As a combination of edge computing and artificial intelligence,edge intelligence has become a promising technique and provided its users with a series of fast,precise,and customized services.In edge intelligence,when ...As a combination of edge computing and artificial intelligence,edge intelligence has become a promising technique and provided its users with a series of fast,precise,and customized services.In edge intelligence,when learning agents are deployed on the edge side,the data aggregation from the end side to the designated edge devices is an important research topic.Considering the various importance of end devices,this paper studies the weighted data aggregation problem in a single hop end-to-edge communication network.Firstly,to make sure all the end devices with various weights are fairly treated in data aggregation,a distributed end-to-edge cooperative scheme is proposed.Then,to handle the massive contention on the wireless channel caused by end devices,a multi-armed bandit(MAB)algorithm is designed to help the end devices find their most appropriate update rates.Diffe-rent from the traditional data aggregation works,combining the MAB enables our algorithm a higher efficiency in data aggregation.With a theoretical analysis,we show that the efficiency of our algorithm is asymptotically optimal.Comparative experiments with previous works are also conducted to show the strength of our algorithm.展开更多
Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data N...Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data Networking(NDN).In NDN,names,provider IDs and data are transmitted in plaintext,which exposes vehicular data to security threats and leads to considerable data communication costs and failure rates.This paper proposes a Secure vehicular Data Communication(SDC)approach in NDN to supress data communication costs and failure rates.SCD constructs a vehicular backbone to reduce the number of authenticated nodes involved in reverse paths.Only the ciphtertext of the name and data is included in the signed Interest and Data and transmitted along the backbone,so the secure data communications are achieved.SCD is evaluated,and the data results demonstrate that SCD achieves the above objectives.展开更多
The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure ...The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes.展开更多
This special issue of ZTE Communications focuses on recent advances in mobile data communications for the ICT and telecommunications industries. The ever-increasing amount of mobile data traffic has beenthe subject of...This special issue of ZTE Communications focuses on recent advances in mobile data communications for the ICT and telecommunications industries. The ever-increasing amount of mobile data traffic has beenthe subject of many studies. This research area is widely applicable to contemporary technology and network optimization techniques.展开更多
The new ear of AI is brought about by three converging forces:the advance of AI algorithms,the availability of big data,and the increasing popularity of high performance computing platforms.Data-driven intelligence,or...The new ear of AI is brought about by three converging forces:the advance of AI algorithms,the availability of big data,and the increasing popularity of high performance computing platforms.Data-driven intelligence,or data intelligence,is a new form of AI technologies that leverages the展开更多
The new ear of AI is brought about by three eonverging forees: the advanee of AI algorithms, the availability of big data, and the inereasing popularity of high performanee computing platforms. Data-driven intelligen...The new ear of AI is brought about by three eonverging forees: the advanee of AI algorithms, the availability of big data, and the inereasing popularity of high performanee computing platforms. Data-driven intelligenee, or data intelligenee, is a new fore1 of AI teehnologies that leverages the power of big data.展开更多
In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative ac...In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative acknowledge and asynchronous negative acknowledge models.CFDP is designed to provide data and storage management,story and forward,custody transfer and reliable end-to-end delivery over deep space characterized by huge latency,intermittent link,asymmetric bandwidth and big bit error rate(BER).Four reliable transmission models are analyzed and an expected file-delivery time is calculated with different trans-mission rates,numbers and sizes of packet data units,BERs and frequencies of external events,etc.By comparison of four CFDP models,the requirement of BER for typical missions in deep space is obtained and rules of choosing CFDP models under different uplink state informations are given,which provides references for protocol models selection,utilization and modification.展开更多
Communication behavior recognition is an issue with increasingly importance in the antiterrorism and national defense area.However,the sensing data obtained in actual environment is often not sufficient to accurately ...Communication behavior recognition is an issue with increasingly importance in the antiterrorism and national defense area.However,the sensing data obtained in actual environment is often not sufficient to accurately analyze the communication behavior.Traditional means can hardly utilize the scarce and crude spectrum sensing data captured in a real scene.Thus,communication behavior recognition using raw sensing data under smallsample condition has become a new challenge.In this paper,a data enhanced communication behavior recognition(DECBR)scheme is proposed to meet this challenge.Firstly,a preprocessing method is designed to make the raw spectrum data suitable for the proposed scheme.Then,an adaptive convolutional neural network structure is exploited to carry out communication behavior recognition.Moreover,DCGAN is applied to support data enhancement,which realize communication behavior recognition under small-sample condition.Finally,the scheme is verified by experiments under different data size.The results show that the DECBR scheme can greatly improve the accuracy and efficiency of behavior recognition under smallsample condition.展开更多
In this paper,we propose a novel fuzzy matching data sharing scheme named FADS for cloudedge communications.FADS allows users to specify their access policies,and enables receivers to obtain the data transmitted by th...In this paper,we propose a novel fuzzy matching data sharing scheme named FADS for cloudedge communications.FADS allows users to specify their access policies,and enables receivers to obtain the data transmitted by the senders if and only if the two sides meet their defined certain policies simultaneously.Specifically,we first formalize the definition and security models of fuzzy matching data sharing in cloud-edge environments.Then,we construct a concrete instantiation by pairing-based cryptosystem and the privacy-preserving set intersection on attribute sets from both sides to construct a concurrent matching over the policies.If the matching succeeds,the data can be decrypted.Otherwise,nothing will be revealed.In addition,FADS allows users to dynamically specify the policy for each time,which is an urgent demand in practice.A thorough security analysis demonstrates that FADS is of provable security under indistinguishable chosen ciphertext attack(IND-CCA)in random oracle model against probabilistic polynomial-time(PPT)adversary,and the desirable security properties of privacy and authenticity are achieved.Extensive experiments provide evidence that FADS is with acceptable efficiency.展开更多
We study the effects of quantization and additive white Gaussian noise(AWGN) in transmitting latent representations of images over a noisy communication channel. The latent representations are obtained using autoencod...We study the effects of quantization and additive white Gaussian noise(AWGN) in transmitting latent representations of images over a noisy communication channel. The latent representations are obtained using autoencoders(AEs). We analyze image reconstruction and classification performance for different channel noise powers, latent vector sizes, and number of quantization bits used for the latent variables as well as AEs’ parameters. The results show that the digital transmission of latent representations using conventional AEs alone is extremely vulnerable to channel noise and quantization effects. We then propose a combination of basic AE and a denoising autoencoder(DAE) to denoise the corrupted latent vectors at the receiver. This approach demonstrates robustness against channel noise and quantization effects and enables a significant improvement in image reconstruction and classification performance particularly in adverse scenarios with high noise powers and significant quantization effects.展开更多
In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The...In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The joint coordination of wireless power transfer(WPT)and wireless information transfer(WIT)yields simultaneous wireless information and power transfer(SWIPT)as well as data and energy integrated communication network(DEIN).However,as a promising technique,few efforts are invested in the hardware implementation of DEIN.In order to make DEIN a reality,this paper focuses on hardware implementation of a DEIN.It firstly provides a brief tutorial on SWIPT,while summarising the latest hardware design of WPT transceiver and the existing commercial solutions.Then,a prototype design in DEIN with full protocol stack is elaborated,followed by its performance evaluation.展开更多
With the flexible deployment and high mobility of Unmanned Aerial Vehicles(UAVs)in an open environment,they have generated con-siderable attention in military and civil applications intending to enable ubiquitous conn...With the flexible deployment and high mobility of Unmanned Aerial Vehicles(UAVs)in an open environment,they have generated con-siderable attention in military and civil applications intending to enable ubiquitous connectivity and foster agile communications.The difficulty stems from features other than mobile ad-hoc network(MANET),namely aerial mobility in three-dimensional space and often changing topology.In the UAV network,a single node serves as a forwarding,transmitting,and receiving node at the same time.Typically,the communication path is multi-hop,and routing significantly affects the network’s performance.A lot of effort should be invested in performance analysis for selecting the optimum routing system.With this motivation,this study modelled a new Coati Optimization Algorithm-based Energy-Efficient Routing Process for Unmanned Aerial Vehicle Communication(COAER-UAVC)technique.The presented COAER-UAVC technique establishes effective routes for communication between the UAVs.It is primarily based on the coati characteristics in nature:if attacking and hunting iguanas and escaping from predators.Besides,the presented COAER-UAVC technique concentrates on the design of fitness functions to minimize energy utilization and communication delay.A varied group of simulations was performed to depict the optimum performance of the COAER-UAVC system.The experimental results verified that the COAER-UAVC technique had assured improved performance over other approaches.展开更多
This paper discusses the model-based predictive controller design of networked nonlinear systems with communica- tion delay and data loss. Based on the analysis of the closed-loop networked predictive control systems,...This paper discusses the model-based predictive controller design of networked nonlinear systems with communica- tion delay and data loss. Based on the analysis of the closed-loop networked predictive control systems, the model-based networked predictive control strategy can compensate for communication delay and data loss in an active way. The designed model-based predictive controller can also guarantee the stability of the closed-loop networked system. The simulation re- suits demonstrate the feasibility and efficacy of the proposed model-based predictive controller design scheme.展开更多
This article outlines the development of downhole monitoring and data transmission technology for separated zone water injection in China.According to the development stages,the principles,operation processes,adaptabi...This article outlines the development of downhole monitoring and data transmission technology for separated zone water injection in China.According to the development stages,the principles,operation processes,adaptability and application status of traditional downhole data acquisition method,cable communications and testing technology,cable-controlled downhole parameter real-time monitoring communication method and downhole wireless communication technology are introduced in detail.Problems and challenges of existing technologies in downhole monitoring and data transmission technology are pointed out.According to the production requirement,the future development direction of the downhole monitoring and data transmission technology for separated zone water injection is proposed.For the large number of wells adopting cable measuring and adjustment technology,the key is to realize the digitalization of downhole plug.For the key monitoring wells,cable-controlled communication technology needs to be improved,and downhole monitoring and data transmission technology based on composite coiled tubing needs to be developed to make the operation more convenient and reliable.For large-scale application in oil fields,downhole wireless communication technology should be developed to realize automation of measurement and adjustment.In line with ground mobile communication network,a digital communication network covering the control center,water distribution station and oil reservoir should be built quickly to provide technical support for the digitization of reservoir development.展开更多
For decades, the power system was highly centralized. With the growing integration of distributed generations into the system, there is a necessity for bi-directional communication methods to monitor and control the r...For decades, the power system was highly centralized. With the growing integration of distributed generations into the system, there is a necessity for bi-directional communication methods to monitor and control the remote assets. The primary objective of this paper is to develop a communication link for monitoring and controlling a grid-connected inverter in a remote location. Furthermore, the paper presents developments that have been incorporated to improve the communication link. The literature survey indicates that LoRa is superior compared to other technologies, but has some security and reliability issues. This paper also presents an encryption algorithm to improve the security of the LoRa link. Local data storage added to the system before transmitting data increases the system reliability. A display at the transmission end is added to improve the user-friendliness of the communication link. A Powerline Communication link is parallelly added to the LoRa link to improve the reliability. Finally, tests are conducted with an actual inverter and the results are presented. The tests show that the developed communication link has improved security and reliability, while its open nature makes it highly scalable and adaptable for employment in other smart grid applications.展开更多
The smart grid is the next generatiou electric: grid that enables effi- cient, intelligent, and economical power generation, transmission, and distribution. It has attracted significant attentions and become a global...The smart grid is the next generatiou electric: grid that enables effi- cient, intelligent, and economical power generation, transmission, and distribution. It has attracted significant attentions and become a global trend due to the immense potential benefits including en- hanced reliability and resilience, higher operational efficiency, more efficient energy consumption, and better power quality. This special issue expects to address smart grid issues related to data sensing, data communications and data networking, including high-level ideology/methodology, concrete smart grid inspired data communications and networking technolngies, smart grid system ar- chitecture, QoS, energy-efficiency, and fault tolerance in smart grid systems, management of smart grid systems, and real-world deploy- ment experiences.展开更多
基金supported by the National Natural Science Foundation of China(NSFC)(62102232,62122042,61971269)Natural Science Foundation of Shandong Province Under(ZR2021QF064)。
文摘As a combination of edge computing and artificial intelligence,edge intelligence has become a promising technique and provided its users with a series of fast,precise,and customized services.In edge intelligence,when learning agents are deployed on the edge side,the data aggregation from the end side to the designated edge devices is an important research topic.Considering the various importance of end devices,this paper studies the weighted data aggregation problem in a single hop end-to-edge communication network.Firstly,to make sure all the end devices with various weights are fairly treated in data aggregation,a distributed end-to-edge cooperative scheme is proposed.Then,to handle the massive contention on the wireless channel caused by end devices,a multi-armed bandit(MAB)algorithm is designed to help the end devices find their most appropriate update rates.Diffe-rent from the traditional data aggregation works,combining the MAB enables our algorithm a higher efficiency in data aggregation.With a theoretical analysis,we show that the efficiency of our algorithm is asymptotically optimal.Comparative experiments with previous works are also conducted to show the strength of our algorithm.
基金supported by the National Natural Science Foundation of China under Grant No.62032013the LiaoNing Revitalization Talents Program under Grant No.XLYC1902010.
文摘Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data Networking(NDN).In NDN,names,provider IDs and data are transmitted in plaintext,which exposes vehicular data to security threats and leads to considerable data communication costs and failure rates.This paper proposes a Secure vehicular Data Communication(SDC)approach in NDN to supress data communication costs and failure rates.SCD constructs a vehicular backbone to reduce the number of authenticated nodes involved in reverse paths.Only the ciphtertext of the name and data is included in the signed Interest and Data and transmitted along the backbone,so the secure data communications are achieved.SCD is evaluated,and the data results demonstrate that SCD achieves the above objectives.
基金support of the Interdisciplinary Research Center for Intelligent Secure Systems(IRC-ISS)Internal Fund Grant#INSS2202.
文摘The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes.
文摘This special issue of ZTE Communications focuses on recent advances in mobile data communications for the ICT and telecommunications industries. The ever-increasing amount of mobile data traffic has beenthe subject of many studies. This research area is widely applicable to contemporary technology and network optimization techniques.
文摘The new ear of AI is brought about by three converging forces:the advance of AI algorithms,the availability of big data,and the increasing popularity of high performance computing platforms.Data-driven intelligence,or data intelligence,is a new form of AI technologies that leverages the
文摘The new ear of AI is brought about by three eonverging forees: the advanee of AI algorithms, the availability of big data, and the inereasing popularity of high performanee computing platforms. Data-driven intelligenee, or data intelligenee, is a new fore1 of AI teehnologies that leverages the power of big data.
基金supported by the National Natural Science Fandation of China (6067208960772075)
文摘In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative acknowledge and asynchronous negative acknowledge models.CFDP is designed to provide data and storage management,story and forward,custody transfer and reliable end-to-end delivery over deep space characterized by huge latency,intermittent link,asymmetric bandwidth and big bit error rate(BER).Four reliable transmission models are analyzed and an expected file-delivery time is calculated with different trans-mission rates,numbers and sizes of packet data units,BERs and frequencies of external events,etc.By comparison of four CFDP models,the requirement of BER for typical missions in deep space is obtained and rules of choosing CFDP models under different uplink state informations are given,which provides references for protocol models selection,utilization and modification.
基金supported by the National Natural Science Foundation of China(No.61971439 and No.61702543)the Natural Science Foundation of the Jiangsu Province of China(No.BK20191329)+1 种基金the China Postdoctoral Science Foundation Project(No.2019T120987)the Startup Foundation for Introducing Talent of NUIST(No.2020r100).
文摘Communication behavior recognition is an issue with increasingly importance in the antiterrorism and national defense area.However,the sensing data obtained in actual environment is often not sufficient to accurately analyze the communication behavior.Traditional means can hardly utilize the scarce and crude spectrum sensing data captured in a real scene.Thus,communication behavior recognition using raw sensing data under smallsample condition has become a new challenge.In this paper,a data enhanced communication behavior recognition(DECBR)scheme is proposed to meet this challenge.Firstly,a preprocessing method is designed to make the raw spectrum data suitable for the proposed scheme.Then,an adaptive convolutional neural network structure is exploited to carry out communication behavior recognition.Moreover,DCGAN is applied to support data enhancement,which realize communication behavior recognition under small-sample condition.Finally,the scheme is verified by experiments under different data size.The results show that the DECBR scheme can greatly improve the accuracy and efficiency of behavior recognition under smallsample condition.
基金supported by the China Postdoctoral Science Foundation (Grant Nos. 2021TQ0042, 2021M700435, 2021TQ0041)the National Natural Science Foundation of China (Grant No. 62102027)the Shandong Provincial Key Research and Development Program (2021CXGC010106)
文摘In this paper,we propose a novel fuzzy matching data sharing scheme named FADS for cloudedge communications.FADS allows users to specify their access policies,and enables receivers to obtain the data transmitted by the senders if and only if the two sides meet their defined certain policies simultaneously.Specifically,we first formalize the definition and security models of fuzzy matching data sharing in cloud-edge environments.Then,we construct a concrete instantiation by pairing-based cryptosystem and the privacy-preserving set intersection on attribute sets from both sides to construct a concurrent matching over the policies.If the matching succeeds,the data can be decrypted.Otherwise,nothing will be revealed.In addition,FADS allows users to dynamically specify the policy for each time,which is an urgent demand in practice.A thorough security analysis demonstrates that FADS is of provable security under indistinguishable chosen ciphertext attack(IND-CCA)in random oracle model against probabilistic polynomial-time(PPT)adversary,and the desirable security properties of privacy and authenticity are achieved.Extensive experiments provide evidence that FADS is with acceptable efficiency.
基金supported by Hong Kong Government general research fund (GRF) under project number PolyU152757/16ENational Natural Science Foundation China under project numbers 61435006 and 61401020
文摘We study the effects of quantization and additive white Gaussian noise(AWGN) in transmitting latent representations of images over a noisy communication channel. The latent representations are obtained using autoencoders(AEs). We analyze image reconstruction and classification performance for different channel noise powers, latent vector sizes, and number of quantization bits used for the latent variables as well as AEs’ parameters. The results show that the digital transmission of latent representations using conventional AEs alone is extremely vulnerable to channel noise and quantization effects. We then propose a combination of basic AE and a denoising autoencoder(DAE) to denoise the corrupted latent vectors at the receiver. This approach demonstrates robustness against channel noise and quantization effects and enables a significant improvement in image reconstruction and classification performance particularly in adverse scenarios with high noise powers and significant quantization effects.
基金financial support of National Natural Science Foundation of China(NSFC),No.U1705263 and 61971102GF Innovative Research Programthe Sichuan Science and Technology Program,No.2019YJ0194。
文摘In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The joint coordination of wireless power transfer(WPT)and wireless information transfer(WIT)yields simultaneous wireless information and power transfer(SWIPT)as well as data and energy integrated communication network(DEIN).However,as a promising technique,few efforts are invested in the hardware implementation of DEIN.In order to make DEIN a reality,this paper focuses on hardware implementation of a DEIN.It firstly provides a brief tutorial on SWIPT,while summarising the latest hardware design of WPT transceiver and the existing commercial solutions.Then,a prototype design in DEIN with full protocol stack is elaborated,followed by its performance evaluation.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through Large Groups Project under grant number(235/44)Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2023R114)+1 种基金Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:(22UQU4310373DSR71)This study is supported via funding from Prince Sattam bin Abdulaziz University project number(PSAU/2023/R/1444).
文摘With the flexible deployment and high mobility of Unmanned Aerial Vehicles(UAVs)in an open environment,they have generated con-siderable attention in military and civil applications intending to enable ubiquitous connectivity and foster agile communications.The difficulty stems from features other than mobile ad-hoc network(MANET),namely aerial mobility in three-dimensional space and often changing topology.In the UAV network,a single node serves as a forwarding,transmitting,and receiving node at the same time.Typically,the communication path is multi-hop,and routing significantly affects the network’s performance.A lot of effort should be invested in performance analysis for selecting the optimum routing system.With this motivation,this study modelled a new Coati Optimization Algorithm-based Energy-Efficient Routing Process for Unmanned Aerial Vehicle Communication(COAER-UAVC)technique.The presented COAER-UAVC technique establishes effective routes for communication between the UAVs.It is primarily based on the coati characteristics in nature:if attacking and hunting iguanas and escaping from predators.Besides,the presented COAER-UAVC technique concentrates on the design of fitness functions to minimize energy utilization and communication delay.A varied group of simulations was performed to depict the optimum performance of the COAER-UAVC system.The experimental results verified that the COAER-UAVC technique had assured improved performance over other approaches.
基金Project supported by the Key Program for the National Natural Science Foundation of China(Grant No.61333003)the General Program for the National Natural Science Foundation of China(Grant No.61273104)
文摘This paper discusses the model-based predictive controller design of networked nonlinear systems with communica- tion delay and data loss. Based on the analysis of the closed-loop networked predictive control systems, the model-based networked predictive control strategy can compensate for communication delay and data loss in an active way. The designed model-based predictive controller can also guarantee the stability of the closed-loop networked system. The simulation re- suits demonstrate the feasibility and efficacy of the proposed model-based predictive controller design scheme.
基金Supported by the National Natural Science Foundation Science Center Project/Basic Science Center Project(72088101)PetroChina Scientific Research and Technology Development Project(2020B-4119,2021ZG12).
文摘This article outlines the development of downhole monitoring and data transmission technology for separated zone water injection in China.According to the development stages,the principles,operation processes,adaptability and application status of traditional downhole data acquisition method,cable communications and testing technology,cable-controlled downhole parameter real-time monitoring communication method and downhole wireless communication technology are introduced in detail.Problems and challenges of existing technologies in downhole monitoring and data transmission technology are pointed out.According to the production requirement,the future development direction of the downhole monitoring and data transmission technology for separated zone water injection is proposed.For the large number of wells adopting cable measuring and adjustment technology,the key is to realize the digitalization of downhole plug.For the key monitoring wells,cable-controlled communication technology needs to be improved,and downhole monitoring and data transmission technology based on composite coiled tubing needs to be developed to make the operation more convenient and reliable.For large-scale application in oil fields,downhole wireless communication technology should be developed to realize automation of measurement and adjustment.In line with ground mobile communication network,a digital communication network covering the control center,water distribution station and oil reservoir should be built quickly to provide technical support for the digitization of reservoir development.
文摘For decades, the power system was highly centralized. With the growing integration of distributed generations into the system, there is a necessity for bi-directional communication methods to monitor and control the remote assets. The primary objective of this paper is to develop a communication link for monitoring and controlling a grid-connected inverter in a remote location. Furthermore, the paper presents developments that have been incorporated to improve the communication link. The literature survey indicates that LoRa is superior compared to other technologies, but has some security and reliability issues. This paper also presents an encryption algorithm to improve the security of the LoRa link. Local data storage added to the system before transmitting data increases the system reliability. A display at the transmission end is added to improve the user-friendliness of the communication link. A Powerline Communication link is parallelly added to the LoRa link to improve the reliability. Finally, tests are conducted with an actual inverter and the results are presented. The tests show that the developed communication link has improved security and reliability, while its open nature makes it highly scalable and adaptable for employment in other smart grid applications.
文摘The smart grid is the next generatiou electric: grid that enables effi- cient, intelligent, and economical power generation, transmission, and distribution. It has attracted significant attentions and become a global trend due to the immense potential benefits including en- hanced reliability and resilience, higher operational efficiency, more efficient energy consumption, and better power quality. This special issue expects to address smart grid issues related to data sensing, data communications and data networking, including high-level ideology/methodology, concrete smart grid inspired data communications and networking technolngies, smart grid system ar- chitecture, QoS, energy-efficiency, and fault tolerance in smart grid systems, management of smart grid systems, and real-world deploy- ment experiences.