This paper introduces the usage of these functions. It presents the technique of how to program with them to perform the serial communications between a computer and other digital devices by the serial porst in Window...This paper introduces the usage of these functions. It presents the technique of how to program with them to perform the serial communications between a computer and other digital devices by the serial porst in Windows95. The related sample codes of the applications of this technique written in C++ programming language are also given. This technique is applied successfully to receive the data of the radio noise from a frequency monitor.展开更多
Present a kind of method which is used to communicate between serial serial port and peripheral equipment dynamicly and real-time using multithreading technique based on the basic principle of communication and multit...Present a kind of method which is used to communicate between serial serial port and peripheral equipment dynamicly and real-time using multithreading technique based on the basic principle of communication and multitasking mechanism in the circumstance of Windows. This method resolves the question of Real-time answering in the serial communication validly, reduces losing rate of data and improves reliability of system. This article presents a general method used in the serial communication which is practical.展开更多
Satellite networks are recognized as the most essential communication infrastructures in the world today,which complement land networks and provide valuable services for their users.Extensive coverage and service stab...Satellite networks are recognized as the most essential communication infrastructures in the world today,which complement land networks and provide valuable services for their users.Extensive coverage and service stability of these networks have increased their popularity.Since eavesdropping and active intrusion in satellite communications are much easier than in terrestrial networks,securing satellite communications is vital.So far,several protocols have been proposed for authentication and key exchange of satellite communications,but none of them fullymeet the security requirements.In this paper,we examine one of these protocols and identify its security vulnerabilities.Moreover,we propose a robust and secure authentication and session key agreement protocol using the elliptic curve cryptography(ECC).We show that the proposed protocol meets common security requirements and is resistant to known security attacks.Moreover,we prove that the proposed scheme satisfies the security features using the Automated Validation of Internet Security Protocols and Applications(AVISPA)formal verification tool and On-the fly Model-Checker(OFMC)and ATtack SEarcher(ATSE)model checkers.We have also proved the security of the session key exchange of our protocol using theReal orRandom(RoR)model.Finally,the comparison of our scheme with similar methods shows its superiority.展开更多
Previous work mostly employs an ideal system model that assumes fully connected processors and concurrent communication, which leads to inaccurate and inegicient schedule results. In this paper, a new scheduling model...Previous work mostly employs an ideal system model that assumes fully connected processors and concurrent communication, which leads to inaccurate and inegicient schedule results. In this paper, a new scheduling model which integrates the communication awareness was proposed. Then, a novel scheduling algorithm based on list heuristic was put forward for the new model, which can produce optimal schedule by serializing the communications edges. Experimental results show that the accuracy and efficiency of the new model and algorithm are significantly improved.展开更多
The characteristic of any literary tradition is to enhance the knowledge of human beings psychologically,biologically,and philosophically.This characteristic is seen in most of the literary creations of classical Sinh...The characteristic of any literary tradition is to enhance the knowledge of human beings psychologically,biologically,and philosophically.This characteristic is seen in most of the literary creations of classical Sinhala literary tradition.The literary features of classical Sinhala literary tradition are enriched with its own communication competencies,which are created to up lift the noble and spiritual qualities.This study was completed by studying the communication competencies depicted in classical Sinhala literary tradition,in relation to“Buthsarana”,which was written by Vidyachakrawarthi,in the early part of Dambadeniya Era.Accordingly,the research was done based on the features such as narrative style,writing techniques,language techniques,performing ability,and social analysis.Vidyachakrawarthi in his book brings forth the“Nava Arahaadi Budu Guna”(Nine Great Qualities)of Lord Buddha using the devotive path to enhance the wisdom of devotees.In that process Vidyachakrawarthi uses a creative communication method.An inherent narrative style,prose writing rules and styles are used to present the content regularly.Moreover,the content of the stories has been created by occupying language techniques and social analysis,while making it easy to understand the“Nava Arahaadi Budu Guna”of Lord Buddha.Therefore,a perspicuous narrative style and creative language competency are included in“Buthsarana”.The agreement of the format and the content specialties are capable of providing the reader with inter cultural understanding,building cultural relationships,new ways of thinking,by creating devotion in the minds of the reader.Therefore,“Buthsarana”has provided the society with physical and mental motivation.Thus it could be shown that,with the success of the format and the communication competency included,“Buthsarana”is an effective communication mode which is capable of awaking the critical thinking of the reader.展开更多
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t...With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions.展开更多
In an industrial computer control system, if a communication with a single chip computer built with the aid of serial port I/O ports can be got easily to connect with equipment. Meanwhile, the system reliability would...In an industrial computer control system, if a communication with a single chip computer built with the aid of serial port I/O ports can be got easily to connect with equipment. Meanwhile, the system reliability would be improved and the system cost would be reduced.To save ±15 V power supply and electrical level convert circuit,the author provide a simple interface circuit and operational procedure between PC and the single chip computer in this paper. The application of multithread is introduced and the advantages of data acquisition and processing with multithread are also analyzed.展开更多
There are various challenges that are faced in group communication, so it is necessary to ensure session key. Key agreement is the fundamental cryptographic primitive for establishing a secure communication. It is a p...There are various challenges that are faced in group communication, so it is necessary to ensure session key. Key agreement is the fundamental cryptographic primitive for establishing a secure communication. It is a process of computing a shared secret contributed by two or more entities such that no single node can predetermine the resulting value. An authenticated key agreement is attained by combining the key agreement protocol with digital signatures. After a brief introduction to existing key agreement in group communication, Making use of the additive-multiplicative homomorphism in the integer ring defined by Sander and Tschudin: A new protocols, called the homomorphism key agreement, was designed, which can be self-contributory, robust, scalable and applicable in group communication.展开更多
A new efficient two-party semi-quantum key agreement protocol is proposed with high-dimensional single-particle states.Different from the previous semi-quantum key agreement protocols based on the two-level quantum sy...A new efficient two-party semi-quantum key agreement protocol is proposed with high-dimensional single-particle states.Different from the previous semi-quantum key agreement protocols based on the two-level quantum system,the propounded protocol makes use of the advantage of the high-dimensional quantum system,which possesses higher efficiency and better robustness against eavesdropping.Besides,the protocol allows the classical participant to encode the secret key with qudit shifting operations without involving any quantum measurement abilities.The designed semi-quantum key agreement protocol could resist both participant attacks and outsider attacks.Meanwhile,the conjoint analysis of security and efficiency provides an appropriate choice for reference on the dimension of single-particle states and the number of decoy states.展开更多
In order to further improve the serial ports communication mode of the general Flex Pendant for industrial robot,a multiple serial communication mode is put forward. It is used to meet the stability of data transmissi...In order to further improve the serial ports communication mode of the general Flex Pendant for industrial robot,a multiple serial communication mode is put forward. It is used to meet the stability of data transmission,transmission distance,transmission speed,anti-interference and cost-effective. Using ADUM1201 single direction dual channel digital isolator,two pieces of MAX13487 E and a piece of MAX3232 chip to transmit data and files, and to control chip’ s electrical level. Selecting the RS232, RS422 and RS485 communication mode,the serial ports of the general Flex Pendant of industrial robot is optimized.展开更多
With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying ...With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying issue that frequent end-edgecloud communication is over a public or adversarycontrolled channel.Additionally,with the presence of resource-constrained devices,it’s imperative to conduct the secure communication mechanism,while still guaranteeing efficiency.Physical unclonable functions(PUF)emerge as promising lightweight security primitives.Thus,we first construct a PUF-based security mechanism for vulnerable IoT devices.Further,a provably secure and PUF-based authentication key agreement scheme is proposed for establishing the secure channel in end-edge-cloud empowered IoT,without requiring pre-loaded master keys.The security of our scheme is rigorously proven through formal security analysis under the random oracle model,and security verification using AVISPA tool.The comprehensive security features are also elaborated.Moreover,the numerical results demonstrate that the proposed scheme outperforms existing related schemes in terms of computational and communication efficiency.展开更多
Quantum key agreement is a promising key establishing protocol that can play a significant role in securing 5G/6G communication networks.Recently,Liu et al.(Quantum Information Processing 18(8):1-10,2019)proposed a mu...Quantum key agreement is a promising key establishing protocol that can play a significant role in securing 5G/6G communication networks.Recently,Liu et al.(Quantum Information Processing 18(8):1-10,2019)proposed a multi-party quantum key agreement protocol based on four-qubit cluster states was proposed.The aim of their protocol is to agree on a shared secret key among multiple remote participants.Liu et al.employed four-qubit cluster states to be the quantum resources and the X operation to securely share a secret key.In addition,Liu et al.’s protocol guarantees that each participant makes an equal contribution to the final key.The authors also claimed that the proposed protocol is secure against participant attack and dishonest participants cannot generate the final shared key alone.However,we show here that Liu et al.protocol is insecure against a collusive attack,where dishonest participants can retrieve the private inputs of a trustworthy participant without being caught.Additionally,the corresponding modifications are presented to address these security flaws in Liu et al.’s protocol.展开更多
Data acquisition, analysis and calibrating system affiliated with the vehicle is developed for the research on the automatic shift system (ASS). Considering the vehicle’s hard environment such as vibration, high and ...Data acquisition, analysis and calibrating system affiliated with the vehicle is developed for the research on the automatic shift system (ASS). Considering the vehicle’s hard environment such as vibration, high and low temperature, electromagnetic disturbance and so on, the most suitable project is selected. PC104 transfers data with ECU by serial communication and a solid state disk is used as a FLASH ROM. Some techniques including frequency division of data is adopted in the software design in order to ensure the sampling frequency. The analysis and debug software is also contrived according to the characteristic of the ASS. The system plays an important role in the development of the ASS because of the good reliability and practicability in the application.展开更多
In traditional universal asynchronous receiver transmitter (UART) controller, the data transmission is inefficient and the data bus utilization ratio is low. A novel design is provided to solve these problems. The a...In traditional universal asynchronous receiver transmitter (UART) controller, the data transmission is inefficient and the data bus utilization ratio is low. A novel design is provided to solve these problems. The architecture of the system is introduced, the flow charts of data processing as well as the implementation state machine are also presented in detail. This paper is concluded by comparing the performance of this design, which is realized on field programmable gate army (FPGA) using Verilog hardware description language (HDL), with other traditional UART controllers.展开更多
In the robotic community more and more hands are developed. Based on theexperience of HIT Hand and DLR Hand II, a smaller and easier manufactured dexterous robot hand withmultisen-sory function and high integration is...In the robotic community more and more hands are developed. Based on theexperience of HIT Hand and DLR Hand II, a smaller and easier manufactured dexterous robot hand withmultisen-sory function and high integration is jointly developed. The prototype of the hand issuccessfully built. It has 4 fingers in total 13-DOFs (degree of freedom). Each finger has 3-DOFsand 4 joints, the last 2 joints are mechanically coupled by means of four-bar linkage mechanism. Italso has an additional DOF to realize motion of the thumb relative to the palm. The fingertip forcecan reach up to 10 N. Full integration of mechanical body, actuation system, multisensory system andelectronics is a significant feature. DSP based control system is implemented in PCI busarchitecture and the serial communication between the hand and DSP needs only 2 lines.展开更多
According to the phenomenon of "four more"and"four low "problems in the observation stations,the surface-based meteorological observing system can't adapt to the change of the adaptive observat...According to the phenomenon of "four more"and"four low "problems in the observation stations,the surface-based meteorological observing system can't adapt to the change of the adaptive observation equipment and reduce of business intensification. A station integrated system is proposed,w hich can be configured,connected and extended to all kinds of observation equipment. And the integrated processor is designed,supporting a variety of communication interface standards. Flexible configuration,connection and expansion betw een conventional and new type of meteorological observation equipment are supported. It is capable for online calibration and maintenance of observation equipment. The effectiveness of automatic observation equipment is totally achieved to provide basic information support for disaster prevention and mitigation and national economic development.展开更多
Both the traverse subsystem and the elevation subsystem of the all-electrical tank gun control system are composed of electrical drive control system respectively. The parameters of PI regulator in these electrical dr...Both the traverse subsystem and the elevation subsystem of the all-electrical tank gun control system are composed of electrical drive control system respectively. The parameters of PI regulator in these electrical drive control systems affect the performance of the control system seriously. Up to now, there is not a simple and practical method for choosing regulator parameters, which are usually determined by repeated and continual readjustment. This method is low efficient, and the parameters got are not always optimal. A method for on-line adjusting the parameters of PI regulator in the electrical drive control system by computer program is introduced in this paper. The function of adjusting PI parameters of the electrical drive control system is realized by PC program written by VC++ and controlling program written by assemble language and by the communication between PC and DSP completed by the control MSCOMM in VC++6.0. The method as mentioned above which is applied for an all-electrical tank gun control system under development is proved very available, a better performance might be obtained for the all-electrical tank gun control system easily.展开更多
Computer numerical control(CNC)system is the base of modern digital and intelligent manufacturing technolo- gy.And opened its architecture and constituted based on PC and Windows operating system(OS)is the main trend ...Computer numerical control(CNC)system is the base of modern digital and intelligent manufacturing technolo- gy.And opened its architecture and constituted based on PC and Windows operating system(OS)is the main trend of CNC sys- tem.However,even if the highest system priority is used in user mode,real-time capability of Windows(2000,NT,XP)for applications is not guaranteed.By using a device driver,which is running in kernel mode,the real time performance of Windows can be enhanced greatly.The acknowledgment performance of Windows to peripheral interrupts was evaluated.Harmonized with an intelligent real-time serial communication bus(RTSB),strict real-time performance can be achieved in Windows platform. An opened architecture software CNC system which is hardware independence is proposed based on PC and RTSB.A numerical control real time kernel(NCRTK),which is implemented as a device driver on Windows,is used to perform the NC tasks.Tasks are divided into real-time and non real-time.Real-time task is running in kernel mode and non real-time task is running in user mode.Data are exchanged between kernel and user mode by DMA and Windows Messages.展开更多
This paper briefly analyzes the present situation of textile mill's air-conditioning system. Since it is difficult to establish detailed math model to control a textile mill's airconditioning system because of the i...This paper briefly analyzes the present situation of textile mill's air-conditioning system. Since it is difficult to establish detailed math model to control a textile mill's airconditioning system because of the influence of various factors such as the differences in seasons, regions, etc., most air-conditioning equipment can not be controlled automatically. This paper suggests utilizing multi-function data acquisRion card to collect the data about the temperature and humidity of a workshop, processing the data on a PC, comparing them with the expert database, and then using the 485 serial port expanding module to output the parameters, which are used to control the inverter, so that the purpose of adjusting the temperature and humidity of the workshop is achieved.展开更多
基金Supported by the 86 3 High Technology Project of China (86 3-818-0 1-0 2 )
文摘This paper introduces the usage of these functions. It presents the technique of how to program with them to perform the serial communications between a computer and other digital devices by the serial porst in Windows95. The related sample codes of the applications of this technique written in C++ programming language are also given. This technique is applied successfully to receive the data of the radio noise from a frequency monitor.
文摘Present a kind of method which is used to communicate between serial serial port and peripheral equipment dynamicly and real-time using multithreading technique based on the basic principle of communication and multitasking mechanism in the circumstance of Windows. This method resolves the question of Real-time answering in the serial communication validly, reduces losing rate of data and improves reliability of system. This article presents a general method used in the serial communication which is practical.
文摘Satellite networks are recognized as the most essential communication infrastructures in the world today,which complement land networks and provide valuable services for their users.Extensive coverage and service stability of these networks have increased their popularity.Since eavesdropping and active intrusion in satellite communications are much easier than in terrestrial networks,securing satellite communications is vital.So far,several protocols have been proposed for authentication and key exchange of satellite communications,but none of them fullymeet the security requirements.In this paper,we examine one of these protocols and identify its security vulnerabilities.Moreover,we propose a robust and secure authentication and session key agreement protocol using the elliptic curve cryptography(ECC).We show that the proposed protocol meets common security requirements and is resistant to known security attacks.Moreover,we prove that the proposed scheme satisfies the security features using the Automated Validation of Internet Security Protocols and Applications(AVISPA)formal verification tool and On-the fly Model-Checker(OFMC)and ATtack SEarcher(ATSE)model checkers.We have also proved the security of the session key exchange of our protocol using theReal orRandom(RoR)model.Finally,the comparison of our scheme with similar methods shows its superiority.
基金the National Natural Science Foundation of China(No60503048,60672059)the National High Technology Research and Development Program of China(No2006AA01Z233)
文摘Previous work mostly employs an ideal system model that assumes fully connected processors and concurrent communication, which leads to inaccurate and inegicient schedule results. In this paper, a new scheduling model which integrates the communication awareness was proposed. Then, a novel scheduling algorithm based on list heuristic was put forward for the new model, which can produce optimal schedule by serializing the communications edges. Experimental results show that the accuracy and efficiency of the new model and algorithm are significantly improved.
文摘The characteristic of any literary tradition is to enhance the knowledge of human beings psychologically,biologically,and philosophically.This characteristic is seen in most of the literary creations of classical Sinhala literary tradition.The literary features of classical Sinhala literary tradition are enriched with its own communication competencies,which are created to up lift the noble and spiritual qualities.This study was completed by studying the communication competencies depicted in classical Sinhala literary tradition,in relation to“Buthsarana”,which was written by Vidyachakrawarthi,in the early part of Dambadeniya Era.Accordingly,the research was done based on the features such as narrative style,writing techniques,language techniques,performing ability,and social analysis.Vidyachakrawarthi in his book brings forth the“Nava Arahaadi Budu Guna”(Nine Great Qualities)of Lord Buddha using the devotive path to enhance the wisdom of devotees.In that process Vidyachakrawarthi uses a creative communication method.An inherent narrative style,prose writing rules and styles are used to present the content regularly.Moreover,the content of the stories has been created by occupying language techniques and social analysis,while making it easy to understand the“Nava Arahaadi Budu Guna”of Lord Buddha.Therefore,a perspicuous narrative style and creative language competency are included in“Buthsarana”.The agreement of the format and the content specialties are capable of providing the reader with inter cultural understanding,building cultural relationships,new ways of thinking,by creating devotion in the minds of the reader.Therefore,“Buthsarana”has provided the society with physical and mental motivation.Thus it could be shown that,with the success of the format and the communication competency included,“Buthsarana”is an effective communication mode which is capable of awaking the critical thinking of the reader.
基金This work has received funding from National Natural Science Foundation of China(No.42275157).
文摘With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions.
文摘In an industrial computer control system, if a communication with a single chip computer built with the aid of serial port I/O ports can be got easily to connect with equipment. Meanwhile, the system reliability would be improved and the system cost would be reduced.To save ±15 V power supply and electrical level convert circuit,the author provide a simple interface circuit and operational procedure between PC and the single chip computer in this paper. The application of multithread is introduced and the advantages of data acquisition and processing with multithread are also analyzed.
基金National Natural Science Foundation of China(No.90104005)
文摘There are various challenges that are faced in group communication, so it is necessary to ensure session key. Key agreement is the fundamental cryptographic primitive for establishing a secure communication. It is a process of computing a shared secret contributed by two or more entities such that no single node can predetermine the resulting value. An authenticated key agreement is attained by combining the key agreement protocol with digital signatures. After a brief introduction to existing key agreement in group communication, Making use of the additive-multiplicative homomorphism in the integer ring defined by Sander and Tschudin: A new protocols, called the homomorphism key agreement, was designed, which can be self-contributory, robust, scalable and applicable in group communication.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61871205 and 61561033)the Major Academic Discipline and Technical Leader of Jiangxi Province,China(Grant No.20162BCB22011).
文摘A new efficient two-party semi-quantum key agreement protocol is proposed with high-dimensional single-particle states.Different from the previous semi-quantum key agreement protocols based on the two-level quantum system,the propounded protocol makes use of the advantage of the high-dimensional quantum system,which possesses higher efficiency and better robustness against eavesdropping.Besides,the protocol allows the classical participant to encode the secret key with qudit shifting operations without involving any quantum measurement abilities.The designed semi-quantum key agreement protocol could resist both participant attacks and outsider attacks.Meanwhile,the conjoint analysis of security and efficiency provides an appropriate choice for reference on the dimension of single-particle states and the number of decoy states.
基金supported by the National Key Technology R&D Program(2015BAK06B04)the key technologies R&D Program of Tianjin(14ZCZDSF00022)
文摘In order to further improve the serial ports communication mode of the general Flex Pendant for industrial robot,a multiple serial communication mode is put forward. It is used to meet the stability of data transmission,transmission distance,transmission speed,anti-interference and cost-effective. Using ADUM1201 single direction dual channel digital isolator,two pieces of MAX13487 E and a piece of MAX3232 chip to transmit data and files, and to control chip’ s electrical level. Selecting the RS232, RS422 and RS485 communication mode,the serial ports of the general Flex Pendant of industrial robot is optimized.
基金supported by the National Key Research and Development Program of China,“Joint Research of IoT Security System and Key Technologies Based on Quantum Key,”under project number 2020YFE0200600.
文摘With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying issue that frequent end-edgecloud communication is over a public or adversarycontrolled channel.Additionally,with the presence of resource-constrained devices,it’s imperative to conduct the secure communication mechanism,while still guaranteeing efficiency.Physical unclonable functions(PUF)emerge as promising lightweight security primitives.Thus,we first construct a PUF-based security mechanism for vulnerable IoT devices.Further,a provably secure and PUF-based authentication key agreement scheme is proposed for establishing the secure channel in end-edge-cloud empowered IoT,without requiring pre-loaded master keys.The security of our scheme is rigorously proven through formal security analysis under the random oracle model,and security verification using AVISPA tool.The comprehensive security features are also elaborated.Moreover,the numerical results demonstrate that the proposed scheme outperforms existing related schemes in terms of computational and communication efficiency.
基金This project was financially supported by the Academy of Scientific Research and Technology(ASRT)in Egypt,under the project of Science Up,Grant no.6626.
文摘Quantum key agreement is a promising key establishing protocol that can play a significant role in securing 5G/6G communication networks.Recently,Liu et al.(Quantum Information Processing 18(8):1-10,2019)proposed a multi-party quantum key agreement protocol based on four-qubit cluster states was proposed.The aim of their protocol is to agree on a shared secret key among multiple remote participants.Liu et al.employed four-qubit cluster states to be the quantum resources and the X operation to securely share a secret key.In addition,Liu et al.’s protocol guarantees that each participant makes an equal contribution to the final key.The authors also claimed that the proposed protocol is secure against participant attack and dishonest participants cannot generate the final shared key alone.However,we show here that Liu et al.protocol is insecure against a collusive attack,where dishonest participants can retrieve the private inputs of a trustworthy participant without being caught.Additionally,the corresponding modifications are presented to address these security flaws in Liu et al.’s protocol.
文摘Data acquisition, analysis and calibrating system affiliated with the vehicle is developed for the research on the automatic shift system (ASS). Considering the vehicle’s hard environment such as vibration, high and low temperature, electromagnetic disturbance and so on, the most suitable project is selected. PC104 transfers data with ECU by serial communication and a solid state disk is used as a FLASH ROM. Some techniques including frequency division of data is adopted in the software design in order to ensure the sampling frequency. The analysis and debug software is also contrived according to the characteristic of the ASS. The system plays an important role in the development of the ASS because of the good reliability and practicability in the application.
基金National Natural Science Foundation of China (60532030)
文摘In traditional universal asynchronous receiver transmitter (UART) controller, the data transmission is inefficient and the data bus utilization ratio is low. A novel design is provided to solve these problems. The architecture of the system is introduced, the flow charts of data processing as well as the implementation state machine are also presented in detail. This paper is concluded by comparing the performance of this design, which is realized on field programmable gate army (FPGA) using Verilog hardware description language (HDL), with other traditional UART controllers.
文摘In the robotic community more and more hands are developed. Based on theexperience of HIT Hand and DLR Hand II, a smaller and easier manufactured dexterous robot hand withmultisen-sory function and high integration is jointly developed. The prototype of the hand issuccessfully built. It has 4 fingers in total 13-DOFs (degree of freedom). Each finger has 3-DOFsand 4 joints, the last 2 joints are mechanically coupled by means of four-bar linkage mechanism. Italso has an additional DOF to realize motion of the thumb relative to the palm. The fingertip forcecan reach up to 10 N. Full integration of mechanical body, actuation system, multisensory system andelectronics is a significant feature. DSP based control system is implemented in PCI busarchitecture and the serial communication between the hand and DSP needs only 2 lines.
基金supported by Meteorological Industry Research Projects ( 2013 ) : Development and Application of Key Integration Technologies for Surface-based Meteorological Observation
文摘According to the phenomenon of "four more"and"four low "problems in the observation stations,the surface-based meteorological observing system can't adapt to the change of the adaptive observation equipment and reduce of business intensification. A station integrated system is proposed,w hich can be configured,connected and extended to all kinds of observation equipment. And the integrated processor is designed,supporting a variety of communication interface standards. Flexible configuration,connection and expansion betw een conventional and new type of meteorological observation equipment are supported. It is capable for online calibration and maintenance of observation equipment. The effectiveness of automatic observation equipment is totally achieved to provide basic information support for disaster prevention and mitigation and national economic development.
文摘Both the traverse subsystem and the elevation subsystem of the all-electrical tank gun control system are composed of electrical drive control system respectively. The parameters of PI regulator in these electrical drive control systems affect the performance of the control system seriously. Up to now, there is not a simple and practical method for choosing regulator parameters, which are usually determined by repeated and continual readjustment. This method is low efficient, and the parameters got are not always optimal. A method for on-line adjusting the parameters of PI regulator in the electrical drive control system by computer program is introduced in this paper. The function of adjusting PI parameters of the electrical drive control system is realized by PC program written by VC++ and controlling program written by assemble language and by the communication between PC and DSP completed by the control MSCOMM in VC++6.0. The method as mentioned above which is applied for an all-electrical tank gun control system under development is proved very available, a better performance might be obtained for the all-electrical tank gun control system easily.
基金Supported by the National Natural Science Foundation of China(No.50445004).
文摘Computer numerical control(CNC)system is the base of modern digital and intelligent manufacturing technolo- gy.And opened its architecture and constituted based on PC and Windows operating system(OS)is the main trend of CNC sys- tem.However,even if the highest system priority is used in user mode,real-time capability of Windows(2000,NT,XP)for applications is not guaranteed.By using a device driver,which is running in kernel mode,the real time performance of Windows can be enhanced greatly.The acknowledgment performance of Windows to peripheral interrupts was evaluated.Harmonized with an intelligent real-time serial communication bus(RTSB),strict real-time performance can be achieved in Windows platform. An opened architecture software CNC system which is hardware independence is proposed based on PC and RTSB.A numerical control real time kernel(NCRTK),which is implemented as a device driver on Windows,is used to perform the NC tasks.Tasks are divided into real-time and non real-time.Real-time task is running in kernel mode and non real-time task is running in user mode.Data are exchanged between kernel and user mode by DMA and Windows Messages.
文摘This paper briefly analyzes the present situation of textile mill's air-conditioning system. Since it is difficult to establish detailed math model to control a textile mill's airconditioning system because of the influence of various factors such as the differences in seasons, regions, etc., most air-conditioning equipment can not be controlled automatically. This paper suggests utilizing multi-function data acquisRion card to collect the data about the temperature and humidity of a workshop, processing the data on a PC, comparing them with the expert database, and then using the 485 serial port expanding module to output the parameters, which are used to control the inverter, so that the purpose of adjusting the temperature and humidity of the workshop is achieved.