and MMS server are designed with Microsoft interface definition language (MIDL) and abstract syntax notation one (ASN.1) of MMS services. As a result, DCOM and MMS integration leads to such client/ server communication capabilities independent of different operating systems and manufacturing devices in flexible manufacturing automation environment. Finally, to verify the new design approach, a prototype system of robot control system has been implemented in MS 2000 Server/Professional Operating System and VC++ 6.0 Developer Environments.展开更多
One of the challenging tasks in cognitive radio(CR) networks is to agree on a common control channel to exchange control information. This paper presents a novel medium access control(MAC) protocol for CR network whic...One of the challenging tasks in cognitive radio(CR) networks is to agree on a common control channel to exchange control information. This paper presents a novel medium access control(MAC) protocol for CR network which efficiently and intelligently establishes a common control channel between CR nodes. The proposed protocol is the first CR MAC protocol which is hybrid in nature and lies between global common control channel(GCCC) and non-GCCC family of MAC protocols. The dynamic nature of the protocol makes the CR nodes converge on a newly found control channel quicker whenever the interference from a licensed user is sensed. The analytical results show that the dynamic, hybrid and adaptive nature of proposed protocol yields higher throughputs when compared with other CR MAC protocols.展开更多
The rising number of electronic control units (ECUs) in vehicles and the decreasing time to market have led to the need for advanced methods of calibration. A multi-ECU calibration system was developed based on the ...The rising number of electronic control units (ECUs) in vehicles and the decreasing time to market have led to the need for advanced methods of calibration. A multi-ECU calibration system was developed based on the explicit calibration protocol (XCP) and J1939 communication protocol to satisfy the need of calibrating multiple ECUs simultaneously. The messages in the controller area network (CAN) are defined in the J1939 protocol. Each CAN node can get its own calibration messages and information from other ECUs, and block other messages by qualifying the CAN messages with priority, source or destination address. The data field of the calibration message is designed with the XCP, with CAN acting as the transport layer. The calibration sessions are setup with the event-triggered XCP driver in the master node and the responding XCP driver in the slave nodes. Mirroring calibration variables from ROM to RAM enables the user to calibrate ECUs online. The application example shows that the multi-ECU calibration system can calibrate multiple ECUs simultaneously, and the main program can also accomplish its calculation and send commands to the actuators in time. By the multi-ECU calibration system, the calibration effort and time can be reduced and the variables in ECU can get a better match with the variables of other ECUs.展开更多
Renewable energy sources like solar,wind,and hydro are becoming increasingly popular due to the fewer negative impacts they have on the environment.Because,Since the production of renewable energy sources is still in ...Renewable energy sources like solar,wind,and hydro are becoming increasingly popular due to the fewer negative impacts they have on the environment.Because,Since the production of renewable energy sources is still in the process of being created,photovoltaic(PV)systems are commonly utilized for installation situations that are acceptable,clean,and simple.This study presents an adaptive artificial intelligence approach that can be used for maximum power point tracking(MPPT)in solar systems with the help of an embedded controller.The adaptive method incorporates both the Whale Optimization Algorithm(WOA)and the Artificial Neural Network(ANN).The WOA was implemented to enhance the process of the ANN model’s training,and the ANN model was developed using the WOA.In addition to this,the inverter circuit is connected to the smart grid system,and the strengthening of the smart grid is achieved through the implementation of the CMCMAC protocol.This protocol prevents interference between customers and the organizations that provide their utilities.Using a protocol known as Cross-Layer Multi-Channel MAC(CMCMAC),the effect of interference is removed using the way that was suggested.Also,with the utilization of the ZIGBEE communication technology,bidirectional communication is made possible.The strategy that was suggested has been put into practice,and the results have shown that the PV system produces an output power of 73.32 KW and an efficiency of 98.72%.In addition to this,a built-in regulator is utilized to validate the proposed model.In this paper,the results of various experiments are analyzed,and a comparison is made between the suggested WOA with the ANN controller approach and others,such as the Particle Swarm Optimization(PSO)based MPPT and the Cuckoo Search(CS)based MPPT.By examining the comparison findings,it was determined that the adaptive AI-based embedded controller was superior to the other alternatives.展开更多
In networked control systems (NCS),the control performance depends on not only the control algorithm but also the communication protocol stack.The performance degradation introduced by the heterogeneous and dynamic ...In networked control systems (NCS),the control performance depends on not only the control algorithm but also the communication protocol stack.The performance degradation introduced by the heterogeneous and dynamic communication environment has intensified the need for the reconfigurable protocol stack.In this paper,a novel architecture for the reconfigurable protocol stack is proposed,which is a unified specification of the protocol components and service interfaces supporting both static and dynamic reconfiguration for existing industrial communication standards.Within the architecture,a triple-level self-organization structure is designed to manage the dynamic reconfiguration procedure based on information exchanges inside and outside the protocol stack.Especially,the protocol stack can be self-adaptive to various environment and system requirements through the reconfiguration of working mode,routing and scheduling table.Finally,the study on the protocol of dynamic address management is conducted for the system of controller area network (CAN).The results show the efficiency of our self-organizing architecture for the implementation of a reconfigurable protocol stack.展开更多
Marine in situ testing is a necessary step for stereotyping newly developed marine sensors. The use of test sites in the Yangtze Estuary area, which has high turbidity and abundant nutrients, can effectively reduce th...Marine in situ testing is a necessary step for stereotyping newly developed marine sensors. The use of test sites in the Yangtze Estuary area, which has high turbidity and abundant nutrients, can effectively reduce the needed testing time owing to its harsh conditions. Five test stations were established, and a floating buoy and fixed test equipment were designed. A control system, including a sensor connection, data processor, video remote transmission, and corresponding control algorithm, was developed. The control system enabled the nondestructive monitoring of biological attachments and bidirectional, real-time communication between an upper server on land and the control system at the test sites. The dissolved oxygen(DO), temperature, and pH data of DOS600 and DPS600 sensors were compared with those of AP2000 sensors. Temperature recording using the DOS600 sensor was performed nearly as well as that of the AP2000 sensor. The mean DO values(standard deviations) were 8.414 mg L-1(2.068) and 6.896 mg L-1(1.235) for the DOS600 and AP2000 sensors, respectively, indicating that the DOS600 performance was unsatisfactory. The pH recording of the DPS600 was slightly worse than that of the AP2000 sensor. Experimental results showed that the DO value was more easily affected by the buoy movement of waves compared to the pH and temperature. Moreover, data fluctuations showed that the DO and pH parameters were more vulnerable to biofouling than temperature. Waves and biofouling create a harsh test environment, and the performance difference between the developed sensors and a standard sensor can be obtained in a short time period.展开更多
To monitor, control and manage the work process of computer numerical control machine tools in a flexible manufacturing system (FMS) effectively, the distributed numerical coutrol (distributed-NC) software should be i...To monitor, control and manage the work process of computer numerical control machine tools in a flexible manufacturing system (FMS) effectively, the distributed numerical coutrol (distributed-NC) software should be innovated with the characteristics of modularization and reconfiguration. In this paper, firstly, distributed-NC functions in the FMS environment are described. Then, we present a design and development method of the real time distributed-NC that is on the basis of the re-coufigurable software and hardware platform and with an object-oriented model concept. Finally, to verify the proposed method, the distributed-NC software has been implemented in VC++ 6.0 and has been tested in connection with the different physical flexible manufacturing shops.展开更多
Transmission control protocol (TCP) has undergone several transformations. Several proposals have been put forward to change the mechanisms of TCP congestion control to improve its performance. A line of research tend...Transmission control protocol (TCP) has undergone several transformations. Several proposals have been put forward to change the mechanisms of TCP congestion control to improve its performance. A line of research tends to reduce speed in the face of congestion thereby penalizing itself. In this group are the window based congestion control algorithms that use the size of congestion window to determine transmission speed. The two main algorithm of window based congestion control are the congestion avoidance and the slow start. The aim of this study is to survey the various modifications of window based congestion control. Much work has been done on congestion avoidance hence specific attention is placed on the slow start in order to motivate a new direction of research in network utility maximization. Mathematical modeling of the internet is discussed and proposals to improve TCP startup were reviewed. There are three lines of research on the improvement of slow start. A group uses the estimation of certain parameters to determine initial speed. The second group uses bandwidth estimation while the last group uses explicit request for network assistance to determine initial startup speed. The problems of each proposal are analyzed and a multiple startup for TCP is proposed. Multiple startups for TCP specify that startup speed is selectable from an n-arry set of algorithms. We then introduced the e-speed start which uses the prevailing network condition to determine a suitable starting speed.展开更多
The paper analyze and design and implement a remote control system based on network. A computer network remote control system mainly includes server, client and the control information. Server registration information...The paper analyze and design and implement a remote control system based on network. A computer network remote control system mainly includes server, client and the control information. Server registration information realize the user command; client provides network hardware, software and other system resources, the system response message and then feedback service instruction; control information transmission layer implementation using TCPflP protocol to control information including control of resources and control commands etc.. This paper adopts centralized network control system model, the structure of the network system realize unified observation, control, coordination, and control of high efficiency. The use of key technologies, such as Socket and COM to realize the goal of computer hardware resource control, software resource management and other functions.展开更多
The paper analyze and design and implement a remote control system based on embedded web server network. A computer network remote control system mainly includes server, client and the control information. Server regi...The paper analyze and design and implement a remote control system based on embedded web server network. A computer network remote control system mainly includes server, client and the control information. Server registration information realize the user command; client provides network hardware, software and other system resources, the system response message and then feedback service instruction. The research results show that, the embedded web server can be assigned to the field device user information through the browser, field device data also can access to the browser through the web server. In order to achieve remote monitoring, control, diagnostics and configuration of the equipment.展开更多
Intelligent distribution automation system (IDAS) was developed based on distribution automation system that was installed in all distribution offices of Korea. IDAS was designed the combined system with the functio...Intelligent distribution automation system (IDAS) was developed based on distribution automation system that was installed in all distribution offices of Korea. IDAS was designed the combined system with the function of supervisory control and data acquisition (SCADA) and distribution automation system (DAS) for network operation from substation to high voltage customer, and it has been installed in Vietnam, China and Indonesia. This paper explains the project scope, system configuration, and the function of each sy stem.展开更多
In order to satisfy the safety-critical requirements,the train control system(TCS) often employs a layered safety communication protocol to provide reliable services.However,both description and verification of the sa...In order to satisfy the safety-critical requirements,the train control system(TCS) often employs a layered safety communication protocol to provide reliable services.However,both description and verification of the safety protocols may be formidable due to the system complexity.In this paper,interface automata(IA) are used to describe the safety service interface behaviors of safety communication protocol.A formal verification method is proposed to describe the safety communication protocols using IA and translate IA model into PROMELA model so that the protocols can be verified by the model checker SPIN.A case study of using this method to describe and verify a safety communication protocol is included.The verification results illustrate that the proposed method is effective to describe the safety protocols and verify deadlocks,livelocks and several mandatory consistency properties.A prototype of safety protocols is also developed based on the presented formally verifying method.展开更多
The scarcity of bandwidth in the radio spectrum has become more vital since the demand for more and more wireless applications has increased. Most of the spectrum bands have been allocated although many studies have s...The scarcity of bandwidth in the radio spectrum has become more vital since the demand for more and more wireless applications has increased. Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time. The problem of unavailability of spectrum and inefficiency in its utilization has been smartly addressed by the cognitive radio (CR) technology which is an opportunistic network that senses the environment, observes the network changes, and then uses knowledge gained from the prior interaction with the network to make intelligent decisions by dynamically adapting their transmission characteristics. In this paper, some of the decentralized adaptive medium access control (MAC) protocols for CR networks have been critically analyzed, and a novel adaptive MAC protocol for CR networks, decentralized non-global MAC (DNG-MAC), has been proposed. The results show the DNG-MAC outperforms other CR-MAC protocols in terms of time and energy efficiency.展开更多
This paper introduces a Kalman-type recursive state estimator for a class of discrete-time stochastic linear singular systems where the measurements are carried part by part periodically following a scheduling algorit...This paper introduces a Kalman-type recursive state estimator for a class of discrete-time stochastic linear singular systems where the measurements are carried part by part periodically following a scheduling algorithm.We consider that the system is in a network with limited allotted bandwidth,which refers to a situation where the total available bandwidth for data transmission through the network is limited.This limitation can occur for various reasons,such as network congestion,resource allocation policies,or bandwidth limitations imposed by network administrators.In such networks,the entire measurement vector cannot be transmitted to the estimator instantly.Thus,managing a network with a limited allotted bandwidth requires careful planning,monitoring,and implementing some scheduling strategies to optimize the use of measured data while estimating the system states.We show that a scheduling method,namely,round-robin protocol,is suitable for singular systems to deal with such a scenario.The upper bound of the prior error covariance is studied via a periodic Riccati equation(PRE).To retain the boundedness of prior error covariance,the stability of the PRE is examined by the observability properties of the round-robin-induced system.Finally,a simulation example is presented to show the effectiveness of the designed filtering scheme.展开更多
Two-hop relaying systems suffer spectral efficiency loss due to the half-duplex property of relays. This paper proposes an efficient relaying protocol which can recover the spectral efficiency loss but still work with...Two-hop relaying systems suffer spectral efficiency loss due to the half-duplex property of relays. This paper proposes an efficient relaying protocol which can recover the spectral efficiency loss but still work with half-duplex relays. However,there exists inter-relay interference which degrades the performance of the protocol. With this consideration,a power control policy is derived to suppress the interference using game theory,and then an algorithm is given to facilitate distributed implementation. Furthermore,impact of deploying more destination antennas on performance of the relaying protocol is investigated. Simulation results show that,with the power control policy,the proposed relaying protocol can achieve high spectral efficiency.展开更多
The conventional power systems are evolving as smart grids.In recent times cyberattacks on smart grids have been increasing.Among different attacks,False Data Injection(FDI)is considered as an emerging threat that has...The conventional power systems are evolving as smart grids.In recent times cyberattacks on smart grids have been increasing.Among different attacks,False Data Injection(FDI)is considered as an emerging threat that has significant impact.By exploiting the vulnerabilities of IEC 61850 Generic Object-Oriented Substation Events(GOOSE)and Sam-pled Values(SV)attackers can launch different FDI attacks.In this paper,a real-time set up capable of simulating FDI on GOOSE and SV protocols is developed to evaluate the impact of such attacks on power grid.IEC 62351 stipulates cybersecurity guidelines for GOOSE and SV,but only at communication or Information Technology(IT)level.Hence there is a need to develop a holistic security both at IT and Operation Technology(OT)level.In this regard,a novel sequence content resolver-based hybrid security scheme suitable to tackle FDI attacks on GOOSE and SV is proposed.Furthermore,the computational performance of the proposed hybrid security scheme is presented to demonstrate its applicability to the time critical GOOSE and SV protocols.展开更多
基金supported in part by the Australian Research Council Discovery Early Career Researcher Award(DE200101128)Australian Research Council(DP190101557)。
文摘In this paper,an adaptive dynamic programming(ADP)strategy is investigated for discrete-time nonlinear systems with unknown nonlinear dynamics subject to input saturation.To save the communication resources between the controller and the actuators,stochastic communication protocols(SCPs)are adopted to schedule the control signal,and therefore the closed-loop system is essentially a protocol-induced switching system.A neural network(NN)-based identifier with a robust term is exploited for approximating the unknown nonlinear system,and a set of switch-based updating rules with an additional tunable parameter of NN weights are developed with the help of the gradient descent.By virtue of a novel Lyapunov function,a sufficient condition is proposed to achieve the stability of both system identification errors and the update dynamics of NN weights.Then,a value iterative ADP algorithm in an offline way is proposed to solve the optimal control of protocol-induced switching systems with saturation constraints,and the convergence is profoundly discussed in light of mathematical induction.Furthermore,an actor-critic NN scheme is developed to approximate the control law and the proposed performance index function in the framework of ADP,and the stability of the closed-loop system is analyzed in view of the Lyapunov theory.Finally,the numerical simulation results are presented to demonstrate the effectiveness of the proposed control scheme.
文摘The fuzzing test is able to discover various vulnerabilities and has more chances to hit the zero-day targets.And ICS(Industrial control system)is currently facing huge security threats and requires security standards,like ISO 62443,to ensure the quality of the device.However,some industrial proprietary communication protocols can be customized and have complicated structures,the fuzzing system cannot quickly generate test data that adapt to various protocols.It also struggles to define the mutation field without having prior knowledge of the protocols.Therefore,we propose a fuzzing system named ICPFuzzer that uses LSTM(Long short-term memory)to learn the features of a protocol and generates mutated test data automatically.We also use the responses of testing and adjust the weight strategies to further test the device under testing(DUT)to find more data that cause unusual connection status.We verified the effectiveness of the approach by comparing with the open-source and commercial fuzzers.Furthermore,in a real case,we experimented with the DLMS/COSEM for a smart meter and found that the test data can cause a unusual response.In summary,ICPFuzzer is a black-box fuzzing system that can automatically execute the testing process and reveal vulnerabilities that interrupt and crash industrial control communication.Not only improves the quality of ICS but also improves safety.
文摘A design approach of manufacturing communication is presented for flexible manufacturing system in this paper. The primary objective aims at making the flexible manufacturing control system provided with interoperability and reconfigurability. Based on describing manufacturing message specification (MMS) and distributed component object model (DCOM), a client/server manufacturing communication model is built with MMS standard and DCOM middleware, and the communication interfaces between MMS client and MMS server are designed with Microsoft interface definition language (MIDL) and abstract syntax notation one (ASN.1) of MMS services. As a result, DCOM and MMS integration leads to such client/ server communication capabilities independent of different operating systems and manufacturing devices in flexible manufacturing automation environment. Finally, to verify the new design approach, a prototype system of robot control system has been implemented in MS 2000 Server/Professional Operating System and VC++ 6.0 Developer Environments.
文摘One of the challenging tasks in cognitive radio(CR) networks is to agree on a common control channel to exchange control information. This paper presents a novel medium access control(MAC) protocol for CR network which efficiently and intelligently establishes a common control channel between CR nodes. The proposed protocol is the first CR MAC protocol which is hybrid in nature and lies between global common control channel(GCCC) and non-GCCC family of MAC protocols. The dynamic nature of the protocol makes the CR nodes converge on a newly found control channel quicker whenever the interference from a licensed user is sensed. The analytical results show that the dynamic, hybrid and adaptive nature of proposed protocol yields higher throughputs when compared with other CR MAC protocols.
文摘The rising number of electronic control units (ECUs) in vehicles and the decreasing time to market have led to the need for advanced methods of calibration. A multi-ECU calibration system was developed based on the explicit calibration protocol (XCP) and J1939 communication protocol to satisfy the need of calibrating multiple ECUs simultaneously. The messages in the controller area network (CAN) are defined in the J1939 protocol. Each CAN node can get its own calibration messages and information from other ECUs, and block other messages by qualifying the CAN messages with priority, source or destination address. The data field of the calibration message is designed with the XCP, with CAN acting as the transport layer. The calibration sessions are setup with the event-triggered XCP driver in the master node and the responding XCP driver in the slave nodes. Mirroring calibration variables from ROM to RAM enables the user to calibrate ECUs online. The application example shows that the multi-ECU calibration system can calibrate multiple ECUs simultaneously, and the main program can also accomplish its calculation and send commands to the actuators in time. By the multi-ECU calibration system, the calibration effort and time can be reduced and the variables in ECU can get a better match with the variables of other ECUs.
基金funding this research work through the Small Group Research Project under Grant Number RGP1/70/44.
文摘Renewable energy sources like solar,wind,and hydro are becoming increasingly popular due to the fewer negative impacts they have on the environment.Because,Since the production of renewable energy sources is still in the process of being created,photovoltaic(PV)systems are commonly utilized for installation situations that are acceptable,clean,and simple.This study presents an adaptive artificial intelligence approach that can be used for maximum power point tracking(MPPT)in solar systems with the help of an embedded controller.The adaptive method incorporates both the Whale Optimization Algorithm(WOA)and the Artificial Neural Network(ANN).The WOA was implemented to enhance the process of the ANN model’s training,and the ANN model was developed using the WOA.In addition to this,the inverter circuit is connected to the smart grid system,and the strengthening of the smart grid is achieved through the implementation of the CMCMAC protocol.This protocol prevents interference between customers and the organizations that provide their utilities.Using a protocol known as Cross-Layer Multi-Channel MAC(CMCMAC),the effect of interference is removed using the way that was suggested.Also,with the utilization of the ZIGBEE communication technology,bidirectional communication is made possible.The strategy that was suggested has been put into practice,and the results have shown that the PV system produces an output power of 73.32 KW and an efficiency of 98.72%.In addition to this,a built-in regulator is utilized to validate the proposed model.In this paper,the results of various experiments are analyzed,and a comparison is made between the suggested WOA with the ANN controller approach and others,such as the Particle Swarm Optimization(PSO)based MPPT and the Cuckoo Search(CS)based MPPT.By examining the comparison findings,it was determined that the adaptive AI-based embedded controller was superior to the other alternatives.
基金supported by National Natural Science Foundation of China (No. 60674081,No. 60834002,No. 61074145)
文摘In networked control systems (NCS),the control performance depends on not only the control algorithm but also the communication protocol stack.The performance degradation introduced by the heterogeneous and dynamic communication environment has intensified the need for the reconfigurable protocol stack.In this paper,a novel architecture for the reconfigurable protocol stack is proposed,which is a unified specification of the protocol components and service interfaces supporting both static and dynamic reconfiguration for existing industrial communication standards.Within the architecture,a triple-level self-organization structure is designed to manage the dynamic reconfiguration procedure based on information exchanges inside and outside the protocol stack.Especially,the protocol stack can be self-adaptive to various environment and system requirements through the reconfiguration of working mode,routing and scheduling table.Finally,the study on the protocol of dynamic address management is conducted for the system of controller area network (CAN).The results show the efficiency of our self-organizing architecture for the implementation of a reconfigurable protocol stack.
基金supported by the National Key Research and Development Plan(No.2019YFD0901300)the Shanghai Science and Technology Innovation Action Plan(No.16DZ1205100)the Shanghai Agriculture Applied Technology Development Program(No.T20180303)。
文摘Marine in situ testing is a necessary step for stereotyping newly developed marine sensors. The use of test sites in the Yangtze Estuary area, which has high turbidity and abundant nutrients, can effectively reduce the needed testing time owing to its harsh conditions. Five test stations were established, and a floating buoy and fixed test equipment were designed. A control system, including a sensor connection, data processor, video remote transmission, and corresponding control algorithm, was developed. The control system enabled the nondestructive monitoring of biological attachments and bidirectional, real-time communication between an upper server on land and the control system at the test sites. The dissolved oxygen(DO), temperature, and pH data of DOS600 and DPS600 sensors were compared with those of AP2000 sensors. Temperature recording using the DOS600 sensor was performed nearly as well as that of the AP2000 sensor. The mean DO values(standard deviations) were 8.414 mg L-1(2.068) and 6.896 mg L-1(1.235) for the DOS600 and AP2000 sensors, respectively, indicating that the DOS600 performance was unsatisfactory. The pH recording of the DPS600 was slightly worse than that of the AP2000 sensor. Experimental results showed that the DO value was more easily affected by the buoy movement of waves compared to the pH and temperature. Moreover, data fluctuations showed that the DO and pH parameters were more vulnerable to biofouling than temperature. Waves and biofouling create a harsh test environment, and the performance difference between the developed sensors and a standard sensor can be obtained in a short time period.
基金Project supported by the National High-Tech. R&D Program for CIMS, China (Grant No. 2003AA414120) Shanghai Science & Technology development Project, China (Grant No. 02FK04)
文摘To monitor, control and manage the work process of computer numerical control machine tools in a flexible manufacturing system (FMS) effectively, the distributed numerical coutrol (distributed-NC) software should be innovated with the characteristics of modularization and reconfiguration. In this paper, firstly, distributed-NC functions in the FMS environment are described. Then, we present a design and development method of the real time distributed-NC that is on the basis of the re-coufigurable software and hardware platform and with an object-oriented model concept. Finally, to verify the proposed method, the distributed-NC software has been implemented in VC++ 6.0 and has been tested in connection with the different physical flexible manufacturing shops.
文摘Transmission control protocol (TCP) has undergone several transformations. Several proposals have been put forward to change the mechanisms of TCP congestion control to improve its performance. A line of research tends to reduce speed in the face of congestion thereby penalizing itself. In this group are the window based congestion control algorithms that use the size of congestion window to determine transmission speed. The two main algorithm of window based congestion control are the congestion avoidance and the slow start. The aim of this study is to survey the various modifications of window based congestion control. Much work has been done on congestion avoidance hence specific attention is placed on the slow start in order to motivate a new direction of research in network utility maximization. Mathematical modeling of the internet is discussed and proposals to improve TCP startup were reviewed. There are three lines of research on the improvement of slow start. A group uses the estimation of certain parameters to determine initial speed. The second group uses bandwidth estimation while the last group uses explicit request for network assistance to determine initial startup speed. The problems of each proposal are analyzed and a multiple startup for TCP is proposed. Multiple startups for TCP specify that startup speed is selectable from an n-arry set of algorithms. We then introduced the e-speed start which uses the prevailing network condition to determine a suitable starting speed.
文摘The paper analyze and design and implement a remote control system based on network. A computer network remote control system mainly includes server, client and the control information. Server registration information realize the user command; client provides network hardware, software and other system resources, the system response message and then feedback service instruction; control information transmission layer implementation using TCPflP protocol to control information including control of resources and control commands etc.. This paper adopts centralized network control system model, the structure of the network system realize unified observation, control, coordination, and control of high efficiency. The use of key technologies, such as Socket and COM to realize the goal of computer hardware resource control, software resource management and other functions.
文摘The paper analyze and design and implement a remote control system based on embedded web server network. A computer network remote control system mainly includes server, client and the control information. Server registration information realize the user command; client provides network hardware, software and other system resources, the system response message and then feedback service instruction. The research results show that, the embedded web server can be assigned to the field device user information through the browser, field device data also can access to the browser through the web server. In order to achieve remote monitoring, control, diagnostics and configuration of the equipment.
文摘Intelligent distribution automation system (IDAS) was developed based on distribution automation system that was installed in all distribution offices of Korea. IDAS was designed the combined system with the function of supervisory control and data acquisition (SCADA) and distribution automation system (DAS) for network operation from substation to high voltage customer, and it has been installed in Vietnam, China and Indonesia. This paper explains the project scope, system configuration, and the function of each sy stem.
基金supported by the New Century Excellent Researcher Award Program from Ministry of Education of China (Grant No. NCET-07-0059)the Fundamental Research Funds for the Central Universities (Grant No.2011YJS006)+1 种基金the National High Technology Research and DevelopmentProgram of China ("863" Program) (Grant No. 2011AA010104)the State Key Laboratory of Rail Traffic Control and Safety Research Project(Grant Nos. RCS2008ZZ001, RCS2008ZZ005)
文摘In order to satisfy the safety-critical requirements,the train control system(TCS) often employs a layered safety communication protocol to provide reliable services.However,both description and verification of the safety protocols may be formidable due to the system complexity.In this paper,interface automata(IA) are used to describe the safety service interface behaviors of safety communication protocol.A formal verification method is proposed to describe the safety communication protocols using IA and translate IA model into PROMELA model so that the protocols can be verified by the model checker SPIN.A case study of using this method to describe and verify a safety communication protocol is included.The verification results illustrate that the proposed method is effective to describe the safety protocols and verify deadlocks,livelocks and several mandatory consistency properties.A prototype of safety protocols is also developed based on the presented formally verifying method.
文摘The scarcity of bandwidth in the radio spectrum has become more vital since the demand for more and more wireless applications has increased. Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time. The problem of unavailability of spectrum and inefficiency in its utilization has been smartly addressed by the cognitive radio (CR) technology which is an opportunistic network that senses the environment, observes the network changes, and then uses knowledge gained from the prior interaction with the network to make intelligent decisions by dynamically adapting their transmission characteristics. In this paper, some of the decentralized adaptive medium access control (MAC) protocols for CR networks have been critically analyzed, and a novel adaptive MAC protocol for CR networks, decentralized non-global MAC (DNG-MAC), has been proposed. The results show the DNG-MAC outperforms other CR-MAC protocols in terms of time and energy efficiency.
基金supported by the Science and Engineering Research Board,New Delhi(No.MTR/2019/000494).
文摘This paper introduces a Kalman-type recursive state estimator for a class of discrete-time stochastic linear singular systems where the measurements are carried part by part periodically following a scheduling algorithm.We consider that the system is in a network with limited allotted bandwidth,which refers to a situation where the total available bandwidth for data transmission through the network is limited.This limitation can occur for various reasons,such as network congestion,resource allocation policies,or bandwidth limitations imposed by network administrators.In such networks,the entire measurement vector cannot be transmitted to the estimator instantly.Thus,managing a network with a limited allotted bandwidth requires careful planning,monitoring,and implementing some scheduling strategies to optimize the use of measured data while estimating the system states.We show that a scheduling method,namely,round-robin protocol,is suitable for singular systems to deal with such a scenario.The upper bound of the prior error covariance is studied via a periodic Riccati equation(PRE).To retain the boundedness of prior error covariance,the stability of the PRE is examined by the observability properties of the round-robin-induced system.Finally,a simulation example is presented to show the effectiveness of the designed filtering scheme.
基金supported by the Sino-Swedish IMT-Advanced Cooperation Project (2008DFA11780)the Canada-China Scientific and Technological Cooperation (2010DFA11320)+1 种基金the National Natural Science Foundation of China (60802033, 60873190)the Hi-Tech Research and Development Program of China (2008AA01Z211)
文摘Two-hop relaying systems suffer spectral efficiency loss due to the half-duplex property of relays. This paper proposes an efficient relaying protocol which can recover the spectral efficiency loss but still work with half-duplex relays. However,there exists inter-relay interference which degrades the performance of the protocol. With this consideration,a power control policy is derived to suppress the interference using game theory,and then an algorithm is given to facilitate distributed implementation. Furthermore,impact of deploying more destination antennas on performance of the relaying protocol is investigated. Simulation results show that,with the power control policy,the proposed relaying protocol can achieve high spectral efficiency.
文摘The conventional power systems are evolving as smart grids.In recent times cyberattacks on smart grids have been increasing.Among different attacks,False Data Injection(FDI)is considered as an emerging threat that has significant impact.By exploiting the vulnerabilities of IEC 61850 Generic Object-Oriented Substation Events(GOOSE)and Sam-pled Values(SV)attackers can launch different FDI attacks.In this paper,a real-time set up capable of simulating FDI on GOOSE and SV protocols is developed to evaluate the impact of such attacks on power grid.IEC 62351 stipulates cybersecurity guidelines for GOOSE and SV,but only at communication or Information Technology(IT)level.Hence there is a need to develop a holistic security both at IT and Operation Technology(OT)level.In this regard,a novel sequence content resolver-based hybrid security scheme suitable to tackle FDI attacks on GOOSE and SV is proposed.Furthermore,the computational performance of the proposed hybrid security scheme is presented to demonstrate its applicability to the time critical GOOSE and SV protocols.