The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure ...The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes.展开更多
This article outlines the development of downhole monitoring and data transmission technology for separated zone water injection in China.According to the development stages,the principles,operation processes,adaptabi...This article outlines the development of downhole monitoring and data transmission technology for separated zone water injection in China.According to the development stages,the principles,operation processes,adaptability and application status of traditional downhole data acquisition method,cable communications and testing technology,cable-controlled downhole parameter real-time monitoring communication method and downhole wireless communication technology are introduced in detail.Problems and challenges of existing technologies in downhole monitoring and data transmission technology are pointed out.According to the production requirement,the future development direction of the downhole monitoring and data transmission technology for separated zone water injection is proposed.For the large number of wells adopting cable measuring and adjustment technology,the key is to realize the digitalization of downhole plug.For the key monitoring wells,cable-controlled communication technology needs to be improved,and downhole monitoring and data transmission technology based on composite coiled tubing needs to be developed to make the operation more convenient and reliable.For large-scale application in oil fields,downhole wireless communication technology should be developed to realize automation of measurement and adjustment.In line with ground mobile communication network,a digital communication network covering the control center,water distribution station and oil reservoir should be built quickly to provide technical support for the digitization of reservoir development.展开更多
Many Internet of things application scenarios have the characteristics of limited hardware resources and limited energy supply,which are not suitable for traditional security technology.The security technology based o...Many Internet of things application scenarios have the characteristics of limited hardware resources and limited energy supply,which are not suitable for traditional security technology.The security technology based on the physicalmechanism has attracted extensive attention.How to improve the key generation rate has always been one of the urgent problems to be solved in the security technology based on the physical mechanism.In this paper,superlattice technology is introduced to the security field of Internet of things,and a high-speed symmetric key generation scheme based on superlattice for Internet of things is proposed.In order to ensure the efficiency and privacy of data transmission,we also combine the superlattice symmetric key and compressive sensing technology to build a lightweight data transmission scheme that supports data compression and data encryption at the same time.Theoretical analysis and experimental evaluation results show that the proposed scheme is superior to the most closely related work.展开更多
In the inductively coupled data transmission system of the mooring buoy, the carrier signal frequency of the transmission channel is limited due to the inherent characteristics of the system, resulting in limited chan...In the inductively coupled data transmission system of the mooring buoy, the carrier signal frequency of the transmission channel is limited due to the inherent characteristics of the system, resulting in limited channel bandwidth. The limited channel bandwidth limits the increase in inductively coupled data transmission rate.In order to improve the inductively coupled data transmission rate of mooring buoy as much as possible without damaging the data transmission performance, a new method was proposed in this paper. The method is proposed to improve the data transmission rate by selecting the appropriate carrier signal frequencies based on the principle of maximizing the amplitude value of amplitude-frequency characteristic curve of the system. Research has been done according to this method as follows. Firstly, according to the inductively coupled transmission mooring buoy structure, the inductively coupled data transmission circuit model was established. The binary frequency shift keying(2FSK) digital signal modulation mode was selected. Through theoretical analysis, the relation between the carrier signal frequency and the data transmission performance, the relation between the carrier signal frequency and the 2FSK signal bandwidth were obtained. Secondly, the performance and the bandwidth of the signal transmission were studied for the inherent characteristics of the actual inductively coupled data transmission system. The amplitude-frequency characteristic of the system was analyzed by experiments. By selecting the appropriate carrier signal frequency parameters, an excellent data transmission performance was guaranteed and a large 2FSK signal bandwidth was obtained. Finally, an inductively coupled data transmission rate optimization experiment and a bit error rate analysis experiment were designed and carried out. The results show that the high-speed and reliable data transmission of the system was realized and the rate can reach 100 kbps.展开更多
The industrial Internet of Things(IoT)is a trend of factory development and a basic condition of intelligent factory.It is very important to ensure the security of data transmission in industrial IoT.Applying a new ch...The industrial Internet of Things(IoT)is a trend of factory development and a basic condition of intelligent factory.It is very important to ensure the security of data transmission in industrial IoT.Applying a new chaotic secure communication scheme to address the security problem of data transmission is the main contribution of this paper.The scheme is proposed and studied based on the synchronization of different-structure fractional-order chaotic systems with different order.The Lyapunov stability theory is used to prove the synchronization between the fractional-order drive system and the response system.The encryption and decryption process of the main data signals is implemented by using the n-shift encryption principle.We calculate and analyze the key space of the scheme.Numerical simulations are introduced to show the effectiveness of theoretical approach we proposed.展开更多
Tactical Data Link(TDL)is a communication system that utilizes a particular message format and a protocol to transmit data via wireless channels in an instant,automatic,and secure way.So far,TDL has shown its excellen...Tactical Data Link(TDL)is a communication system that utilizes a particular message format and a protocol to transmit data via wireless channels in an instant,automatic,and secure way.So far,TDL has shown its excellence in military applications.Current TDL adopts a distributed architecture to enhance anti-destruction capacity.However,It still faces a problem of data inconsistency and thus cannot well support cooperation across multiple militarily domains.To tackle this problem,we propose to leverage blockchain to build an automatic and adaptive data transmission control scheme for TDL.It achieves automatic data transmission and realizes information consistency among different TDL entities.Besides,applying smart contracts based on blockchain further enables adjusting data transmission policies automatically.Security analysis and experimental results based on simulations illustrate the effectiveness and efficiency of our proposed scheme.展开更多
Since web based GIS processes large size spatial geographic information on internet, we should try to improve the efficiency of spatial data query processing and transmission. This paper presents two efficient metho...Since web based GIS processes large size spatial geographic information on internet, we should try to improve the efficiency of spatial data query processing and transmission. This paper presents two efficient methods for this purpose: division transmission and progressive transmission methods. In division transmission method, a map can be divided into several parts, called “tiles”, and only tiles can be transmitted at the request of a client. In progressive transmission method, a map can be split into several phase views based on the significance of vertices, and a server produces a target object and then transmits it progressively when this spatial object is requested from a client. In order to achieve these methods, the algorithms, “tile division”, “priority order estimation” and the strategies for data transmission are proposed in this paper, respectively. Compared with such traditional methods as “map total transmission” and “layer transmission”, the web based GIS data transmission, proposed in this paper, is advantageous in the increase of the data transmission efficiency by a great margin.展开更多
To detect the deformation of the tunnel structure based on image sensor networks is the advanced study and application of spatial sensor technology. For the vertical settlement of metro tunnel caused by internal and e...To detect the deformation of the tunnel structure based on image sensor networks is the advanced study and application of spatial sensor technology. For the vertical settlement of metro tunnel caused by internal and external stress after its long period operation, the overall scheme and measuring principle of tunnel deformation detection system is in- troduced. The image data acquisition and processing of detection target are achieved by the cooperative work of image sensor, ARM embedded system. RS485 communication achieves the data transmission between ARM memory and host computer. The database system in station platform analyses the detection data and obtains the deformation state of tunnel inner wall, which makes it possible to early-warn the tunnel deformation and take preventive measures in time.展开更多
Adaptive packet scheduling can efficiently enhance the performance of multipath Data Transmission.However,realizing precise packet scheduling is challenging due to the nature of high dynamics and unpredictability of n...Adaptive packet scheduling can efficiently enhance the performance of multipath Data Transmission.However,realizing precise packet scheduling is challenging due to the nature of high dynamics and unpredictability of network link states.To this end,this paper proposes a distributed asynchronous deep reinforcement learning framework to intensify the dynamics and prediction of adaptive packet scheduling.Our framework contains two parts:local asynchronous packet scheduling and distributed cooperative control center.In local asynchronous packet scheduling,an asynchronous prioritized replay double deep Q-learning packets scheduling algorithm is proposed for dynamic adaptive packet scheduling learning,which makes a combination of prioritized replay double deep Q-learning network(P-DDQN)to make the fitting analysis.In distributed cooperative control center,a distributed scheduling learning and neural fitting acceleration algorithm to adaptively update neural network parameters of P-DDQN for more precise packet scheduling.Experimental results show that our solution has a better performance than Random weight algorithm and Round-Robin algorithm in throughput and loss ratio.Further,our solution has 1.32 times and 1.54 times better than Random weight algorithm and Round-Robin algorithm on the stability of multipath data transmission,respectively.展开更多
Simultaneous dimming controlling and data transmission are usually required in a white LED based indoor visible light communication system.However,the diming controlling of LED normally interferes the data transmissio...Simultaneous dimming controlling and data transmission are usually required in a white LED based indoor visible light communication system.However,the diming controlling of LED normally interferes the data transmission due to the modulation nonlinearity of LED.In order to solve this problem,a scheme by separating the LEDs for the functions of dimming control and data transmission respectively is proposed in this paper.In the scheme,the LEDs used for dimming control function are driven by a dc amplified circuit,and the LEDs for data transmission are driven by a digital modulation circuit respectively.In this way,the modulation distortion to the data signal caused by the modulation nonlinearity can be avoided even if the dimming is at high level dc driven current.The proof-of-concept experiment of a 2.5Mbit/s visible light communication system demonstrates that the dimming controlling and data transmission can be realized simultaneously in a simple way,and the data transmission is not affected by the dimming controlling function.Compared to previous methods,the scheme in this paper is simpler and cost effective,and makes sense when high rate data is transmitted in a visible light communication system.展开更多
To evaluate and improve the real-time performance of Ethernet for plant automation(EPA) industrial Ethernet,the real-time performance of EPA periodic data transmission was theoretically and experimentally studied.By...To evaluate and improve the real-time performance of Ethernet for plant automation(EPA) industrial Ethernet,the real-time performance of EPA periodic data transmission was theoretically and experimentally studied.By analyzing information transmission regularity and EPA deterministic scheduling mechanism,periodic messages were categorized as different modes according to their entering-queue time.The scheduling characteristics and delivery time of each mode and their interacting relations were studied,during which the models of real-time performance of periodic information transmission in EPA system were established.On this basis,an experimental platform is developed to test the delivery time of periodic messages transmission in EPA system.According to the analysis and the experiment,the main factors that limit the real-time performance of EPA periodic data transmission and the improvement methods were proposed.展开更多
Wireless Mesh Network (WMN) is a new-type wireless network. Its core idea is that any of its wireless equipment can act as both an Access Point (AP) and a router. Each node in the network can send and receive signals ...Wireless Mesh Network (WMN) is a new-type wireless network. Its core idea is that any of its wireless equipment can act as both an Access Point (AP) and a router. Each node in the network can send and receive signals as well as directly communicate with one or several peer nodes. One important issue to be considered in wireless Mesh networks is how to secure reliable data transmission in multi-hop links. To solve the problem, the 3GPP system architecture proposes two functionalities: ARQ and HARQ. This paper presents two HARQ schemes, namely hop-by-hop and edge-to-edge, and three ARQ schemes: hop-by-hop, edge-to-edge, and last-hop. Moreover, it proposes three solutions for WMNs from the perspective of protocol stock design: layered cooperative mechanism, relay ARQ mechanism and multi-hop mechanism.展开更多
This paper describes a data transmission method using a cyclic redundancy check and inaudible frequencies.The proposed method uses inaudible high frequencies from 18 k Hz to 22 k Hz generated via the inner speaker of ...This paper describes a data transmission method using a cyclic redundancy check and inaudible frequencies.The proposed method uses inaudible high frequencies from 18 k Hz to 22 k Hz generated via the inner speaker of smart devices.Using the proposed method,the performance is evaluated by conducting data transmission tests between a smart book and smart phone.The test results confirm that the proposed method can send 32 bits of data in an average of 235 ms,the transmission success rate reaches 99.47%,and the error detection rate of the cyclic redundancy check is0.53%.展开更多
Telecom sectors generally operate at negative voltages to reduce the effect of corrosion caused in the metallic wire due to electrochemical reaction while communicating signals. To feed those lines and to have an effe...Telecom sectors generally operate at negative voltages to reduce the effect of corrosion caused in the metallic wire due to electrochemical reaction while communicating signals. To feed those lines and to have an effective digital data transmission, a power electronic converter referred as Modified Negative Luo Converter (MNLC) is proposed in this paper. MNLC is a high gain converter in which the output voltage increases in geometric progression. This paper portrays a novel concept of a 50 Hz pulse data transmission through RLCG (Resistance-inductance-capacitance with a shunt conductance) transmission line using MNLC. Signal frequency of 50 Hz to be transmitted is anded with a high frequency pulse that charges and discharges MNLC and produces the boosted negative output voltage. The boosted output is again transmitted through the RLCG transmission line from which 50 Hz data pulse is retrieved at the output of the transmission line by comparing with a comparator signal. This sort of MNLC aided data transmission not only introduces less loss in its transmitted data but also overcomes various health hazards of conventional radio frequency (RF) communication. This technique also proves that any data bit stream can be transmitted and retrieved using the proposed high gain DC-DC converter. The simulation model of the proposed system is implemented in MATLAB for various switching frequencies with its prototype of the converter developed and the results are verified.展开更多
In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the keymatrix, a double guard Hill cipher was proposed with two key matrices...In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the keymatrix, a double guard Hill cipher was proposed with two key matrices, a private key matrix and its modified key matrix along with permutation. In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the key matrix, a double guard Hill cipher was proposed with two key matrices, a private key matrix and its modified key matrix along with permutation. In this paper a novel modification is performed to the double guard Hill cipher in order to reduce the number of calculation to obtain the cipher text by using non-square matrices. This modified double guard Hill cipher uses a non-square matrix of order (p × q) as its private keymatrix.展开更多
With the widespread use of network infrastructures such as 5G and low-power wide-area networks,a large number of the Internet of Things(IoT)device nodes are connected to the network,generating massive amounts of data....With the widespread use of network infrastructures such as 5G and low-power wide-area networks,a large number of the Internet of Things(IoT)device nodes are connected to the network,generating massive amounts of data.Therefore,it is a great challenge to achieve anonymous authentication of IoT nodes and secure data transmission.At present,blockchain technology is widely used in authentication and s data storage due to its decentralization and immutability.Recently,Fan et al.proposed a secure and efficient blockchain-based IoT authentication and data sharing scheme.We studied it as one of the state-of-the-art protocols and found that this scheme does not consider the resistance to ephemeral secret compromise attacks and the anonymity of IoT nodes.To overcome these security flaws,this paper proposes an enhanced authentication and data transmission scheme,which is verified by formal security proofs and informal security analysis.Furthermore,Scyther is applied to prove the security of the proposed scheme.Moreover,it is demonstrated that the proposed scheme achieves better performance in terms of communication and computational cost compared to other related schemes.展开更多
Large-scale wireless sensor networks(WSNs)play a critical role in monitoring dangerous scenarios and responding to medical emergencies.However,the inherent instability and error-prone nature of wireless links present ...Large-scale wireless sensor networks(WSNs)play a critical role in monitoring dangerous scenarios and responding to medical emergencies.However,the inherent instability and error-prone nature of wireless links present significant challenges,necessitating efficient data collection and reliable transmission services.This paper addresses the limitations of existing data transmission and recovery protocols by proposing a systematic end-to-end design tailored for medical event-driven cluster-based large-scale WSNs.The primary goal is to enhance the reliability of data collection and transmission services,ensuring a comprehensive and practical approach.Our approach focuses on refining the hop-count-based routing scheme to achieve fairness in forwarding reliability.Additionally,it emphasizes reliable data collection within clusters and establishes robust data transmission over multiple hops.These systematic improvements are designed to optimize the overall performance of the WSN in real-world scenarios.Simulation results of the proposed protocol validate its exceptional performance compared to other prominent data transmission schemes.The evaluation spans varying sensor densities,wireless channel conditions,and packet transmission rates,showcasing the protocol’s superiority in ensuring reliable and efficient data transfer.Our systematic end-to-end design successfully addresses the challenges posed by the instability of wireless links in large-scaleWSNs.By prioritizing fairness,reliability,and efficiency,the proposed protocol demonstrates its efficacy in enhancing data collection and transmission services,thereby offering a valuable contribution to the field of medical event-drivenWSNs.展开更多
The Secondary Air System(SAS)plays an important role in the safe operation and performance of aeroengines.The traditional 1D-3D coupling method loses information when used for secondary air systems,which affects the c...The Secondary Air System(SAS)plays an important role in the safe operation and performance of aeroengines.The traditional 1D-3D coupling method loses information when used for secondary air systems,which affects the calculation accuracy.In this paper,a Cross-dimensional Data Transmission method(CDT)from 3D to 1D is proposed by introducing flow field uniformity into the data transmission.First,a uniformity index was established to quantify the flow field parameter distribution characteristics,and a uniformity index prediction model based on the locally weighted regression method(Lowess)was established to quickly obtain the flow field information.Then,an information selection criterion in 3D to 1D data transmission was established based on the Spearman rank correlation coefficient between the uniformity index and the accuracy of coupling calculation,and the calculation method was automatically determined according to the established criterion.Finally,a modified function was obtained by fitting the ratio of the 3D mass-average parameters to the analytical solution,which are then used to modify the selected parameters at the 1D-3D interface.Taking a typical disk cavity air system as an example,the results show that the calculation accuracy of the CDT method is greatly improved by a relative 53.88%compared with the traditional 1D-3D coupling method.Furthermore,the CDT method achieves a speedup of 2 to 3 orders of magnitude compared to the 3D calculation.展开更多
As for unmanned aircraft, the knowledge of the aircraft performance is directly related with the navigation, guidance, and control system programming. Therefore, the measured data in each phase of the flight must be s...As for unmanned aircraft, the knowledge of the aircraft performance is directly related with the navigation, guidance, and control system programming. Therefore, the measured data in each phase of the flight must be sufficiently precise to obtain a good characterization of aircraft.This article proposes new methods of sending information to ground, which make it possible to know the aircraft behavior accurately, and for this purpose, four contributions have been made for ALO(Avión Ligero de Observación, Spanish acronym for Light Observation Aircraft). Currently, the characterization is based on data obtained at ten samples per second, insufficient to acquire detailed knowledge of what happened during the whole flight of an aircraft. As a result of these contributions, many more samples per second of accelerations and angular velocities are obtained at the most critical moments of the flight, such as takeoff or landing. Among the improvements included are data compression techniques, providing references to locate the measured data in time and identifying labels of each parameter.展开更多
This paper considers a time-constrained data collection problem from a network of ground sensors located on uneven terrain by an Unmanned Aerial Vehicle(UAV),a typical Unmanned Aerial System(UAS).The ground sensors ha...This paper considers a time-constrained data collection problem from a network of ground sensors located on uneven terrain by an Unmanned Aerial Vehicle(UAV),a typical Unmanned Aerial System(UAS).The ground sensors harvest renewable energy and are equipped with batteries and data buffers.The ground sensor model takes into account sensor data buffer and battery limitations.An asymptotically globally optimal method of joint UAV 3D trajectory optimization and data transmission schedule is developed.The developed method maximizes the amount of data transmitted to the UAV without losses and too long delays and minimizes the propulsion energy of the UAV.The developed algorithm of optimal trajectory optimization and transmission scheduling is based on dynamic programming.Computer simulations demonstrate the effectiveness of the proposed algorithm.展开更多
基金support of the Interdisciplinary Research Center for Intelligent Secure Systems(IRC-ISS)Internal Fund Grant#INSS2202.
文摘The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes.
基金Supported by the National Natural Science Foundation Science Center Project/Basic Science Center Project(72088101)PetroChina Scientific Research and Technology Development Project(2020B-4119,2021ZG12).
文摘This article outlines the development of downhole monitoring and data transmission technology for separated zone water injection in China.According to the development stages,the principles,operation processes,adaptability and application status of traditional downhole data acquisition method,cable communications and testing technology,cable-controlled downhole parameter real-time monitoring communication method and downhole wireless communication technology are introduced in detail.Problems and challenges of existing technologies in downhole monitoring and data transmission technology are pointed out.According to the production requirement,the future development direction of the downhole monitoring and data transmission technology for separated zone water injection is proposed.For the large number of wells adopting cable measuring and adjustment technology,the key is to realize the digitalization of downhole plug.For the key monitoring wells,cable-controlled communication technology needs to be improved,and downhole monitoring and data transmission technology based on composite coiled tubing needs to be developed to make the operation more convenient and reliable.For large-scale application in oil fields,downhole wireless communication technology should be developed to realize automation of measurement and adjustment.In line with ground mobile communication network,a digital communication network covering the control center,water distribution station and oil reservoir should be built quickly to provide technical support for the digitization of reservoir development.
基金This work was supported by the Humanities and Social Science Youth Fund of Ministry of Education of China(19YJCZH254)the Innovation driven plan project of Hunan University of Technology and Business in 2020,the Scientific Research Fund of Hunan Provincial Education Department(19B315)this work was funded by the Researchers Supporting Project No.(RSP-2021/102)King Saud University,Riyadh,Saudi Arabia.
文摘Many Internet of things application scenarios have the characteristics of limited hardware resources and limited energy supply,which are not suitable for traditional security technology.The security technology based on the physicalmechanism has attracted extensive attention.How to improve the key generation rate has always been one of the urgent problems to be solved in the security technology based on the physical mechanism.In this paper,superlattice technology is introduced to the security field of Internet of things,and a high-speed symmetric key generation scheme based on superlattice for Internet of things is proposed.In order to ensure the efficiency and privacy of data transmission,we also combine the superlattice symmetric key and compressive sensing technology to build a lightweight data transmission scheme that supports data compression and data encryption at the same time.Theoretical analysis and experimental evaluation results show that the proposed scheme is superior to the most closely related work.
基金supported by the National Natural Science Foundation of China [Grant number 61733012]Qingdao Ocean Engineering and Technology Think Tank Joint Fund Project [Grant number 20190131-2]the Shandong Provincial Natural Science Fund Project [Grant number ZR2017MEE072]。
文摘In the inductively coupled data transmission system of the mooring buoy, the carrier signal frequency of the transmission channel is limited due to the inherent characteristics of the system, resulting in limited channel bandwidth. The limited channel bandwidth limits the increase in inductively coupled data transmission rate.In order to improve the inductively coupled data transmission rate of mooring buoy as much as possible without damaging the data transmission performance, a new method was proposed in this paper. The method is proposed to improve the data transmission rate by selecting the appropriate carrier signal frequencies based on the principle of maximizing the amplitude value of amplitude-frequency characteristic curve of the system. Research has been done according to this method as follows. Firstly, according to the inductively coupled transmission mooring buoy structure, the inductively coupled data transmission circuit model was established. The binary frequency shift keying(2FSK) digital signal modulation mode was selected. Through theoretical analysis, the relation between the carrier signal frequency and the data transmission performance, the relation between the carrier signal frequency and the 2FSK signal bandwidth were obtained. Secondly, the performance and the bandwidth of the signal transmission were studied for the inherent characteristics of the actual inductively coupled data transmission system. The amplitude-frequency characteristic of the system was analyzed by experiments. By selecting the appropriate carrier signal frequency parameters, an excellent data transmission performance was guaranteed and a large 2FSK signal bandwidth was obtained. Finally, an inductively coupled data transmission rate optimization experiment and a bit error rate analysis experiment were designed and carried out. The results show that the high-speed and reliable data transmission of the system was realized and the rate can reach 100 kbps.
基金supported in part by the National Science Foundation Project of China (61931001, 61873026)the National Key R&D Program of China (2017YFC0820700)
文摘The industrial Internet of Things(IoT)is a trend of factory development and a basic condition of intelligent factory.It is very important to ensure the security of data transmission in industrial IoT.Applying a new chaotic secure communication scheme to address the security problem of data transmission is the main contribution of this paper.The scheme is proposed and studied based on the synchronization of different-structure fractional-order chaotic systems with different order.The Lyapunov stability theory is used to prove the synchronization between the fractional-order drive system and the response system.The encryption and decryption process of the main data signals is implemented by using the n-shift encryption principle.We calculate and analyze the key space of the scheme.Numerical simulations are introduced to show the effectiveness of theoretical approach we proposed.
基金This work is sponsored by the open grant of the Tactical Data Link Lab of the 20th Research Institute of China Electronics Technology Group Corporation,P.R.China(Grant CLDL-20182119)the National Natural Science Foundation of China under Grants 61672410 and 61802293+2 种基金the Key Lab of Information Network Security,Ministry of Public Security(Grant C18614)the Academy of Finland(Grants 308087,314203,and 335262)the Shaanxi Innovation Team project under grant 2018TD-007,and the 111 project under grant B16037.
文摘Tactical Data Link(TDL)is a communication system that utilizes a particular message format and a protocol to transmit data via wireless channels in an instant,automatic,and secure way.So far,TDL has shown its excellence in military applications.Current TDL adopts a distributed architecture to enhance anti-destruction capacity.However,It still faces a problem of data inconsistency and thus cannot well support cooperation across multiple militarily domains.To tackle this problem,we propose to leverage blockchain to build an automatic and adaptive data transmission control scheme for TDL.It achieves automatic data transmission and realizes information consistency among different TDL entities.Besides,applying smart contracts based on blockchain further enables adjusting data transmission policies automatically.Security analysis and experimental results based on simulations illustrate the effectiveness and efficiency of our proposed scheme.
文摘Since web based GIS processes large size spatial geographic information on internet, we should try to improve the efficiency of spatial data query processing and transmission. This paper presents two efficient methods for this purpose: division transmission and progressive transmission methods. In division transmission method, a map can be divided into several parts, called “tiles”, and only tiles can be transmitted at the request of a client. In progressive transmission method, a map can be split into several phase views based on the significance of vertices, and a server produces a target object and then transmits it progressively when this spatial object is requested from a client. In order to achieve these methods, the algorithms, “tile division”, “priority order estimation” and the strategies for data transmission are proposed in this paper, respectively. Compared with such traditional methods as “map total transmission” and “layer transmission”, the web based GIS data transmission, proposed in this paper, is advantageous in the increase of the data transmission efficiency by a great margin.
基金Science and Technology Commission of Shanghai Municipality(No.08201202103)
文摘To detect the deformation of the tunnel structure based on image sensor networks is the advanced study and application of spatial sensor technology. For the vertical settlement of metro tunnel caused by internal and external stress after its long period operation, the overall scheme and measuring principle of tunnel deformation detection system is in- troduced. The image data acquisition and processing of detection target are achieved by the cooperative work of image sensor, ARM embedded system. RS485 communication achieves the data transmission between ARM memory and host computer. The database system in station platform analyses the detection data and obtains the deformation state of tunnel inner wall, which makes it possible to early-warn the tunnel deformation and take preventive measures in time.
基金the National Key Research and Development Program of China under Grant No.2018YFE0206800the National Natural Science Foundation of Beijing,China,under Grant No.4212010the National Natural Science Foundation of China,under Grant No.61971028。
文摘Adaptive packet scheduling can efficiently enhance the performance of multipath Data Transmission.However,realizing precise packet scheduling is challenging due to the nature of high dynamics and unpredictability of network link states.To this end,this paper proposes a distributed asynchronous deep reinforcement learning framework to intensify the dynamics and prediction of adaptive packet scheduling.Our framework contains two parts:local asynchronous packet scheduling and distributed cooperative control center.In local asynchronous packet scheduling,an asynchronous prioritized replay double deep Q-learning packets scheduling algorithm is proposed for dynamic adaptive packet scheduling learning,which makes a combination of prioritized replay double deep Q-learning network(P-DDQN)to make the fitting analysis.In distributed cooperative control center,a distributed scheduling learning and neural fitting acceleration algorithm to adaptively update neural network parameters of P-DDQN for more precise packet scheduling.Experimental results show that our solution has a better performance than Random weight algorithm and Round-Robin algorithm in throughput and loss ratio.Further,our solution has 1.32 times and 1.54 times better than Random weight algorithm and Round-Robin algorithm on the stability of multipath data transmission,respectively.
基金financially supported by National Natural Science Foundation of China(No.61475094)National 973 Program of China(No.2013CB329202)
文摘Simultaneous dimming controlling and data transmission are usually required in a white LED based indoor visible light communication system.However,the diming controlling of LED normally interferes the data transmission due to the modulation nonlinearity of LED.In order to solve this problem,a scheme by separating the LEDs for the functions of dimming control and data transmission respectively is proposed in this paper.In the scheme,the LEDs used for dimming control function are driven by a dc amplified circuit,and the LEDs for data transmission are driven by a digital modulation circuit respectively.In this way,the modulation distortion to the data signal caused by the modulation nonlinearity can be avoided even if the dimming is at high level dc driven current.The proof-of-concept experiment of a 2.5Mbit/s visible light communication system demonstrates that the dimming controlling and data transmission can be realized simultaneously in a simple way,and the data transmission is not affected by the dimming controlling function.Compared to previous methods,the scheme in this paper is simpler and cost effective,and makes sense when high rate data is transmitted in a visible light communication system.
基金Supported by the National High Technology Research and Development Program of China (2006AA040301-4,2007AA041301-6)
文摘To evaluate and improve the real-time performance of Ethernet for plant automation(EPA) industrial Ethernet,the real-time performance of EPA periodic data transmission was theoretically and experimentally studied.By analyzing information transmission regularity and EPA deterministic scheduling mechanism,periodic messages were categorized as different modes according to their entering-queue time.The scheduling characteristics and delivery time of each mode and their interacting relations were studied,during which the models of real-time performance of periodic information transmission in EPA system were established.On this basis,an experimental platform is developed to test the delivery time of periodic messages transmission in EPA system.According to the analysis and the experiment,the main factors that limit the real-time performance of EPA periodic data transmission and the improvement methods were proposed.
文摘Wireless Mesh Network (WMN) is a new-type wireless network. Its core idea is that any of its wireless equipment can act as both an Access Point (AP) and a router. Each node in the network can send and receive signals as well as directly communicate with one or several peer nodes. One important issue to be considered in wireless Mesh networks is how to secure reliable data transmission in multi-hop links. To solve the problem, the 3GPP system architecture proposes two functionalities: ARQ and HARQ. This paper presents two HARQ schemes, namely hop-by-hop and edge-to-edge, and three ARQ schemes: hop-by-hop, edge-to-edge, and last-hop. Moreover, it proposes three solutions for WMNs from the perspective of protocol stock design: layered cooperative mechanism, relay ARQ mechanism and multi-hop mechanism.
基金supported by Ministry of Educationunder Basic Science Research Program under Grant No.NRF-2013R1A1A2061478
文摘This paper describes a data transmission method using a cyclic redundancy check and inaudible frequencies.The proposed method uses inaudible high frequencies from 18 k Hz to 22 k Hz generated via the inner speaker of smart devices.Using the proposed method,the performance is evaluated by conducting data transmission tests between a smart book and smart phone.The test results confirm that the proposed method can send 32 bits of data in an average of 235 ms,the transmission success rate reaches 99.47%,and the error detection rate of the cyclic redundancy check is0.53%.
文摘Telecom sectors generally operate at negative voltages to reduce the effect of corrosion caused in the metallic wire due to electrochemical reaction while communicating signals. To feed those lines and to have an effective digital data transmission, a power electronic converter referred as Modified Negative Luo Converter (MNLC) is proposed in this paper. MNLC is a high gain converter in which the output voltage increases in geometric progression. This paper portrays a novel concept of a 50 Hz pulse data transmission through RLCG (Resistance-inductance-capacitance with a shunt conductance) transmission line using MNLC. Signal frequency of 50 Hz to be transmitted is anded with a high frequency pulse that charges and discharges MNLC and produces the boosted negative output voltage. The boosted output is again transmitted through the RLCG transmission line from which 50 Hz data pulse is retrieved at the output of the transmission line by comparing with a comparator signal. This sort of MNLC aided data transmission not only introduces less loss in its transmitted data but also overcomes various health hazards of conventional radio frequency (RF) communication. This technique also proves that any data bit stream can be transmitted and retrieved using the proposed high gain DC-DC converter. The simulation model of the proposed system is implemented in MATLAB for various switching frequencies with its prototype of the converter developed and the results are verified.
文摘In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the keymatrix, a double guard Hill cipher was proposed with two key matrices, a private key matrix and its modified key matrix along with permutation. In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the key matrix, a double guard Hill cipher was proposed with two key matrices, a private key matrix and its modified key matrix along with permutation. In this paper a novel modification is performed to the double guard Hill cipher in order to reduce the number of calculation to obtain the cipher text by using non-square matrices. This modified double guard Hill cipher uses a non-square matrix of order (p × q) as its private keymatrix.
基金supported by the National Natural Science Foundation of China(Grant Nos.61872449,U1804263,62172435,62172141,61772173)the Zhongyuan Science and Technology Innovation Leading Talent Project,China(No.214200510019)+2 种基金the Natural Science Foundation of Henan(No.222300420004)the Major Public Welfare Special Projects of Henan Province(No.201300210100)the Key Research and Development Project of Henan Province(No.221111321200).
文摘With the widespread use of network infrastructures such as 5G and low-power wide-area networks,a large number of the Internet of Things(IoT)device nodes are connected to the network,generating massive amounts of data.Therefore,it is a great challenge to achieve anonymous authentication of IoT nodes and secure data transmission.At present,blockchain technology is widely used in authentication and s data storage due to its decentralization and immutability.Recently,Fan et al.proposed a secure and efficient blockchain-based IoT authentication and data sharing scheme.We studied it as one of the state-of-the-art protocols and found that this scheme does not consider the resistance to ephemeral secret compromise attacks and the anonymity of IoT nodes.To overcome these security flaws,this paper proposes an enhanced authentication and data transmission scheme,which is verified by formal security proofs and informal security analysis.Furthermore,Scyther is applied to prove the security of the proposed scheme.Moreover,it is demonstrated that the proposed scheme achieves better performance in terms of communication and computational cost compared to other related schemes.
文摘Large-scale wireless sensor networks(WSNs)play a critical role in monitoring dangerous scenarios and responding to medical emergencies.However,the inherent instability and error-prone nature of wireless links present significant challenges,necessitating efficient data collection and reliable transmission services.This paper addresses the limitations of existing data transmission and recovery protocols by proposing a systematic end-to-end design tailored for medical event-driven cluster-based large-scale WSNs.The primary goal is to enhance the reliability of data collection and transmission services,ensuring a comprehensive and practical approach.Our approach focuses on refining the hop-count-based routing scheme to achieve fairness in forwarding reliability.Additionally,it emphasizes reliable data collection within clusters and establishes robust data transmission over multiple hops.These systematic improvements are designed to optimize the overall performance of the WSN in real-world scenarios.Simulation results of the proposed protocol validate its exceptional performance compared to other prominent data transmission schemes.The evaluation spans varying sensor densities,wireless channel conditions,and packet transmission rates,showcasing the protocol’s superiority in ensuring reliable and efficient data transfer.Our systematic end-to-end design successfully addresses the challenges posed by the instability of wireless links in large-scaleWSNs.By prioritizing fairness,reliability,and efficiency,the proposed protocol demonstrates its efficacy in enhancing data collection and transmission services,thereby offering a valuable contribution to the field of medical event-drivenWSNs.
基金supported by the National Science and Technology Major Project,China(No.2017-III-0010-0036).
文摘The Secondary Air System(SAS)plays an important role in the safe operation and performance of aeroengines.The traditional 1D-3D coupling method loses information when used for secondary air systems,which affects the calculation accuracy.In this paper,a Cross-dimensional Data Transmission method(CDT)from 3D to 1D is proposed by introducing flow field uniformity into the data transmission.First,a uniformity index was established to quantify the flow field parameter distribution characteristics,and a uniformity index prediction model based on the locally weighted regression method(Lowess)was established to quickly obtain the flow field information.Then,an information selection criterion in 3D to 1D data transmission was established based on the Spearman rank correlation coefficient between the uniformity index and the accuracy of coupling calculation,and the calculation method was automatically determined according to the established criterion.Finally,a modified function was obtained by fitting the ratio of the 3D mass-average parameters to the analytical solution,which are then used to modify the selected parameters at the 1D-3D interface.Taking a typical disk cavity air system as an example,the results show that the calculation accuracy of the CDT method is greatly improved by a relative 53.88%compared with the traditional 1D-3D coupling method.Furthermore,the CDT method achieves a speedup of 2 to 3 orders of magnitude compared to the 3D calculation.
文摘As for unmanned aircraft, the knowledge of the aircraft performance is directly related with the navigation, guidance, and control system programming. Therefore, the measured data in each phase of the flight must be sufficiently precise to obtain a good characterization of aircraft.This article proposes new methods of sending information to ground, which make it possible to know the aircraft behavior accurately, and for this purpose, four contributions have been made for ALO(Avión Ligero de Observación, Spanish acronym for Light Observation Aircraft). Currently, the characterization is based on data obtained at ten samples per second, insufficient to acquire detailed knowledge of what happened during the whole flight of an aircraft. As a result of these contributions, many more samples per second of accelerations and angular velocities are obtained at the most critical moments of the flight, such as takeoff or landing. Among the improvements included are data compression techniques, providing references to locate the measured data in time and identifying labels of each parameter.
基金funding from the Australian Government,via Grant No.AUSMURIB000001 associated with ONR MURI Grant No.N00014-19-1-2571。
文摘This paper considers a time-constrained data collection problem from a network of ground sensors located on uneven terrain by an Unmanned Aerial Vehicle(UAV),a typical Unmanned Aerial System(UAS).The ground sensors harvest renewable energy and are equipped with batteries and data buffers.The ground sensor model takes into account sensor data buffer and battery limitations.An asymptotically globally optimal method of joint UAV 3D trajectory optimization and data transmission schedule is developed.The developed method maximizes the amount of data transmitted to the UAV without losses and too long delays and minimizes the propulsion energy of the UAV.The developed algorithm of optimal trajectory optimization and transmission scheduling is based on dynamic programming.Computer simulations demonstrate the effectiveness of the proposed algorithm.