Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethe...Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethernet technology. The IP addresses are more and more important for the smart distribution grid equipment. The current IPv4 protocol occupies a dominant position; therefore, the challenges of the evolution to IPv6 and network security are faced by data communication systems of the smart distribution grid. The importance of data communications network and its main bearer of business were described. The data communications network from IPv4 to IPv6 evolution of the five processes and four stages of the transition were analyzed. The smart distribution grid data communications network security and types of their offensive and defensive were discussed. And the data communications network security architecture was established. It covers three dimensions, the security level, the communications network security engineering and the communications network security management. The security architecture safeguards the evolution to IPv6 for the smart distribution grid data communication systems.展开更多
Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data N...Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data Networking(NDN).In NDN,names,provider IDs and data are transmitted in plaintext,which exposes vehicular data to security threats and leads to considerable data communication costs and failure rates.This paper proposes a Secure vehicular Data Communication(SDC)approach in NDN to supress data communication costs and failure rates.SCD constructs a vehicular backbone to reduce the number of authenticated nodes involved in reverse paths.Only the ciphtertext of the name and data is included in the signed Interest and Data and transmitted along the backbone,so the secure data communications are achieved.SCD is evaluated,and the data results demonstrate that SCD achieves the above objectives.展开更多
In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The...In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The joint coordination of wireless power transfer(WPT)and wireless information transfer(WIT)yields simultaneous wireless information and power transfer(SWIPT)as well as data and energy integrated communication network(DEIN).However,as a promising technique,few efforts are invested in the hardware implementation of DEIN.In order to make DEIN a reality,this paper focuses on hardware implementation of a DEIN.It firstly provides a brief tutorial on SWIPT,while summarising the latest hardware design of WPT transceiver and the existing commercial solutions.Then,a prototype design in DEIN with full protocol stack is elaborated,followed by its performance evaluation.展开更多
Simultaneous dimming controlling and data transmission are usually required in a white LED based indoor visible light communication system.However,the diming controlling of LED normally interferes the data transmissio...Simultaneous dimming controlling and data transmission are usually required in a white LED based indoor visible light communication system.However,the diming controlling of LED normally interferes the data transmission due to the modulation nonlinearity of LED.In order to solve this problem,a scheme by separating the LEDs for the functions of dimming control and data transmission respectively is proposed in this paper.In the scheme,the LEDs used for dimming control function are driven by a dc amplified circuit,and the LEDs for data transmission are driven by a digital modulation circuit respectively.In this way,the modulation distortion to the data signal caused by the modulation nonlinearity can be avoided even if the dimming is at high level dc driven current.The proof-of-concept experiment of a 2.5Mbit/s visible light communication system demonstrates that the dimming controlling and data transmission can be realized simultaneously in a simple way,and the data transmission is not affected by the dimming controlling function.Compared to previous methods,the scheme in this paper is simpler and cost effective,and makes sense when high rate data is transmitted in a visible light communication system.展开更多
High speed data communication between digital signal processor and the host is required to meet the demand of most real-time systems. PCI bus technology is a solution of this problem. The principle of data communicati...High speed data communication between digital signal processor and the host is required to meet the demand of most real-time systems. PCI bus technology is a solution of this problem. The principle of data communication based on PCI has been explained. Meanwhile, the technology of data transfer between synchronous dynamic RAM(SDRAM) and an mapping space of on-chip memory(L2) by expansion direct memory access(EDMA) has also been realized.展开更多
This paper deals with an integration of directly measured electrical parameters with data acquired by data communication from protections and terminals into an advanced monitoring system. Based on the periodic test, t...This paper deals with an integration of directly measured electrical parameters with data acquired by data communication from protections and terminals into an advanced monitoring system. Based on the periodic test, the authors of this paper present the possibility of an extended evaluation and more accurate analysis of transient and failure events. For periodical testing, as implemented during the commissioning of power plants in the Czech Republic, a monitoring system of electrical equipment has been used, to record the courses of important electrical parameters and thus, proving the proper functioning of complex technological systems in various operation modes. Data from monitoring system were used to prove the successful results of the test or as a base data for further analysis of failures. The monitoring system has proved itself as a very useful device also when recording unexpected failure events, the cause of which was very quickly and accurately detected by the follow-up analysis. Initially, only the voltage and current data from measuring transformers, analogue transducers and contact relays were used as input data for the monitoring system. After the implementation of new digital protection technology and controlling terminals with inner data recorder, the data from digital devices could be also utilized for the monitoring system.展开更多
With the flexible deployment and high mobility of Unmanned Aerial Vehicles(UAVs)in an open environment,they have generated con-siderable attention in military and civil applications intending to enable ubiquitous conn...With the flexible deployment and high mobility of Unmanned Aerial Vehicles(UAVs)in an open environment,they have generated con-siderable attention in military and civil applications intending to enable ubiquitous connectivity and foster agile communications.The difficulty stems from features other than mobile ad-hoc network(MANET),namely aerial mobility in three-dimensional space and often changing topology.In the UAV network,a single node serves as a forwarding,transmitting,and receiving node at the same time.Typically,the communication path is multi-hop,and routing significantly affects the network’s performance.A lot of effort should be invested in performance analysis for selecting the optimum routing system.With this motivation,this study modelled a new Coati Optimization Algorithm-based Energy-Efficient Routing Process for Unmanned Aerial Vehicle Communication(COAER-UAVC)technique.The presented COAER-UAVC technique establishes effective routes for communication between the UAVs.It is primarily based on the coati characteristics in nature:if attacking and hunting iguanas and escaping from predators.Besides,the presented COAER-UAVC technique concentrates on the design of fitness functions to minimize energy utilization and communication delay.A varied group of simulations was performed to depict the optimum performance of the COAER-UAVC system.The experimental results verified that the COAER-UAVC technique had assured improved performance over other approaches.展开更多
In this paper, the configuration characteristic of the safe parameter measurement and alarm system in new type mine was first simply introduced, which is made up of topological structure and combines wire communicatio...In this paper, the configuration characteristic of the safe parameter measurement and alarm system in new type mine was first simply introduced, which is made up of topological structure and combines wire communication with radio communication, then introduced respectively the hardware and software construction and the working principle and the method of design, which is composed of detecting instrument as the core of enhanced single chip microcomputer AT89S8252 and relay station and CPU which consists of IPC. The three class computer communication system that integrates with measurement and alarm and management works reliably and uses conveniently, especially to thesystem of parameter detecting and alarm in mine, which is adapted to measure dispersedly and manage intensively.展开更多
This special issue of ZTE Communications focuses on recent advances in mobile data communications for the ICT and telecommunications industries. The ever-increasing amount of mobile data traffic has beenthe subject of...This special issue of ZTE Communications focuses on recent advances in mobile data communications for the ICT and telecommunications industries. The ever-increasing amount of mobile data traffic has beenthe subject of many studies. This research area is widely applicable to contemporary technology and network optimization techniques.展开更多
The new ear of AI is brought about by three converging forces:the advance of AI algorithms,the availability of big data,and the increasing popularity of high performance computing platforms.Data-driven intelligence,or...The new ear of AI is brought about by three converging forces:the advance of AI algorithms,the availability of big data,and the increasing popularity of high performance computing platforms.Data-driven intelligence,or data intelligence,is a new form of AI technologies that leverages the展开更多
The new ear of AI is brought about by three eonverging forees: the advanee of AI algorithms, the availability of big data, and the inereasing popularity of high performanee computing platforms. Data-driven intelligen...The new ear of AI is brought about by three eonverging forees: the advanee of AI algorithms, the availability of big data, and the inereasing popularity of high performanee computing platforms. Data-driven intelligenee, or data intelligenee, is a new fore1 of AI teehnologies that leverages the power of big data.展开更多
NonorthogonalMultiple Access(NOMA)is incorporated into the wireless network systems to achieve better connectivity,spectral and energy effectiveness,higher data transfer rate,and also obtain the high quality of servic...NonorthogonalMultiple Access(NOMA)is incorporated into the wireless network systems to achieve better connectivity,spectral and energy effectiveness,higher data transfer rate,and also obtain the high quality of services(QoS).In order to improve throughput and minimum latency,aMultivariate Renkonen Regressive Weighted Preference Bootstrap Aggregation based Nonorthogonal Multiple Access(MRRWPBA-NOMA)technique is introduced for network communication.In the downlink transmission,each mobile device’s resources and their characteristics like energy,bandwidth,and trust are measured.Followed by,the Weighted Preference Bootstrap Aggregation is applied to recognize the resource-efficient mobile devices for aware data transmission by constructing the different weak hypotheses i.e.,Multivariate Renkonen Regression functions.Based on the classification,resource and trust-aware devices are selected for transmission.Simulation of the proposed MRRWPBA-NOMA technique and existing methods are carried out with different metrics such as data delivery ratio,throughput,latency,packet loss rate,and energy efficiency,signaling overhead.The simulation results assessment indicates that the proposed MRRWPBA-NOMA outperforms well than the conventional methods.展开更多
The resource allocation technique is of great significance in achieving frequency spectrum coexistence in Joint Radar-Communication(JRC)systems,by which the problem of radio frequency spectrum congestion can be well a...The resource allocation technique is of great significance in achieving frequency spectrum coexistence in Joint Radar-Communication(JRC)systems,by which the problem of radio frequency spectrum congestion can be well alleviated.A Robust Joint Frequency Spectrum and Power Allocation(RJFSPA)strategy is proposed for the Coexisting Radar and Communication(CRC)system.Specifically,we consider the uncertainty of target Radar Cross Section(RCS)and communication channel gain to formulate a bi-objective optimization model.The joint probabilities that the Crame´r-Rao Lower Bound(CRLB)of each target satisfying the localization accuracy threshold and the Communication Data Ratio(CDR)of each user satisfying the communication threshold are simultaneously maximized,under the constraint of the total power budget.A Three-Stage Alternating Optimization Method(TSAOM)is proposed to obtain the Best-Known Pareto Subset(BKPS)of this problem,where the frequency spectrum,radar power,and communicator power are allocated using the greedy search and standard convex optimization methods,respectively.Simulation results confirm the effectiveness of the proposed RJFSPA strategy,compared with the resource allocation methods in a uniform manner and that ignores the uncertainties.The efficiency of the TSAOM is also verified by the comparison with the exhaustive search-based method.展开更多
As the rapid development of automotive telematics,modern vehicles are expected to be connected through heterogeneous radio access technologies and are able to exchange massive information with their surrounding enviro...As the rapid development of automotive telematics,modern vehicles are expected to be connected through heterogeneous radio access technologies and are able to exchange massive information with their surrounding environment. By significantly expanding the network scale and conducting both real-time and long-term information processing, the traditional Vehicular AdHoc Networks(VANETs) are evolving to the Internet of Vehicles(Io V), which promises efficient and intelligent prospect for the future transportation system. On the other hand, vehicles are not only consuming but also generating a huge amount and enormous types of data, which is referred to as Big Data. In this article, we first investigate the relationship between Io V and big data in vehicular environment, mainly on how Io V supports the transmission, storage, computing of the big data, and how Io V benefits from big data in terms of Io V characterization,performance evaluation and big data assisted communication protocol design. We then investigate the application of Io V big data in autonomous vehicles. Finally, the emerging issues of the big data enabled Io V are discussed.展开更多
The traditional software development model commonly named “waterfall” is unable to cope with the increasing functionality and complexity of modern embedded systems. In addition, it is unable to support the ability f...The traditional software development model commonly named “waterfall” is unable to cope with the increasing functionality and complexity of modern embedded systems. In addition, it is unable to support the ability for businesses to quickly respond to new market opportunities due to changing requirements. As a response, the software development community developed the Agile Methodologies (e.g., extreme Programming, Scrum) which were also adopted by the Embedded System community. However, failures and bad experiences in applying Agile Methodologies to the development of embedded systems have not been reported in the literature. Therefore, this paper contributes a detailed account of our first-time experiences adopting an agile approach in the prototype development of a wireless environment data acquisition system in an academic environment. We successfully applied a subset of the extreme Programming (XP) methodology to our software development using the Python programming language, an experience that demonstrated its benefits in shaping the design of the software and also increasing productivity. We used an incremental development approach for the hardware components and adopted a “cumulative testing” approach. For the overall development process management, however, we concluded that the Promise/Commitment-Based Project Management (PB-PM/CBPM) was better suited. We discovered that software and hardware components of embedded systems are best developed in parallel or near-parallel. We learned that software components that pass automated tests may not survive in the tests against the hardware. Throughout this rapid prototyping effort, factors like team size and our availability as graduate students were major obstacles to fully apply the XP methodology.展开更多
Mobile Ad-hoc Networks(MANETs)connect numerous nodes to communicate data from the sender node to the target node.Due to the lack of an infrastructure network,mobile nodes communicate through wireless without an access...Mobile Ad-hoc Networks(MANETs)connect numerous nodes to communicate data from the sender node to the target node.Due to the lack of an infrastructure network,mobile nodes communicate through wireless without an access point.MANET does not have a centralized controller and has a dynamic network topology,which increases link failure and energy consumption resulting in excessive path delay,loss of Quality of service(QoS),and reduced throughput during data communication.Congestion is a significant problem when the QoS of the link carrying the data is degraded.Routing is one of the vital challenges of MANET due to the very dynamic and distributed nature of MANET.This article introduces a Mobility-Based Optimized Multipath Routing Protocol(MBOMRP)and an Efficient Reliable Link-State Transmission(ERLST)algorithm to overcome these problems.The proposed Mobility-Based Optimized Multipath Routing Protocol(MBOMRP)is utilized for route discovery and maintenance to efficiently avoid traffic and sleeping nodes.ERLST algorithm is used for efficient data transmission to increase QoS measurement parameters like throughput,Packet Delivery Ratio(PDR),and minimize the latency performance.The proposed MBOMRP-ERLST algorithm improves data communication network lifetime,avoids link failures,and provides efficient results compared with previous algorithms.展开更多
As an emerging hot technology,smart grids(SGs)are being employed in many fields,such as smart homes and smart cities.Moreover,the application of artificial intelligence(AI)in SGs has promoted the development of the po...As an emerging hot technology,smart grids(SGs)are being employed in many fields,such as smart homes and smart cities.Moreover,the application of artificial intelligence(AI)in SGs has promoted the development of the power industry.However,as users’demands for electricity increase,traditional centralized power trading is unable to well meet the user demands and an increasing number of small distributed generators are being employed in trading activities.This not only leads to numerous security risks for the trading data but also has a negative impact on the cost of power generation,electrical security,and other aspects.Accordingly,this study proposes a distributed power trading scheme based on blockchain and AI.To protect the legitimate rights and interests of consumers and producers,credibility is used as an indicator to restrict untrustworthy behavior.Simultaneously,the reliability and communication capabilities of nodes are considered in block verification to improve the transaction confirmation efficiency,and a weighted communication tree construction algorithm is designed to achieve superior data forwarding.Finally,AI sensors are set up in power equipment to detect electricity generation and transmission,which alert users when security hazards occur,such as thunderstorms or typhoons.The experimental results show that the proposed scheme can not only improve the trading security but also reduce system communication delays.展开更多
Modern vessels are designed to collect,store and communicate large quantities of ship performance and navigation information through complex onboard data handling processes.That data should be transferred to shore bas...Modern vessels are designed to collect,store and communicate large quantities of ship performance and navigation information through complex onboard data handling processes.That data should be transferred to shore based data centers for further analysis and storage.However,the associated transfer cost in large-scale data sets is a major challenge for the shipping industry,today.The same cost relates to the amount of data that are transferring through various communication networks(i.e.satellites and wireless networks),i.e.between vessels and shore based data centers.Hence,this study proposes to use an autoencoder system architecture(i.e.a deep learning approach)to compress ship performance and navigation parameters(i.e.reduce the number of parameters)and transfer through the respective communication networks as reduced data sets.The data compression is done under the linear version of an autoencoder that consists of principal component analysis(PCA),where the respective principal components(PCs)represent the structure of the data set.The compressed data set is expanded by the same data structure(i.e.an autoencoder system architecture)at the respective data center requiring further analyses and storage.A data set of ship performance and navigation parameters in a selected vessel is analyzed(i.e.data compression and expansion)through an autoencoder system architecture and the results are presented in this study.Furthermore,the respective input and output values of the autoencoder are also compared as statistical distributions and sample number series to evaluate its performance.展开更多
Internet of things(IoT)technology has been constantly applied in greenhouse environmental monitoring and control in recent years.The acquisition and control parameters,network protocols are different for the various p...Internet of things(IoT)technology has been constantly applied in greenhouse environmental monitoring and control in recent years.The acquisition and control parameters,network protocols are different for the various purposes of the greenhouse.These factors are the keys to the abilities to effectively communicate and transfer meaningful data in IoT infrastructures.To achieve the adaptive matching of data communication between the gateway and server in a greenhouse IoT system,a data encapsulation method based on XML was designed to enable data interoperability in a distributed greenhouse IoT system.Furthermore,the behaviour of the Multi-Agent System(MAS)was used to merge the heterogeneous information and the responses for data synchronization in the greenhouse IoT system.The data communication mechanism for real-time and cumulative data synchronization between the gateway and server based on JADE was tested in a specific greenhouse.The results showed that the data loss rate between the data acquisition unit and the gateway was 1.52%,and the data loss rate was 0.4%between the gateway and the server;therefore,the mechanism could be feasibly applied to the data communication for a greenhouse IoT system.展开更多
A new distribution principle of bus protection is presented.The protection system description,its design features,hardware structure,construction of data communication network are given.Dynamic simulation experiments ...A new distribution principle of bus protection is presented.The protection system description,its design features,hardware structure,construction of data communication network are given.Dynamic simulation experiments show its distinguishing advantages over traditional centralized principle.展开更多
文摘Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethernet technology. The IP addresses are more and more important for the smart distribution grid equipment. The current IPv4 protocol occupies a dominant position; therefore, the challenges of the evolution to IPv6 and network security are faced by data communication systems of the smart distribution grid. The importance of data communications network and its main bearer of business were described. The data communications network from IPv4 to IPv6 evolution of the five processes and four stages of the transition were analyzed. The smart distribution grid data communications network security and types of their offensive and defensive were discussed. And the data communications network security architecture was established. It covers three dimensions, the security level, the communications network security engineering and the communications network security management. The security architecture safeguards the evolution to IPv6 for the smart distribution grid data communication systems.
基金supported by the National Natural Science Foundation of China under Grant No.62032013the LiaoNing Revitalization Talents Program under Grant No.XLYC1902010.
文摘Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data Networking(NDN).In NDN,names,provider IDs and data are transmitted in plaintext,which exposes vehicular data to security threats and leads to considerable data communication costs and failure rates.This paper proposes a Secure vehicular Data Communication(SDC)approach in NDN to supress data communication costs and failure rates.SCD constructs a vehicular backbone to reduce the number of authenticated nodes involved in reverse paths.Only the ciphtertext of the name and data is included in the signed Interest and Data and transmitted along the backbone,so the secure data communications are achieved.SCD is evaluated,and the data results demonstrate that SCD achieves the above objectives.
基金financial support of National Natural Science Foundation of China(NSFC),No.U1705263 and 61971102GF Innovative Research Programthe Sichuan Science and Technology Program,No.2019YJ0194。
文摘In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The joint coordination of wireless power transfer(WPT)and wireless information transfer(WIT)yields simultaneous wireless information and power transfer(SWIPT)as well as data and energy integrated communication network(DEIN).However,as a promising technique,few efforts are invested in the hardware implementation of DEIN.In order to make DEIN a reality,this paper focuses on hardware implementation of a DEIN.It firstly provides a brief tutorial on SWIPT,while summarising the latest hardware design of WPT transceiver and the existing commercial solutions.Then,a prototype design in DEIN with full protocol stack is elaborated,followed by its performance evaluation.
基金financially supported by National Natural Science Foundation of China(No.61475094)National 973 Program of China(No.2013CB329202)
文摘Simultaneous dimming controlling and data transmission are usually required in a white LED based indoor visible light communication system.However,the diming controlling of LED normally interferes the data transmission due to the modulation nonlinearity of LED.In order to solve this problem,a scheme by separating the LEDs for the functions of dimming control and data transmission respectively is proposed in this paper.In the scheme,the LEDs used for dimming control function are driven by a dc amplified circuit,and the LEDs for data transmission are driven by a digital modulation circuit respectively.In this way,the modulation distortion to the data signal caused by the modulation nonlinearity can be avoided even if the dimming is at high level dc driven current.The proof-of-concept experiment of a 2.5Mbit/s visible light communication system demonstrates that the dimming controlling and data transmission can be realized simultaneously in a simple way,and the data transmission is not affected by the dimming controlling function.Compared to previous methods,the scheme in this paper is simpler and cost effective,and makes sense when high rate data is transmitted in a visible light communication system.
文摘High speed data communication between digital signal processor and the host is required to meet the demand of most real-time systems. PCI bus technology is a solution of this problem. The principle of data communication based on PCI has been explained. Meanwhile, the technology of data transfer between synchronous dynamic RAM(SDRAM) and an mapping space of on-chip memory(L2) by expansion direct memory access(EDMA) has also been realized.
文摘This paper deals with an integration of directly measured electrical parameters with data acquired by data communication from protections and terminals into an advanced monitoring system. Based on the periodic test, the authors of this paper present the possibility of an extended evaluation and more accurate analysis of transient and failure events. For periodical testing, as implemented during the commissioning of power plants in the Czech Republic, a monitoring system of electrical equipment has been used, to record the courses of important electrical parameters and thus, proving the proper functioning of complex technological systems in various operation modes. Data from monitoring system were used to prove the successful results of the test or as a base data for further analysis of failures. The monitoring system has proved itself as a very useful device also when recording unexpected failure events, the cause of which was very quickly and accurately detected by the follow-up analysis. Initially, only the voltage and current data from measuring transformers, analogue transducers and contact relays were used as input data for the monitoring system. After the implementation of new digital protection technology and controlling terminals with inner data recorder, the data from digital devices could be also utilized for the monitoring system.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through Large Groups Project under grant number(235/44)Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2023R114)+1 种基金Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:(22UQU4310373DSR71)This study is supported via funding from Prince Sattam bin Abdulaziz University project number(PSAU/2023/R/1444).
文摘With the flexible deployment and high mobility of Unmanned Aerial Vehicles(UAVs)in an open environment,they have generated con-siderable attention in military and civil applications intending to enable ubiquitous connectivity and foster agile communications.The difficulty stems from features other than mobile ad-hoc network(MANET),namely aerial mobility in three-dimensional space and often changing topology.In the UAV network,a single node serves as a forwarding,transmitting,and receiving node at the same time.Typically,the communication path is multi-hop,and routing significantly affects the network’s performance.A lot of effort should be invested in performance analysis for selecting the optimum routing system.With this motivation,this study modelled a new Coati Optimization Algorithm-based Energy-Efficient Routing Process for Unmanned Aerial Vehicle Communication(COAER-UAVC)technique.The presented COAER-UAVC technique establishes effective routes for communication between the UAVs.It is primarily based on the coati characteristics in nature:if attacking and hunting iguanas and escaping from predators.Besides,the presented COAER-UAVC technique concentrates on the design of fitness functions to minimize energy utilization and communication delay.A varied group of simulations was performed to depict the optimum performance of the COAER-UAVC system.The experimental results verified that the COAER-UAVC technique had assured improved performance over other approaches.
文摘In this paper, the configuration characteristic of the safe parameter measurement and alarm system in new type mine was first simply introduced, which is made up of topological structure and combines wire communication with radio communication, then introduced respectively the hardware and software construction and the working principle and the method of design, which is composed of detecting instrument as the core of enhanced single chip microcomputer AT89S8252 and relay station and CPU which consists of IPC. The three class computer communication system that integrates with measurement and alarm and management works reliably and uses conveniently, especially to thesystem of parameter detecting and alarm in mine, which is adapted to measure dispersedly and manage intensively.
文摘This special issue of ZTE Communications focuses on recent advances in mobile data communications for the ICT and telecommunications industries. The ever-increasing amount of mobile data traffic has beenthe subject of many studies. This research area is widely applicable to contemporary technology and network optimization techniques.
文摘The new ear of AI is brought about by three converging forces:the advance of AI algorithms,the availability of big data,and the increasing popularity of high performance computing platforms.Data-driven intelligence,or data intelligence,is a new form of AI technologies that leverages the
文摘The new ear of AI is brought about by three eonverging forees: the advanee of AI algorithms, the availability of big data, and the inereasing popularity of high performanee computing platforms. Data-driven intelligenee, or data intelligenee, is a new fore1 of AI teehnologies that leverages the power of big data.
基金the Taif University Researchers Supporting Project number(TURSP-2020/36),Taif University,Taif,Saudi Arabiafundedby Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R97), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia。
文摘NonorthogonalMultiple Access(NOMA)is incorporated into the wireless network systems to achieve better connectivity,spectral and energy effectiveness,higher data transfer rate,and also obtain the high quality of services(QoS).In order to improve throughput and minimum latency,aMultivariate Renkonen Regressive Weighted Preference Bootstrap Aggregation based Nonorthogonal Multiple Access(MRRWPBA-NOMA)technique is introduced for network communication.In the downlink transmission,each mobile device’s resources and their characteristics like energy,bandwidth,and trust are measured.Followed by,the Weighted Preference Bootstrap Aggregation is applied to recognize the resource-efficient mobile devices for aware data transmission by constructing the different weak hypotheses i.e.,Multivariate Renkonen Regression functions.Based on the classification,resource and trust-aware devices are selected for transmission.Simulation of the proposed MRRWPBA-NOMA technique and existing methods are carried out with different metrics such as data delivery ratio,throughput,latency,packet loss rate,and energy efficiency,signaling overhead.The simulation results assessment indicates that the proposed MRRWPBA-NOMA outperforms well than the conventional methods.
基金Supported by the National Natural Science Foundation of China(No.62071482)Shaanxi Association of Science and Technology Youth Talent Support Program Project,China(No.20230137)+1 种基金the Innovative Talents Cultivate Program for Technology Innovation Team of ShaanXi Province,China(No.2024RS-CXTD-08)the Youth Talent Lifting Project of the China Association for Science and Technology(No.2021-JCJQ-QT-018).
文摘The resource allocation technique is of great significance in achieving frequency spectrum coexistence in Joint Radar-Communication(JRC)systems,by which the problem of radio frequency spectrum congestion can be well alleviated.A Robust Joint Frequency Spectrum and Power Allocation(RJFSPA)strategy is proposed for the Coexisting Radar and Communication(CRC)system.Specifically,we consider the uncertainty of target Radar Cross Section(RCS)and communication channel gain to formulate a bi-objective optimization model.The joint probabilities that the Crame´r-Rao Lower Bound(CRLB)of each target satisfying the localization accuracy threshold and the Communication Data Ratio(CDR)of each user satisfying the communication threshold are simultaneously maximized,under the constraint of the total power budget.A Three-Stage Alternating Optimization Method(TSAOM)is proposed to obtain the Best-Known Pareto Subset(BKPS)of this problem,where the frequency spectrum,radar power,and communicator power are allocated using the greedy search and standard convex optimization methods,respectively.Simulation results confirm the effectiveness of the proposed RJFSPA strategy,compared with the resource allocation methods in a uniform manner and that ignores the uncertainties.The efficiency of the TSAOM is also verified by the comparison with the exhaustive search-based method.
基金supported by the National Natural Science Foundation of China(91638204)Natural Sciences and Engineering Research Council(NSERC)
文摘As the rapid development of automotive telematics,modern vehicles are expected to be connected through heterogeneous radio access technologies and are able to exchange massive information with their surrounding environment. By significantly expanding the network scale and conducting both real-time and long-term information processing, the traditional Vehicular AdHoc Networks(VANETs) are evolving to the Internet of Vehicles(Io V), which promises efficient and intelligent prospect for the future transportation system. On the other hand, vehicles are not only consuming but also generating a huge amount and enormous types of data, which is referred to as Big Data. In this article, we first investigate the relationship between Io V and big data in vehicular environment, mainly on how Io V supports the transmission, storage, computing of the big data, and how Io V benefits from big data in terms of Io V characterization,performance evaluation and big data assisted communication protocol design. We then investigate the application of Io V big data in autonomous vehicles. Finally, the emerging issues of the big data enabled Io V are discussed.
文摘The traditional software development model commonly named “waterfall” is unable to cope with the increasing functionality and complexity of modern embedded systems. In addition, it is unable to support the ability for businesses to quickly respond to new market opportunities due to changing requirements. As a response, the software development community developed the Agile Methodologies (e.g., extreme Programming, Scrum) which were also adopted by the Embedded System community. However, failures and bad experiences in applying Agile Methodologies to the development of embedded systems have not been reported in the literature. Therefore, this paper contributes a detailed account of our first-time experiences adopting an agile approach in the prototype development of a wireless environment data acquisition system in an academic environment. We successfully applied a subset of the extreme Programming (XP) methodology to our software development using the Python programming language, an experience that demonstrated its benefits in shaping the design of the software and also increasing productivity. We used an incremental development approach for the hardware components and adopted a “cumulative testing” approach. For the overall development process management, however, we concluded that the Promise/Commitment-Based Project Management (PB-PM/CBPM) was better suited. We discovered that software and hardware components of embedded systems are best developed in parallel or near-parallel. We learned that software components that pass automated tests may not survive in the tests against the hardware. Throughout this rapid prototyping effort, factors like team size and our availability as graduate students were major obstacles to fully apply the XP methodology.
文摘Mobile Ad-hoc Networks(MANETs)connect numerous nodes to communicate data from the sender node to the target node.Due to the lack of an infrastructure network,mobile nodes communicate through wireless without an access point.MANET does not have a centralized controller and has a dynamic network topology,which increases link failure and energy consumption resulting in excessive path delay,loss of Quality of service(QoS),and reduced throughput during data communication.Congestion is a significant problem when the QoS of the link carrying the data is degraded.Routing is one of the vital challenges of MANET due to the very dynamic and distributed nature of MANET.This article introduces a Mobility-Based Optimized Multipath Routing Protocol(MBOMRP)and an Efficient Reliable Link-State Transmission(ERLST)algorithm to overcome these problems.The proposed Mobility-Based Optimized Multipath Routing Protocol(MBOMRP)is utilized for route discovery and maintenance to efficiently avoid traffic and sleeping nodes.ERLST algorithm is used for efficient data transmission to increase QoS measurement parameters like throughput,Packet Delivery Ratio(PDR),and minimize the latency performance.The proposed MBOMRP-ERLST algorithm improves data communication network lifetime,avoids link failures,and provides efficient results compared with previous algorithms.
基金supported by the National Natural Science Foundation of China with Grants 61771289 and 61832012the Natural Science Foundation of Shandong Province with Grants ZR2021QF050 and ZR2021MF075+3 种基金Shandong Natural Science Foundation Major Basic Research with Grant ZR2019ZD10Shandong Key Research and Development Program with Grant 2019GGX1050Shandong Major Agricultural Application Technology Innovation Project with Grant SD2019NJ007National Natural Science Foundation of Shandong Province Grants ZR2022MF304.
文摘As an emerging hot technology,smart grids(SGs)are being employed in many fields,such as smart homes and smart cities.Moreover,the application of artificial intelligence(AI)in SGs has promoted the development of the power industry.However,as users’demands for electricity increase,traditional centralized power trading is unable to well meet the user demands and an increasing number of small distributed generators are being employed in trading activities.This not only leads to numerous security risks for the trading data but also has a negative impact on the cost of power generation,electrical security,and other aspects.Accordingly,this study proposes a distributed power trading scheme based on blockchain and AI.To protect the legitimate rights and interests of consumers and producers,credibility is used as an indicator to restrict untrustworthy behavior.Simultaneously,the reliability and communication capabilities of nodes are considered in block verification to improve the transaction confirmation efficiency,and a weighted communication tree construction algorithm is designed to achieve superior data forwarding.Finally,AI sensors are set up in power equipment to detect electricity generation and transmission,which alert users when security hazards occur,such as thunderstorms or typhoons.The experimental results show that the proposed scheme can not only improve the trading security but also reduce system communication delays.
基金This work has been conducted under the project of“SFI Smart Maritime(237917/O30)-Norwegian Centre for im-proved energy-efficiency and reduced emissions from the mar-itime sector”that is partly funded by the Research Council of NorwayAn initial version of this paper is presented at the 35th International Conference on Ocean,Offshore and Arc-tic Engineering(OMAE 2016),Busan,Korea,June,2016,(OMAE2016-54093).
文摘Modern vessels are designed to collect,store and communicate large quantities of ship performance and navigation information through complex onboard data handling processes.That data should be transferred to shore based data centers for further analysis and storage.However,the associated transfer cost in large-scale data sets is a major challenge for the shipping industry,today.The same cost relates to the amount of data that are transferring through various communication networks(i.e.satellites and wireless networks),i.e.between vessels and shore based data centers.Hence,this study proposes to use an autoencoder system architecture(i.e.a deep learning approach)to compress ship performance and navigation parameters(i.e.reduce the number of parameters)and transfer through the respective communication networks as reduced data sets.The data compression is done under the linear version of an autoencoder that consists of principal component analysis(PCA),where the respective principal components(PCs)represent the structure of the data set.The compressed data set is expanded by the same data structure(i.e.an autoencoder system architecture)at the respective data center requiring further analyses and storage.A data set of ship performance and navigation parameters in a selected vessel is analyzed(i.e.data compression and expansion)through an autoencoder system architecture and the results are presented in this study.Furthermore,the respective input and output values of the autoencoder are also compared as statistical distributions and sample number series to evaluate its performance.
基金This work was supported by the Jiangsu Provincial R&D Project(BE2018321)the Natural Science Foundation of Jiangsu Provincial Department of Education(17KJA416002)+2 种基金the China Postdoctoral Science Foundation(2015M580400)the Jiangsu Province Postdoctoral Science Foundation(1501112B)the Priority Academic Program Development of Jiangsu Higher Education Institutions.
文摘Internet of things(IoT)technology has been constantly applied in greenhouse environmental monitoring and control in recent years.The acquisition and control parameters,network protocols are different for the various purposes of the greenhouse.These factors are the keys to the abilities to effectively communicate and transfer meaningful data in IoT infrastructures.To achieve the adaptive matching of data communication between the gateway and server in a greenhouse IoT system,a data encapsulation method based on XML was designed to enable data interoperability in a distributed greenhouse IoT system.Furthermore,the behaviour of the Multi-Agent System(MAS)was used to merge the heterogeneous information and the responses for data synchronization in the greenhouse IoT system.The data communication mechanism for real-time and cumulative data synchronization between the gateway and server based on JADE was tested in a specific greenhouse.The results showed that the data loss rate between the data acquisition unit and the gateway was 1.52%,and the data loss rate was 0.4%between the gateway and the server;therefore,the mechanism could be feasibly applied to the data communication for a greenhouse IoT system.
文摘A new distribution principle of bus protection is presented.The protection system description,its design features,hardware structure,construction of data communication network are given.Dynamic simulation experiments show its distinguishing advantages over traditional centralized principle.