期刊文献+
共找到40篇文章
< 1 2 >
每页显示 20 50 100
Falcon Optimization Algorithm-Based Energy Efficient Communication Protocol for Cluster-Based Vehicular Networks 被引量:1
1
作者 Youseef Alotaibi B.Rajasekar +1 位作者 R.Jayalakshmi Surendran Rajendran 《Computers, Materials & Continua》 SCIE EI 2024年第3期4243-4262,共20页
Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effect... Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effective driving experience by presenting time-sensitive and location-aware data.The communication occurs directly between V2V and Base Station(BS)units such as the Road Side Unit(RSU),named as a Vehicle to Infrastructure(V2I).However,the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with time.Therefore,the scheme of an effectual routing protocol for reliable and stable communications is significant.Current research demonstrates that clustering is an intelligent method for effectual routing in a mobile environment.Therefore,this article presents a Falcon Optimization Algorithm-based Energy Efficient Communication Protocol for Cluster-based Routing(FOA-EECPCR)technique in VANETS.The FOA-EECPCR technique intends to group the vehicles and determine the shortest route in the VANET.To accomplish this,the FOA-EECPCR technique initially clusters the vehicles using FOA with fitness functions comprising energy,distance,and trust level.For the routing process,the Sparrow Search Algorithm(SSA)is derived with a fitness function that encompasses two variables,namely,energy and distance.A series of experiments have been conducted to exhibit the enhanced performance of the FOA-EECPCR method.The experimental outcomes demonstrate the enhanced performance of the FOA-EECPCR approach over other current methods. 展开更多
关键词 Vehicular networks communication protocol CLUSTERING falcon optimization algorithm ROUTING
下载PDF
Distributed Fault Estimation for Nonlinear Systems With Sensor Saturation and Deception Attacks Using Stochastic Communication Protocols
2
作者 Weiwei Sun Xinci Gao +1 位作者 Lusong Ding Xiangyu Chen 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第8期1865-1876,共12页
This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimati... This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimation structure under consideration,an estimation center is not necessary,and the estimator derives its information from itself and neighboring nodes,which fuses the state vector and the measurement vector.In an effort to cut down data conflicts in communication networks,the stochastic communication protocol(SCP)is employed so that the output signals from sensors can be selected.Additionally,a recursive security estimator scheme is created since attackers randomly inject malicious signals into the selected data.On this basis,sufficient conditions for a fault estimator with less conservatism are presented which ensure an upper bound of the estimation error covariance and the mean-square exponential boundedness of the estimating error.Finally,a numerical example is used to show the reliability and effectiveness of the considered distributed estimation algorithm. 展开更多
关键词 Actuator fault deception attacks distributed estimation sensor saturation stochastic communication protocol(SCP).
下载PDF
Neural-Network-Based Control for Discrete-Time Nonlinear Systems with Input Saturation Under Stochastic Communication Protocol 被引量:10
3
作者 Xueli Wang Derui Ding +1 位作者 Hongli Dong Xian-Ming Zhang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第4期766-778,共13页
In this paper,an adaptive dynamic programming(ADP)strategy is investigated for discrete-time nonlinear systems with unknown nonlinear dynamics subject to input saturation.To save the communication resources between th... In this paper,an adaptive dynamic programming(ADP)strategy is investigated for discrete-time nonlinear systems with unknown nonlinear dynamics subject to input saturation.To save the communication resources between the controller and the actuators,stochastic communication protocols(SCPs)are adopted to schedule the control signal,and therefore the closed-loop system is essentially a protocol-induced switching system.A neural network(NN)-based identifier with a robust term is exploited for approximating the unknown nonlinear system,and a set of switch-based updating rules with an additional tunable parameter of NN weights are developed with the help of the gradient descent.By virtue of a novel Lyapunov function,a sufficient condition is proposed to achieve the stability of both system identification errors and the update dynamics of NN weights.Then,a value iterative ADP algorithm in an offline way is proposed to solve the optimal control of protocol-induced switching systems with saturation constraints,and the convergence is profoundly discussed in light of mathematical induction.Furthermore,an actor-critic NN scheme is developed to approximate the control law and the proposed performance index function in the framework of ADP,and the stability of the closed-loop system is analyzed in view of the Lyapunov theory.Finally,the numerical simulation results are presented to demonstrate the effectiveness of the proposed control scheme. 展开更多
关键词 Adaptive dynamic programming(ADP) constrained inputs neural network(NN) stochastic communication protocols(SCPs) suboptimal control
下载PDF
Variance-Constrained Filtering Fusion for Nonlinear Cyber-Physical Systems With the Denial-of-Service Attacks and Stochastic Communication Protocol 被引量:4
4
作者 Hang Geng Zidong Wang +2 位作者 Yun Chen Xiaojian Yi Yuhua Cheng 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第6期978-989,共12页
In this paper,a new filtering fusion problem is studied for nonlinear cyber-physical systems under errorvariance constraints and denial-of-service attacks.To prevent data collision and reduce communication cost,the st... In this paper,a new filtering fusion problem is studied for nonlinear cyber-physical systems under errorvariance constraints and denial-of-service attacks.To prevent data collision and reduce communication cost,the stochastic communication protocol is adopted in the sensor-to-filter channels to regulate the transmission order of sensors.Each sensor is allowed to enter the network according to the transmission priority decided by a set of independent and identicallydistributed random variables.From the defenders’view,the occurrence of the denial-of-service attack is governed by the randomly Bernoulli-distributed sequence.At the local filtering stage,a set of variance-constrained local filters are designed where the upper bounds(on the filtering error covariances)are first acquired and later minimized by appropriately designing filter parameters.At the fusion stage,all local estimates and error covariances are combined to develop a variance-constrained fusion estimator under the federated fusion rule.Furthermore,the performance of the fusion estimator is examined by studying the boundedness of the fused error covariance.A simulation example is finally presented to demonstrate the effectiveness of the proposed fusion estimator. 展开更多
关键词 Cyber-physical system(CPS) denial-of-service attack stochastic communication protocol(SCP) variance-constrained filtering fusion
下载PDF
Event-Based Anomaly Detection for Non-Public Industrial Communication Protocols in SDN-Based Control Systems 被引量:4
5
作者 Ming Wan Jiangyuan Yao +1 位作者 Yuan Jing Xi Jin 《Computers, Materials & Continua》 SCIE EI 2018年第6期447-463,共17页
As the main communication mediums in industrial control networks,industrial communication protocols are always vulnerable to extreme exploitations,and it is very difficult to take protective measures due to their seri... As the main communication mediums in industrial control networks,industrial communication protocols are always vulnerable to extreme exploitations,and it is very difficult to take protective measures due to their serious privacy.Based on the SDN(Software Defined Network)technology,this paper proposes a novel event-based anomaly detection approach to identify misbehaviors using non-public industrial communication protocols,and this approach can be installed in SDN switches as a security software appliance in SDN-based control systems.Furthermore,aiming at the unknown protocol specification and message format,this approach first restructures the industrial communication sessions and merges the payloads from industrial communication packets.After that,the feature selection and event sequence extraction can be carried out by using the N-gram model and K-means algorithm.Based on the obtained event sequences,this approach finally trains an event-based HMM(Hidden Markov Model)to identify aberrant industrial communication behaviors.Experimental results clearly show that the proposed approach has obvious advantages of classification accuracy and detection efficiency. 展开更多
关键词 Event sequence anomaly detection non-public industrial communication protocols SDN
下载PDF
A Computing Resource Adjustment Mechanism for Communication Protocol Processing in Centralized Radio Access Networks 被引量:3
6
作者 Guowei Zhai Lin Tian +2 位作者 Yiqing Zhou Qian Sun Jinglin Shi 《China Communications》 SCIE CSCD 2016年第12期79-89,共11页
The centralized radio access cellular network infrastructure based on centralized Super Base Station(CSBS) is a promising solution to reduce the high construction cost and energy consumption of conventional cellular n... The centralized radio access cellular network infrastructure based on centralized Super Base Station(CSBS) is a promising solution to reduce the high construction cost and energy consumption of conventional cellular networks. With CSBS, the computing resource for communication protocol processing could be managed flexibly according the protocol load to improve the resource efficiency. Since the protocol load changes frequently and may exceed the capacity of processors, load balancing is needed. However, existing load balancing mechanisms used in data centers cannot satisfy the real-time requirement of the communication protocol processing. Therefore, a new computing resource adjustment scheme is proposed for communication protocol processing in the CSBS architecture. First of all, the main principles of protocol processing resource adjustment is concluded, followed by the analysis on the processing resource outage probability that the computing resource becomes inadequate for protocol processing as load changes. Following the adjustment principles, the proposed scheme is designed to reduce the processing resource outage probability based onthe optimized connected graph which is constructed by the approximate Kruskal algorithm. Simulation re-sults show that compared with the conventional load balancing mechanisms, the proposed scheme can reduce the occurrence number of inadequate processing resource and the additional resource consumption of adjustment greatly. 展开更多
关键词 computing resource adjustment communication protocol processing cloud RAN super BS processing resource outage probability optimized connected graph
下载PDF
The Security Analysis of Two-Step Quantum Direct Communication Protocol in Collective-Rotation Noise Channel 被引量:2
7
作者 李剑 孙风琪 +3 位作者 潘泽世 聂金瑞 陈彦桦 袁开国 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第8期1-5,共5页
To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, a... To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, an excellent model of noise analysis is proposed. In the security analysis, the method of the entropy theory is introduced, and is compared with QDCP, an error rate point Qo(M : (Q0, 1.0)) is given. In different noise levels, if Eve wants to obtain the same amount of information, the error rate Q is distinguishable. The larger the noise level ~ is, the larger the error rate Q is. When the noise level ~ is lower than 11%, the high error rate is 0.153 without eavesdropping. Lastly, the security of the proposed protocol is discussed. It turns out that the quantum channel will be safe when Q 〈 0.153. Similarly, if error rate Q〉 0.153 = Q0, eavesdropping information I 〉 1, which means that there exist eavesdroppers in the quantum channel, and the quantum channel will not be safe anymore. 展开更多
关键词 The Security Analysis of Two-Step Quantum Direct communication protocol in Collective-Rotation Noise Channel EPR
下载PDF
A Recovery Algorithm for Self-Stabilizing Communication Protocols 被引量:1
8
作者 Li Layuan & Li Chunlin (Department of Computer Science & Technology, Wuhan nansportation University, 430063, P. R. China) 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2000年第1期38-46,共9页
This paper presents a recovery algorithm for self-stabilizing communication protocols. It first describes some concepts and a formal description method for the algorithm. Then it proposes the algorithm procedures, pro... This paper presents a recovery algorithm for self-stabilizing communication protocols. It first describes some concepts and a formal description method for the algorithm. Then it proposes the algorithm procedures, proves its correctness and analyses its complexity. Finally, it also verifies the availability and efficiency of the algorithm by illustrating an example protocol with multi-processes. 展开更多
关键词 Computer networks communication protocols Recovery algorithm SELF-STABILIZATION Multimedia communication networks.
下载PDF
Research on a Secure Communication Protocol Based on National Secret SM2 Algorithm 被引量:1
9
作者 Youhai Shao Yong Wang +1 位作者 Yun Yang Xiang Wang 《Journal of Computer and Communications》 2022年第1期42-56,共15页
Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic s... Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic sensitive information data field, there are threats such as preset backdoors and security vulnerabilities. In response to the above problems, the article introduces a secure communication protocol based on the optimized Secret SM2 algorithm, which uses socket programming to achieve two-way encrypted communication between clients and services, and is able to complete the security protection of data encryption transmission, authentication, data tampering, etc., and proves through experiments that the security protocol is more secure than traditional methods, can effectively identify each other, carry out stable and controllable data encryption transmission, and has good applicability. 展开更多
关键词 Secret Algorithm SM2 communication protocol Hybrid Encryption Security Protection
下载PDF
The Algorithms for Achieving Global States and Self-Stabilization for Communication Protocols
10
作者 Li Layuan & Li Chunlin(Department of Computer Science & Engineering. Wuhan Transportation University,430063,P . R. China) 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1999年第4期34-41,共8页
This paper discusses the algorithms for achieving global states and self-stabilizationfor communication protocols. It first describes a primary algorithm including its suitability forachieving global states and limita... This paper discusses the algorithms for achieving global states and self-stabilizationfor communication protocols. It first describes a primary algorithm including its suitability forachieving global states and limitation of self-stabilization for communication protocols, and thenpresents an improved algorithm that can be suitable to achieve global states and can be also usedto self-stabilizing communication protocols. Filially, it gives the proof of correctness and analysis ofcomplexity of the improved algorithm, and verifies its availability and efficiency by illustrating anexample protocol. 展开更多
关键词 communication protocols Algorithm for achieving global states Self-stabilization Computer networks Multimedia communication networks.
下载PDF
Study of Communication Protocol and Link Establishing Mode of Mine Managing Mobile Communication System of Minute Areas
11
作者 杨维 孙继平 苏又平 《International Journal of Mining Science and Technology》 2000年第2期79-82,共4页
This paper studies the communication protocol and link establishing mode of the mine managing mobile communication system consisted of minute areas. The communication protocol suitable for the system is proposed and d... This paper studies the communication protocol and link establishing mode of the mine managing mobile communication system consisted of minute areas. The communication protocol suitable for the system is proposed and designed. 展开更多
关键词 MINE mobile communication communication protocol LAYER LINK
下载PDF
ICPFuzzer:proprietary communication protocol fuzzing by using machine learning and feedback strategies 被引量:2
12
作者 Pei-Yi Lin Chia-Wei Tien +1 位作者 Ting-Chun Huang Chin-Wei Tien 《Cybersecurity》 EI CSCD 2021年第1期427-441,共15页
The fuzzing test is able to discover various vulnerabilities and has more chances to hit the zero-day targets.And ICS(Industrial control system)is currently facing huge security threats and requires security standards... The fuzzing test is able to discover various vulnerabilities and has more chances to hit the zero-day targets.And ICS(Industrial control system)is currently facing huge security threats and requires security standards,like ISO 62443,to ensure the quality of the device.However,some industrial proprietary communication protocols can be customized and have complicated structures,the fuzzing system cannot quickly generate test data that adapt to various protocols.It also struggles to define the mutation field without having prior knowledge of the protocols.Therefore,we propose a fuzzing system named ICPFuzzer that uses LSTM(Long short-term memory)to learn the features of a protocol and generates mutated test data automatically.We also use the responses of testing and adjust the weight strategies to further test the device under testing(DUT)to find more data that cause unusual connection status.We verified the effectiveness of the approach by comparing with the open-source and commercial fuzzers.Furthermore,in a real case,we experimented with the DLMS/COSEM for a smart meter and found that the test data can cause a unusual response.In summary,ICPFuzzer is a black-box fuzzing system that can automatically execute the testing process and reveal vulnerabilities that interrupt and crash industrial control communication.Not only improves the quality of ICS but also improves safety. 展开更多
关键词 Industrial communication protocol Network protocol fuzzing Long short-term memory(LSTM) Industrial control system(ICS)
原文传递
Studies on Algorithms for Self-StabilizingCommunication Protocols
13
作者 李腊元 李春林 《Journal of Computer Science & Technology》 SCIE EI CSCD 1999年第6期606-613,共8页
in this paper the algorithms for self-stabilizing communication protocols are studied. First some concepts and a formal method for describing theproposed algorithms are described, then an improved algorithm for achiev... in this paper the algorithms for self-stabilizing communication protocols are studied. First some concepts and a formal method for describing theproposed algorithms are described, then an improved algorithm for achieving globalstates is presented. The study shows that the improved algorithm can be appliedto obtain the global states in the case of a loss of cooperation of the different processes in the protocol, which can be used as a recovery point that will be used bythe following recovery procedure. Thus, the improved algorithm can be used toself-stabilize a communication protocol. Meanwhile, a recovery algorithm for selfstabilizing communication protocols is presented. After a failure is detected, allProcesses can eventually know the error. The recovery algorithm uses the contextualinformation exchanged during the progress of the protocol and recorded on the stablememory. The proof of correctness and analysis of complexity for these algorithmshave been made. The availability and efficiency of the algorithms have been verifiedby illustrating the example protocols. Finally, some conclusions and remarks aregiven. 展开更多
关键词 communication protocol SELF-STABILIZATION global state recoveryalgorithm multimedia communication
原文传递
A Hybrid Formal Description Method Based on FSM,CSP and ADT for Communication Protocol
14
作者 Li Layman(Wuhan Transportation Universityl 430063, P. R. China) 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1998年第3期29-38,共10页
Since communication protocol deals with complex issues related to distribution such as communication, concurrency and synchronization, their development needs to be traced by using sophisticated formal description met... Since communication protocol deals with complex issues related to distribution such as communication, concurrency and synchronization, their development needs to be traced by using sophisticated formal description methods. This paper presents a new hybrid formal method for communication protocol specification. In this method, finite state machine (FSM), communication sequential process (CSP) and abstract data type (ADT) are mixed and the best features of these approaches are offered. In this paper, the main formal description techniques (FDT) for protocol engineering are brieny introduced and a hybrid formal description method based on the FSM, CSP and ADT for communication protocol is described. Finally, this paper presents the formal specification of an example protocol for LAN by using the proposed hybrid formal method. The results of studies show that the hybrid formal description method for communication protocol is an available and effective approach. 展开更多
关键词 communication protocol Formal description techniques protocol engineering Hybrid formal method
下载PDF
System Performance of Wireless Sensor Network Using LoRa–Zigbee Hybrid Communication 被引量:4
15
作者 Van-Truong Truong Anand Nayyar Showkat Ahmad Lone 《Computers, Materials & Continua》 SCIE EI 2021年第8期1615-1635,共21页
Wireless sensor network(WSN)is considered as the fastest growing technology pattern in recent years because of its applicability in varied domains.Many sensor nodes with different sensing functionalities are deployed ... Wireless sensor network(WSN)is considered as the fastest growing technology pattern in recent years because of its applicability in varied domains.Many sensor nodes with different sensing functionalities are deployed in the monitoring area to collect suitable data and transmit it to the gateway.Ensuring communications in heterogeneous WSNs,is a critical issue that needs to be studied.In this research paper,we study the system performance of a heterogeneous WSN using LoRa–Zigbee hybrid communication.Specifically,two Zigbee sensor clusters and two LoRa sensor clusters are used and combined with two Zigbee-to-LoRa converters to communicate in a network managed by a LoRa gateway.The overall system integrates many different sensors in terms of types,communication protocols,and accuracy,which can be used in many applications in realistic environments such as on land,under water,or in the air.In addition to this,a synchronous management software on ThingSpeak Web server and Blynk app is designed.In the proposed system,the token ring protocol in Zigbee network and polling mechanism in LoRa network is used.The system can operate with a packet loss rate of less than 0.5%when the communication range of the Zigbee network is 630 m,and the communication range of the LoRa network is 3.7 km.On the basis of the digital results collected on the management software,this study proves tremendous improvements in the system performance. 展开更多
关键词 Wireless sensor network ZIGBEE LoRa communication protocol CONVERTER packet loss
下载PDF
MULTIPLE ELECTRONIC CONTROL UNITS CALIBRATION SYSTEM BASED ON EXPLICIT CALIBRATION PROTOCOL AND J1939 PROTOCOL 被引量:3
16
作者 ZHU Keqing XU Quankui YANG Lin ZHUO Bin 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2008年第1期42-46,共5页
The rising number of electronic control units (ECUs) in vehicles and the decreasing time to market have led to the need for advanced methods of calibration. A multi-ECU calibration system was developed based on the ... The rising number of electronic control units (ECUs) in vehicles and the decreasing time to market have led to the need for advanced methods of calibration. A multi-ECU calibration system was developed based on the explicit calibration protocol (XCP) and J1939 communication protocol to satisfy the need of calibrating multiple ECUs simultaneously. The messages in the controller area network (CAN) are defined in the J1939 protocol. Each CAN node can get its own calibration messages and information from other ECUs, and block other messages by qualifying the CAN messages with priority, source or destination address. The data field of the calibration message is designed with the XCP, with CAN acting as the transport layer. The calibration sessions are setup with the event-triggered XCP driver in the master node and the responding XCP driver in the slave nodes. Mirroring calibration variables from ROM to RAM enables the user to calibrate ECUs online. The application example shows that the multi-ECU calibration system can calibrate multiple ECUs simultaneously, and the main program can also accomplish its calculation and send commands to the actuators in time. By the multi-ECU calibration system, the calibration effort and time can be reduced and the variables in ECU can get a better match with the variables of other ECUs. 展开更多
关键词 Electronic control unit (ECU) Calibration Explicit calibration protocol (XCP) J1939 communication protocol Controlled area network (CAN)
下载PDF
Exploration of IoT Nodes Communication Using LoRaWAN in Forest Environment 被引量:1
17
作者 Anshul Sharma Divneet Singh Kapoor +3 位作者 Anand Nayyar Basit Qureshi Kiran Jot Singh Khushal Thakur 《Computers, Materials & Continua》 SCIE EI 2022年第6期6239-6256,共18页
The simultaneous advances in the Internet of Things(IoT),Artificial intelligence(AI)and Robotics is going to revolutionize our world in the near future.In recent years,LoRa(Long Range)wireless powered by LoRaWAN(LoRa ... The simultaneous advances in the Internet of Things(IoT),Artificial intelligence(AI)and Robotics is going to revolutionize our world in the near future.In recent years,LoRa(Long Range)wireless powered by LoRaWAN(LoRa Wide Area Network)protocol has attracted the attention of researchers for numerous applications in the IoT domain.LoRa is a low power,unlicensed Industrial,Scientific,and Medical(ISM)bandequipped wireless technology that utilizes a wide area network protocol,i.e.,LoRaWAN,to incorporate itself into the network infrastructure.In this paper,we have evaluated the LoRaWAN communication protocol for the implementation of the IoT(Internet of Things)nodes’communication in a forest scenario.The outdoor performance of LoRa wireless in LoRaWAN,i.e.,the physical layer,has been evaluated in the forest area of Kashirampur Uttarakhand,India.Hence,the present paper aims towards analyzing the performance level of the LoRaWAN technology by observing the changes in Signal to Noise Ratio(SNR),Packet Reception Ratio(PRR)and Received Signal Strength Indicator(RSSI),with respect to the distance between IoT nodes.The article focuses on estimating network lifetime for a specific set of LoRa configuration parameters,hardware selection and power constraints.From the experimental results,it has been observed that transmissions can propagate to a distance of 300 m in the forest environment,while consuming approx.63%less energy for spreading factor 7 at 2 dBm,without incurring significant packet loss with PRR greater than 80%. 展开更多
关键词 LoRa LoRaWAN IOT communication protocol wireless sensor networks packet reception ratio
下载PDF
Manufacturing Communication: DCOM-MMS-based Approach for Flexible Manufacturing System
18
作者 周炳海 余传猛 曹永上 《Journal of Donghua University(English Edition)》 EI CAS 2005年第4期36-40,共5页
A design approach of manufacturing communication is presented for flexible manufacturing system in this paper. The primary objective aims at making the flexible manufacturing control system provided with interoperabil... A design approach of manufacturing communication is presented for flexible manufacturing system in this paper. The primary objective aims at making the flexible manufacturing control system provided with interoperability and reconfigurability. Based on describing manufacturing message specification (MMS) and distributed component object model (DCOM), a client/server manufacturing communication model is built with MMS standard and DCOM middleware, and the communication interfaces between MMS client and MMS server are designed with Microsoft interface definition language (MIDL) and abstract syntax notation one (ASN.1) of MMS services. As a result, DCOM and MMS integration leads to such client/ server communication capabilities independent of different operating systems and manufacturing devices in flexible manufacturing automation environment. Finally, to verify the new design approach, a prototype system of robot control system has been implemented in MS 2000 Server/Professional Operating System and VC++ 6.0 Developer Environments. 展开更多
关键词 Flexible manufacturing system manufacturing message specification distributed object communication protocol control system.
下载PDF
An Investigation of Formal Techniques of Protocol Based on CFSM
19
作者 Li LayuanWuhan Jiaotong University, 430063, P. R. China) 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1997年第2期66-72,共7页
This paper investigates formal techniques of protocol based on communicating finite state machines (CFSM). Taking the protocols POLLEND (PE) and ACKNACK (AN) as the examples, the paper discusses the formal description... This paper investigates formal techniques of protocol based on communicating finite state machines (CFSM). Taking the protocols POLLEND (PE) and ACKNACK (AN) as the examples, the paper discusses the formal description, validation and conversion of protocol with the CFSM, presents a protocol validation method and a protocol conversion algorithm based on the CFSM and demonstrates the applicability of the method and the algorithm using the example protocols PE and AN. 展开更多
关键词 CFSM communication protocol Formal techniques.
下载PDF
Deep space multi-file delivery protocol based on LT codes 被引量:1
20
作者 Ruyan Wang Hua Liang +1 位作者 Hui Zhao Gaofeng Fang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第3期524-530,共7页
A deep space multi-file delivery protocol(DSMDP) based on LT codes is proposed to reduce the influence of long delay and a high bit error rate(BER) in deep space communication. The protocol increases sending redun... A deep space multi-file delivery protocol(DSMDP) based on LT codes is proposed to reduce the influence of long delay and a high bit error rate(BER) in deep space communication. The protocol increases sending redundancy by LT codes to improve the success rate of file delivery, and adopts different protective strategies for different situations of packet loss. At the same time, the multi-file united delivery strategy is adopted to make full use of the retransmission time to reduce the end-toend transmission delay. Furthermore, the protocol determines the quantity of encoded packets according to the feedback for controlling redundancy. The simulation results show that the proposed protocol can significantly reduce the transmission delay of files, which would be effectively suitable for deep space communication environment of high BER and long delay. 展开更多
关键词 deep space communication multi-file delivery protocol LT codes delay
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部