1,226 results on '"communication protocol"'
Search Results
2. Event-Triggered Control for Roesser Model-Based 2D Markov Jump Systems Under Stochastic Communication Protocol.
- Author
-
Zhang, Yu, Ji, Yuxiang, Jiang, Taiping, and Zhou, Jianping
- Subjects
- *
MARKOVIAN jump linear systems , *STOCHASTIC systems , *TELECOMMUNICATION systems , *CLOSED loop systems , *TWO-dimensional models , *LINEAR matrix inequalities - Abstract
This paper is concerned with the event-triggered control problem for Roesser model-based two-dimensional (2D) Markov jump systems with multiple communication channels. In order to optimize the utilization of communication resources, an event-triggered rule (ETR) is proposed based on the structural characteristics of the 2D Markov jump plant. In addition, a stochastic communication protocol (SCP) is utilized to schedule transmissions from the controller to the actuators. Under the ETR and the SCP, an asynchronous state-feedback control scheme is formulated, allowing for mode mismatches between the controller and the 2D plant. A sufficient condition on both stochastic stability and a predefined H ∞ disturbance-attenuation performance of the closed-loop 2D system is established. Building upon this condition and linear matrix inequalities, a computationally efficient method is developed for designing the required state-feedback controller gains. Finally, the feasibility and effectiveness of the proposed event-triggered control approach are demonstrated by the application of a simulation example involving the Darboux equation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. A rate-responsive duty-cycling protocol for leadless pacemaker synchronization.
- Author
-
Ryser, Adrian, Reichlin, Tobias, Burger, Jürgen, Niederhauser, Thomas, and Haeberlin, Andreas
- Abstract
Dual-chamber leadless pacemakers (LLPMs) consist of two implants, one in the right atrium and one in the right ventricle. Inter-device communication, required for atrioventricular (AV) synchrony, however, reduces the projected longevity of commercial dual-chamber LLPMs by 35–45%. This work analyzes the power-saving potential and the resulting impact on AV-synchrony for a novel LLPM synchronization protocol. Relevant parameters of the proposed window scheduling algorithm were optimized with system-level simulations investigating the resulting trade-off between transceiver current consumption and AV-synchrony. The parameter set included the algorithm's setpoint for the target number of windows per cardiac cycle and the number of averaging cycles used in the window update calculation. The sensing inputs for the LLPM model were derived from human electrocardiogram recordings in the MIT-BIH Arrhythmia Database. Transceiver current consumption was estimated by combining the simulation results on the required communication resources with electrical measurements of a receiver microchip developed for LLPM synchronization in previous work. The performance ratio given by AV-synchrony divided by current consumption was maximized for a target of one window per cardiac cycle and three averaging cycles. Median transceiver current of both LLPMs combined was 166 nA (interquartile range: 152–183 nA) and median AV-synchrony was 92.5%. This corresponded to median reduction of 18.3% and 3.2% in current consumption and AV-synchrony, respectively, compared to a non-rate-responsive implementation of the same protocol, which prioritized maximum AV-synchrony. In conclusion, adopting a rate-responsive communication protocol may significantly increase device longevity of dual-chamber LLPMs without compromising AV-synchrony, potentially reducing the frequency of device replacements. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Implementation of Smart Farm Systems Based on Fog Computing in Artificial Intelligence of Things Environments.
- Author
-
Hong, Sukjun, Park, Seongchan, Youn, Heejun, Lee, Jongyong, and Kwon, Soonchul
- Subjects
- *
CONVOLUTIONAL neural networks , *COMPUTER network traffic , *COFFEE plantations , *ARTIFICIAL intelligence , *WIRELESS mesh networks - Abstract
Cloud computing has recently gained widespread attention owing to its use in applications involving the Internet of Things (IoT). However, the transmission of massive volumes of data to a cloud server often results in overhead. Fog computing has emerged as a viable solution to address this issue. This study implements an Artificial Intelligence of Things (AIoT) system based on fog computing on a smart farm. Three experiments are conducted to evaluate the performance of the AIoT system. First, network traffic volumes between systems employing and not employing fog computing are compared. Second, the performance of the communication protocols—hypertext transport protocol (HTTP), message queuing telemetry transport protocol (MQTT), and constrained application protocol (CoAP)—commonly used in IoT applications is assessed. Finally, a convolutional neural network-based algorithm is introduced to determine the maturity level of coffee tree images. Experimental data are collected over ten days from a coffee tree farm in the Republic of Korea. Notably, the fog computing system demonstrates a 26% reduction in the cumulative data volume compared with a non-fog system. MQTT exhibits stable results in terms of the data volume and loss rate. Additionally, the maturity level determination algorithm performed on coffee fruits provides reliable results. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Development of an algorithm for integrated UAV groups using visible light communication technology.
- Author
-
Alibekkyzy, Karygash, Keribayeva, Talshyn, Koshekov, Kayrat, Baidildina, Aizhan, Bugubayeva, Alina, and Azamatova, Zhanerke
- Subjects
GROUP dynamics ,OPTICAL communications ,SOCIAL groups ,TELECOMMUNICATION ,DRONE aircraft - Abstract
Our research group dedicated its idea in developing and analyzing an algorithm for transforming integrated unmanned aerial vehicle (UAV) groups (IUGs) using visible light communication (VLC) technology. This innovative approach is designed to enhance UAV network coordination, addressing the complex challenges of communication within these networks. The primary issue addressed is the pressing need for advanced communication mechanisms within UAV networks to ensure efficient. This is a robust data transfer and complex coordination between UAVs. The existing systems lack the required adaptability and efficiency, leading to operational inefficiencies and reduced effectiveness in UAV applications. The main results of the study are concluded in the design and implementation of the conversion algorithm. Which provides efficient and reliable data transmission and sophisticated coordination between UAVs. Through careful mathematical modeling of UAV group dynamics and extensive MATLAB simulations, the study demonstrates the algorithm's ability to effectively control UAV formations. This method gives adaptability to different operational requirements and supports collision-free maneuvers. The algorithm's innovative design and the comprehensive approach adopted in the study, including the use of VLC technology and the integration of advanced restructuring methods, enable the effective resolution of the identified communication challenges within UAV networks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. COMMUNICATION MANAGEMENT FOR THE ACQUISITION OF DATA BETWEEN THE PC AND A DEVICE CALLED THE HYDROELECTRIC TURBINE DEPLOYED LINEARLY ON THE COURSE OF FLOWING WATER.
- Author
-
Țîțu, Aurel Mihail and Bogorin-Predescu, Adrian
- Subjects
- *
DATA transmission systems , *RENEWABLE energy sources , *DIGITAL technology , *ARTIFICIAL intelligence , *DEEP learning - Abstract
The present paper deals with the data communication between a computer and a hydroelectric renewable energy system called a Hydroelectric Turbine. The purpose of the communication is to obtain data from the turbine to diagnose how it is operating. In terms of physical data transport, the two points, which are composed of a computer and a turbine, communicate via radio frequency through two transceivers operating at the frequency of 433 MHz. One is on the turbine and the second is on an electronic system with a microcontroller. The microcontroller serves as an interface to transmit information from the computer's USB port to the turbine. The communication protocol is a request-response type, and the length of the data packet transmitted between the turbine and the computer is fixed. This paper outlines the internal communication processes from the software level of the microcontroller and the PC. These methods enable the PC and the turbine to establish half duplex connection for data acquisition. In the last section of the paper, the advantages, and results of using this type of communication are presented. [ABSTRACT FROM AUTHOR]
- Published
- 2024
7. 多卫星测控系统的设计与实现.
- Author
-
杨欢, 姬胜凯, 王硕, 张姗, and 李斌
- Abstract
Copyright of Cyber Security & Data Governance is the property of Editorial Office of Information Technology & Network Security and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
8. Development of a Software System for Controlling Dosing Machines †.
- Author
-
Spasova, Gergana, Karova, Milena, and Penev, Ivaylo
- Subjects
VENDING machines ,CREDIT cards ,CONSUMERS ,COMPUTER software development ,SYSTEMS software - Abstract
The liquid dosing system consists of machines and a computer (PC). The machines and the computer are connected to each other and communicate via the RS485 interface. The software installed on a computer (PC) consists of two separate modules (applications)—"server" and "operator". The server runs continuously and communicates to and from the machines. Through the operator module, the nomenclature of customers, liquids, and cards can be created and edited. The operator module makes it possible to perform various operations such as loading credit on a card, blocking and unblocking cards, editing customer or card data, and others. Various reports can be made, such as a report on the consumption of a given customer, a report on the use of the customer card, a report on the liquid consumed, etc. The goal of the system is to perform automated dosing of liquid at the customer's request, without the involvement of another person (operator). The choice of liquid, the amount, and the payment of the choice made is fully automatic. Payment is only by card, as in case of an attempt to make a dosage and insufficient availability for payment, the dosage is not carried out. The customer is informed of a small credit on the card. The connection between the machine and the operator display is based on a query from the display. The operator's job involves replacing empty bottles in the machine and monitoring and following up on system irregularities. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. User Service Times in Wireless Energy Networks
- Author
-
Lladó, Juan, Galmés, Sebastià, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, and Luo, Yuhua, editor
- Published
- 2024
- Full Text
- View/download PDF
10. Cross Layer Method of Reliable Transmission in UAV Ad Hoc Network Based on Improved Ant Colony Algorithm
- Author
-
Zhang, Xin, Liu, Zhijun, Qu, Mingfei, Akan, Ozgur, Editorial Board Member, Bellavista, Paolo, Editorial Board Member, Cao, Jiannong, Editorial Board Member, Coulson, Geoffrey, Editorial Board Member, Dressler, Falko, Editorial Board Member, Ferrari, Domenico, Editorial Board Member, Gerla, Mario, Editorial Board Member, Kobayashi, Hisashi, Editorial Board Member, Palazzo, Sergio, Editorial Board Member, Sahni, Sartaj, Editorial Board Member, Shen, Xuemin, Editorial Board Member, Stan, Mircea, Editorial Board Member, Jia, Xiaohua, Editorial Board Member, Zomaya, Albert Y., Editorial Board Member, Wang, Bing, editor, Hu, Zuojin, editor, Jiang, Xianwei, editor, and Zhang, Yu-Dong, editor
- Published
- 2024
- Full Text
- View/download PDF
11. A Novel Approach on Deep Reinforcement Learning for Improved Throughput in Power-Restricted IoT Networks
- Author
-
Sweety Bakyarani, E., Singh, Navneet Pratap, Shekhawat, Jyoti, Bhardwaj, Saurabh, Chaku, Shweta, Singh, Jagendra, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Tan, Kay Chen, Series Editor, Shaw, Rabindra Nath, editor, Siano, Pierluigi, editor, Makhilef, Saad, editor, Ghosh, Ankush, editor, and Shimi, S. L., editor
- Published
- 2024
- Full Text
- View/download PDF
12. The Investigation of Communications Protocol
- Author
-
Ma, Zihuai, Luo, Xun, Editor-in-Chief, Almohammedi, Akram A., Series Editor, Chen, Chi-Hua, Series Editor, Guan, Steven, Series Editor, Pamucar, Dragan, Series Editor, and Ahmad, Badrul Hisham, editor
- Published
- 2024
- Full Text
- View/download PDF
13. Accelerating Unsupervised Federated Graph Neural Networks via Semi-asynchronous Communication
- Author
-
Liao, Yuanming, Wu, Duanji, Lin, Pengyu, Guo, Kun, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Sun, Yuqing, editor, Lu, Tun, editor, Wang, Tong, editor, Fan, Hongfei, editor, Liu, Dongning, editor, and Du, Bowen, editor
- Published
- 2024
- Full Text
- View/download PDF
14. The Two Sheriffs Problem: Cryptographic Formalization and Generalization
- Author
-
Sugimoto, Kota, Nakai, Takeshi, Watanabe, Yohei, Iwamoto, Mitsugu, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Wu, Weili, editor, and Guo, Jianxiong, editor
- Published
- 2024
- Full Text
- View/download PDF
15. Security and Energy Efficiency Enhancement for the Internet of Things: Challenges, Architecture and Future Research
- Author
-
Dewan, Ritu, Nagpal, Tapsi, Ahmad, Sharik, Rana, Arun Kumar, Islam, Sardar M. N., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Namasudra, Suyel, editor, Trivedi, Munesh Chandra, editor, Crespo, Ruben Gonzalez, editor, and Lorenz, Pascal, editor
- Published
- 2024
- Full Text
- View/download PDF
16. Dynamic Control, Architecture, and Communication Protocol for Swarm Unmanned Aerial Vehicles
- Author
-
Ganesan, Tamilselvan, Jayarajan, Niresh, Shri Varun, B. G., Chlamtac, Imrich, Series Editor, Naganathan, Archana, editor, Jayarajan, Niresh, editor, and Bin Ibne Reaz, Mamun, editor
- Published
- 2024
- Full Text
- View/download PDF
17. Privacy and security of advanced metering infrastructure (AMI) data and network: a comprehensive review
- Author
-
Priscilla Oyeladun Ajiboye, Kwame Opuni-Boachie Obour Agyekum, and Emmanuel Asuming Frimpong
- Subjects
Advanced metering infrastructure ,Communication protocol ,Data/network security ,Countermeasures ,Vulnerabilities ,Engineering (General). Civil engineering (General) ,TA1-2040 - Abstract
Abstract The traditional electrical grid has to be digitally improved as digitalization and effective integration of renewable energy bring better efficiency, intelligence, and safety into the grid; hence, the transition from the traditional grid to a smart grid. A smart grid is a modernized and digitalized standard electrical infrastructure that has a key component known as the advanced metering infrastructure (AMI). AMI, also known as smart metering, is a key technological enabler of the smart grid that allows automatic collection and reporting of power-consumed data via two-way communication networks. However, the collected power consumption data is confidential; hence, its privacy must be maintained. Similarly, for the benefit of the smart grid to be consistently maximized, the AMI data and network security must always be intact despite the evolving threats and attacks targeted at it. This paper provides a comprehensive review of the existing vulnerabilities/attacks, security and privacy challenges associated with the smart metering data and network system, its open issues, and future direction. The major contributions of this review paper lie in the AMI vulnerabilities, AMI state-of-the-art security schemes with their pros and cons, its communication protocols analysis, and its emerging security measures. This gave enumerated recommendations for the efficiency improvement of AMI security in terms of its latency reduction while implementing efficient security measures in its future work.
- Published
- 2024
- Full Text
- View/download PDF
18. Research on a CMS protocol for the substation control layer
- Author
-
SUN Zhijia, FAN Dongkai, LUO Laifeng, and ZHOU Junfeng
- Subjects
cms ,mms ,independent and controllable ,communication protocol ,substation control layer ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
To achieve a domestically developed alternative to the manufacturing message specification (MMS) as the core communication technology for the substation control layer, the State Grid Corporation of China has established the communication message specification (CMS) for secondary systems in substations. However, the specific application implementation plan has not yet been provided. Therefore, to promote the application of the CMS protocol and advance research on the independent and controllable core technology of substations, a solution is proposed to implement the application of the CMS protocol on a new generation of independent and controllable embedded protection devices. The solution outlines specific implementation methods, including encoding and decoding, communication structure, compatibility application of CMS and MMS, as well as communication security. The feasibility of the solution has been verified through service consistency testing and code robustness testing. The solution has been applied in the new generation of independent and controllable product platforms.
- Published
- 2024
- Full Text
- View/download PDF
19. Privacy and security of advanced metering infrastructure (AMI) data and network: a comprehensive review.
- Author
-
Ajiboye, Priscilla Oyeladun, Agyekum, Kwame Opuni-Boachie Obour, and Frimpong, Emmanuel Asuming
- Subjects
SECURITY systems ,ELECTRIC power distribution grids ,PRIVACY ,TWO-way communication ,TELECOMMUNICATION systems ,COMPUTER network security ,WIRELESS sensor network security ,SMART meters - Abstract
The traditional electrical grid has to be digitally improved as digitalization and effective integration of renewable energy bring better efficiency, intelligence, and safety into the grid; hence, the transition from the traditional grid to a smart grid. A smart grid is a modernized and digitalized standard electrical infrastructure that has a key component known as the advanced metering infrastructure (AMI). AMI, also known as smart metering, is a key technological enabler of the smart grid that allows automatic collection and reporting of power-consumed data via two-way communication networks. However, the collected power consumption data is confidential; hence, its privacy must be maintained. Similarly, for the benefit of the smart grid to be consistently maximized, the AMI data and network security must always be intact despite the evolving threats and attacks targeted at it. This paper provides a comprehensive review of the existing vulnerabilities/attacks, security and privacy challenges associated with the smart metering data and network system, its open issues, and future direction. The major contributions of this review paper lie in the AMI vulnerabilities, AMI state-of-the-art security schemes with their pros and cons, its communication protocols analysis, and its emerging security measures. This gave enumerated recommendations for the efficiency improvement of AMI security in terms of its latency reduction while implementing efficient security measures in its future work. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. 变电站站控层服务协议CMS的应用研究.
- Author
-
孙志佳, 范东凯, 罗来峰, and 周俊峰
- Abstract
Copyright of Zhejiang Electric Power is the property of Zhejiang Electric Power Editorial Office and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
21. Strengthening Internet of Things Security: Surveying Physical Unclonable Functions for Authentication, Communication Protocols, Challenges, and Applications.
- Author
-
Alhamarneh, Raed Ahmed and Mahinderjit Singh, Manmeet
- Subjects
INTERNET security ,INTERNET of things ,PHYSICAL mobility ,INTELLIGENT buildings ,CYBERTERRORISM ,MARKET penetration - Abstract
The spectrum of Internet of Things (IoT) applications is vast. It serves in various domains such as smart homes, intelligent buildings, health care, emergency response, and many more, reflecting the exponential market penetration of the IoT. Various security threats have been made to modern-day systems. Cyberattacks have seen a marked surge in frequency, particularly in recent times. The growing concern centers around the notable rise in cloning attacks, persisting as a significant and looming threat. In our work, an in-depth survey on the IoT that employs physically unclonable functions (PUFs) was conducted. The first contribution analyzes PUF-based authentication, communication protocols, and applications. It also tackles the eleven challenges faced by the research community, proposes solutions to these challenges, and highlights cloning attacks. The second contribution suggests the implementation of a framework model known as PUF3S-ML, specifically crafted for PUF authentication in the Internet of Things (IoT), incorporating innovative lightweight encryption techniques. It focuses on safeguarding smart IoT networks from cloning attacks. The key innovation framework comprises three stages of PUF authentication with IoT devices and an intelligent cybersecurity monitoring unit for IoT networks. In the methodology of this study, a survey relevant to the concerns was conducted. More data were provided previously regarding architecture, enabling technologies, and IoT challenges. After conducting an extensive survey of 125 papers, our analysis revealed 23 papers directly relevant to our domain. Furthermore, within this subset, we identified 11 studies specifically addressing the intersection of communication protocols with PUFs. These findings highlight the targeted relevance and potential contributions of the existing literature to our research focus. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. Falcon Optimization Algorithm-Based Energy Efficient Communication Protocol for Cluster-Based Vehicular Networks.
- Author
-
Alotaibi, Youseef, Rajasekar, B., Jayalakshmi, R., and Rajendran, Surendran
- Subjects
INFORMATION technology ,OPTIMIZATION algorithms ,SEARCH algorithms ,VEHICULAR ad hoc networks ,DATA transmission systems - Abstract
Rapid development in Information Technology (IT) has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle (V2V) transmission. Vehicular networks give a safe and more effective driving experience by presenting time-sensitive and location-aware data. The communication occurs directly between V2V and Base Station (BS) units such as the Road Side Unit (RSU), named as a Vehicle to Infrastructure (V2I). However, the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with time. Therefore, the scheme of an effectual routing protocol for reliable and stable communications is significant. Current research demonstrates that clustering is an intelligent method for effectual routing in a mobile environment. Therefore, this article presents a Falcon Optimization Algorithm-based Energy Efficient Communication Protocol for Cluster-based Routing (FOA-EECPCR) technique in VANETS. The FOA-EECPCR technique intends to group the vehicles and determine the shortest route in the VANET. To accomplish this, the FOA-EECPCR technique initially clusters the vehicles using FOA with fitness functions comprising energy, distance, and trust level. For the routing process, the Sparrow Search Algorithm (SSA) is derived with a fitness function that encompasses two variables, namely, energy and distance. A series of experiments have been conducted to exhibit the enhanced performance of the FOA-EECPCR method. The experimental outcomes demonstrate the enhanced performance of the FOA-EECPCR approach over other current methods. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. A vulnerability detection method for IoT protocol based on parallel fuzzy algorithm
- Author
-
Yinfeng Han, Peng Wang, Chaoqun Kang, Jiayin Lin, and Wei Fan
- Subjects
Improved parallelization fuzzy testing algorithm ,Power distribution IoT ,Communication protocol ,Vulnerability detection ,Genetic algorithm ,Test case ,Science (General) ,Q1-390 ,Social sciences (General) ,H1-99 - Abstract
The Internet of Things communication protocol is prone to security vulnerabilities when facing increasing types and scales of network attacks, which can affect the communication security of the Internet of Things. It is crucial to effectively detect these vulnerabilities in order to improve the security of IoT communication protocols and promptly fix them. Therefore, this study proposes a distributed IoT communication protocol vulnerability detection method based on an improved parallelized fuzzy testing algorithm. Firstly, based on design principles and by comparing different communication protocols, a communication architecture for the distribution network's Internet of Things was constructed, and the communication protocols were formalized and decomposed. Next, preprocess the vulnerability detection samples, and then use genetic algorithm to improve the parallelized fuzzy testing algorithm to perform vulnerability detection. Through this improved algorithm, the missed detection rate and false detection rate can be effectively reduced, thereby improving the security of IoT communication protocols. The experimental results show that the highest missed detection rate of this method is only 4.0 %, and the false detection rate is low, with high detection efficiency. This indicates that the method has good performance and reliability in detecting vulnerabilities in IoT communication protocols.
- Published
- 2024
- Full Text
- View/download PDF
24. Effects of IoT Communication Protocols for Precision Agriculture in Outdoor Environments
- Author
-
Asad Ul Haq Hashmi, Ghias Uddin Mir, Kashif Sattar, Syed Sajid Ullah, Roobaea Alroobaea, Jawaid Iqbal, and Saddam Hussain
- Subjects
Communication protocol ,Internet of Things ,LoRa ,precision agriculture ,smart farming ,Wi-Fi ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The integration of Internet of Things (IoT) technology in precision agriculture offers substantial potential for improving productivity and crop yield. However, challenges persist in optimizing wireless solutions for outdoor smart farms, where diverse data types and environmental obstacles can impede efficiency, causing issues such as data loss and connectivity disruptions. The present study undertakes an investigation into the comparative efficacy of three primary IoT communication protocols, namely Wi-Fi (Wireless Fidelity), Zigbee, and Long-Range Wide Area Network (LoRaWAN), within the context of agricultural monitoring scenarios. This inquiry is substantiated by a series of comprehensive experiments conducted across diverse environmental conditions. Our findings underscore Wi-Fi as the optimal candidate for integration into agricultural monitoring systems, with a focus on paramount factors such as connectivity, data transmission precision, and wireless coverage. This study reveals how data recovery is implemented in communication systems used in agriculture in various scenarios. The methods are deliberate to recover lost data caused by failures in both node networks, thereby notably improving the accuracy of communication solutions for farmers. Additionally, this study provides reference for farmers and stakeholders on leveraging technology in smart agriculture to inflate efficiency and productivity.
- Published
- 2024
- Full Text
- View/download PDF
25. FedFit: Server Aggregation Through Linear Regression in Federated Learning
- Author
-
Taiga Kashima, Ikki Kishida, Ayako Amma, and Hideki Nakayama
- Subjects
Federated learning ,linear regression ,communication protocol ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
We present a conceptually novel framework for Federated Learning (FL) called FedFit for a flexible solver to address FL problems. The FedFit framework consists of two components: model compression to upload a local model from a client to the server and the reconstruction of the compressed local model in the server. Clients upload a compressed local model using a “key” shared with the server to formulate the server aggregation in the FL as linear regression. Therefore, the parameters of the global model are updated through a linear regression solver in the server while naturally contributing to reducing upload costs from clients to the server. Thanks to our framework design, the server can flexibly utilize various established linear regression techniques to address some open problems of FL by considering server aggregation from a different perspective—linear regression. As an example of the broad applicability of our concept, we demonstrate the effectiveness of robust regression and LASSO regression implemented on FedFit, which can alleviate vulnerability issues against attacks on the global model from collapsed clients and introduce sparsity to the global model toward the reduction in model size, respectively.
- Published
- 2024
- Full Text
- View/download PDF
26. Service for communication of devices with Internet access: analysis of technologies and method of creation
- Author
-
Artem Perepelitsyn, Oleksandr Vdovichenko, and Vitalii Mikhalevskyi
- Subjects
communication service ,communication protocol ,internet of things ,iot ,smart home components ,model of iot node ,thingspeak ,home assistant ,Computer engineering. Computer hardware ,TK7885-7895 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The subject of study in this article is technologies and services of communication of elements of smart home, as well as the models, methods, and tools for prototyping of interaction of devices for Internet of Things (IoT). The goal is to simplify the process of creation a service for the programmable by an end user device with the ability to communicate over Internet and to simplify the process of choosing the components for such devices. Task: to perform the analysis of IoT systems requirements and possible issues during the process of creation; to perform the analysis of requirements of safety and cybersecurity for IoT systems; to perform the research and classification of components of IoT systems; to perform the research of communication process between elements of IoT system; to analyze IoT communication protocols; to perform the analysis of services for IoT communication; propose the models of communication of IoT nodes; propose technique for creation of service; and provide practical example of implementation of the research results. According to the tasks, the following results were obtained. The analysis of possible problems and requirements for prototyping elements of smart home systems with Internet access is performed. The analysis of the existing architectures layers of IoT systems is performed. Models of Edge and Fog for IoT system are considered. Analysis of cybersecurity considerations for the devices communication is performed. Five types of components for smart home systems were classified. The process of communication of smart home elements with service at the model level is described. Existing communication protocols for the communication of devices over Internet are analyzed. Commercial and open source communication services for different types of devices are analyzed. Models of IoT node interaction are proposed. Technique of creation of a service for communication of devices and example of use are proposed. Conclusions. The main contribution of this research is the proposed method of creation of own service for communication over Internet for devices implemented on the basis of widely used microcontrollers. Based on the proposed classification of IoT hardware components, it is possible to simplify the decision-making process of selection based on the parameters of price, required efforts from the end customer for installation, and expandability in terms of the possibility of integration of the solution with wider systems. The performed analysis allows to conclude that from existing services ThingSpeak is interesting for use with the simplest chips, and Home Assistant is the preferable solution for home automation.
- Published
- 2023
- Full Text
- View/download PDF
27. Implementation of Smart Farm Systems Based on Fog Computing in Artificial Intelligence of Things Environments
- Author
-
Sukjun Hong, Seongchan Park, Heejun Youn, Jongyong Lee, and Soonchul Kwon
- Subjects
Artificial Intelligence of Things ,convolutional neural network ,communication protocol ,fog computing ,wireless mesh network ,Chemical technology ,TP1-1185 - Abstract
Cloud computing has recently gained widespread attention owing to its use in applications involving the Internet of Things (IoT). However, the transmission of massive volumes of data to a cloud server often results in overhead. Fog computing has emerged as a viable solution to address this issue. This study implements an Artificial Intelligence of Things (AIoT) system based on fog computing on a smart farm. Three experiments are conducted to evaluate the performance of the AIoT system. First, network traffic volumes between systems employing and not employing fog computing are compared. Second, the performance of the communication protocols—hypertext transport protocol (HTTP), message queuing telemetry transport protocol (MQTT), and constrained application protocol (CoAP)—commonly used in IoT applications is assessed. Finally, a convolutional neural network-based algorithm is introduced to determine the maturity level of coffee tree images. Experimental data are collected over ten days from a coffee tree farm in the Republic of Korea. Notably, the fog computing system demonstrates a 26% reduction in the cumulative data volume compared with a non-fog system. MQTT exhibits stable results in terms of the data volume and loss rate. Additionally, the maturity level determination algorithm performed on coffee fruits provides reliable results.
- Published
- 2024
- Full Text
- View/download PDF
28. Improved methodology for assessment of communication protocols for distributed road traffic simulation.
- Author
-
Potuzak, Tomas
- Subjects
- *
COMMUNICATION methodology , *HELPING behavior , *DISTRIBUTED computing , *SPEED limits , *COMPUTER simulation - Abstract
A computer simulation of road traffic is a commonly used tool, which can help to manage constantly intensifying road traffic. It can help to analyze behavior of existing road traffic networks or to predict the behavior of new designed road traffic structures. There are several existing simulators designed or adapted to run in a distributed computing environment in order to achieve a faster execution. In this environment, the inter-process communication ensured by a high-level communication protocol is one of the main bottlenecks limiting the speed of the entire computation. Various high-level communication protocols can have various efficiency, applicability, and scalability. This paper describes an improved methodology for testing and assessment of high-level communication protocols for micro-scale (or microscopic) distributed road traffic simulations. The methodology investigates the dependencies of the communication protocols' performance on various features of the simulation and enables to easily calculate score for each of the tested protocols. Using the scores, the tested protocols can be directly compared. This can be useful when designing or improving a distributed road traffic simulation as the best protocol can be used in this simulation to improve its performance (e.g., its speedup or communication time). The improved version of the methodology is an evolution of its original version. It newly incorporates the assessment of the error introduced into the simulation by lossy communication protocols and reduces overall number of performed tests. The improved methodology was tested using a case study assessing several communication protocols of our own design. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. A Proposal for a Federated Learning Protocol for Mobile and Management Systems.
- Author
-
Michalek, Jakub, Oujezsky, Vaclav, Holik, Martin, and Skorpil, Vladislav
- Subjects
FEDERATED learning ,MOBILE learning ,DATA privacy ,INFRASTRUCTURE (Economics) ,EMERGENCY management - Abstract
Featured Application: The proposed protocol can be applied to systems utilizing federated learning. The design takes into account systems that necessitate both redundant and secure communication. In this research paper, we introduce a federated learning communication protocol tailored for emergency management applications. Our primary objective is to tackle the communication challenges that arise in such critical scenarios. In order to overcome the limitations associated with centralized server architectures, we present an innovative communication protocol. This protocol empowers the framework to effectively cooperate with multiple centralized servers, fostering efficient knowledge sharing and model training while ensuring the utmost data privacy and security. By harnessing this protocol, our framework elevates the performance and resilience of vital infrastructure systems operating on the Android platform, thereby facilitating real-time operational scenarios. This research makes a substantial contribution to the field of emergency management applications, as we offer a comprehensive solution that optimizes communication and enables seamless collaboration with numerous centralized servers. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. A middleware for providing communicability to Embedded MAS based on the lack of connectivity.
- Author
-
Jesus, Vinicius Souza de, Lazarin, Nilson Mori, Pantoja, Carlos Eduardo, Manoel, Fabian César Pereira Brandão, Alves, Gleifer Vaz, and Viterbo, José
- Subjects
MIDDLEWARE ,PROOF of concept ,RADIO frequency ,MULTIAGENT systems ,CRYPTOGRAPHY - Abstract
An Embedded multi-agent system (Embedded MAS) is an embedded cognitive system based on agents cooperating to control hardware devices. These agents are autonomous and proactive entities capable of decision-making and can constantly acquire new knowledge via interaction with other agents and the environment. Since the interaction between agents is relevant for acquiring new knowledge, issues such as the communicability and mobility of agents from different Embedded MAS must be highlighted. The classification of a MAS as Open or Closed only considers the mobility of agents, but communicability also needs to be considered. For this, we extend the notion of openness in these systems to consider the existence of Totally Closed and Limited Open MAS, to consider agents from an Embedded MAS without the ability to move or communicate or when they lose the ability to communicate but still can move to other systems. In cooperative missions where several devices adopt Embedded MAS, they should not become totally closed since they lose the ability to cooperate and could put the mission at risk. Some existent works considering Embedded MAS relies upon IoT infrastructures to guarantee communicability and mobility. But, in cases where these infrastructures are temporarily or permanently unavailable, the system becomes totally closed. Even when alternatives exist, they do not use cryptography. Therefore, we present a middleware for supporting the development of Embedded MAS, considering radiofrequency ad-hoc communication to reduce the dependency on centralized infrastructures. An extended protocol supports message exchange between devices using cryptography. We also present a proof of concept application and a formalization of our model. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
31. Impact of Communication System Characteristics on Electric Vehicle Grid Integration: A Large-Scale Practical Assessment of the UK's Cellular Network for the Internet of Energy †.
- Author
-
Zeinali, Mehdi, Erdogan, Nuh, Bayram, Islam Safak, and Thompson, John S.
- Subjects
TELECOMMUNICATION systems ,ELECTRIC power distribution grids ,ELECTRIC vehicles ,4G networks ,INTERNET ,COMMUNICATION infrastructure ,NETWORK routers ,MOBILE communication systems - Abstract
The ever-increasing number of plug-in electric vehicles (PEVs) requires appropriate electric vehicle grid integration (EVGI) for charging coordination to maintain grid stability and enhance PEV user convenience. As such, the widespread adoption of electric mobility can be successful. EVGI is facilitated through charging stations and empowers PEV users to manage their charging demand by using smart charging solutions. This makes PEV grids assets that provide flexibility to the power grid. The Internet of Things (IoT) feature can make smooth EVGI possible through a supporting communication infrastructure. In this regard, the selection of an appropriate communication protocol is essential for the successful implementation of EVGI. This study assesses the efficacy of the UK's 4G network with TCP and 4G UDP protocols for potential EVGI operations. For this, an EVGI emulation test bed is developed, featuring three charging parking lots with the capacity to accommodate up to 64 PEVs. The network's performance is assessed in terms of data packet loss (e.g., the data-exchange capability between EVGI entities) and latency metrics. The findings reveal that while 4G TCP often outperforms 4G UDP, both achieve latencies of less than 1 s with confidence intervals of 90% or greater for single PEV cases. However, it is observed that the high penetration of PEVs introduces a pronounced latency due to queuing delays in the network including routers and the base station servers, highlighting the challenges associated with maintaining efficient EVGI coordination, which in turn affects the efficient use of grid assets. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
32. Impact of Communication System Characteristics on Electric Vehicle Grid Integration: A Large-Scale Practical Assessment of the UK’s Cellular Network for the Internet of Energy
- Author
-
Mehdi Zeinali, Nuh Erdogan, Islam Safak Bayram, and John S. Thompson
- Subjects
communication protocol ,LPWAN ,plug-in electric vehicles ,smart grid ,TCP ,UDP ,Electricity ,QC501-721 - Abstract
The ever-increasing number of plug-in electric vehicles (PEVs) requires appropriate electric vehicle grid integration (EVGI) for charging coordination to maintain grid stability and enhance PEV user convenience. As such, the widespread adoption of electric mobility can be successful. EVGI is facilitated through charging stations and empowers PEV users to manage their charging demand by using smart charging solutions. This makes PEV grids assets that provide flexibility to the power grid. The Internet of Things (IoT) feature can make smooth EVGI possible through a supporting communication infrastructure. In this regard, the selection of an appropriate communication protocol is essential for the successful implementation of EVGI. This study assesses the efficacy of the UK’s 4G network with TCP and 4G UDP protocols for potential EVGI operations. For this, an EVGI emulation test bed is developed, featuring three charging parking lots with the capacity to accommodate up to 64 PEVs. The network’s performance is assessed in terms of data packet loss (e.g., the data-exchange capability between EVGI entities) and latency metrics. The findings reveal that while 4G TCP often outperforms 4G UDP, both achieve latencies of less than 1 s with confidence intervals of 90% or greater for single PEV cases. However, it is observed that the high penetration of PEVs introduces a pronounced latency due to queuing delays in the network including routers and the base station servers, highlighting the challenges associated with maintaining efficient EVGI coordination, which in turn affects the efficient use of grid assets.
- Published
- 2023
- Full Text
- View/download PDF
33. Development of a Software System for Controlling Dosing Machines
- Author
-
Gergana Spasova, Milena Karova, and Ivaylo Penev
- Subjects
communication protocol ,vending machines ,binary protocol ,liquid dispensing ,Engineering machinery, tools, and implements ,TA213-215 - Abstract
The liquid dosing system consists of machines and a computer (PC). The machines and the computer are connected to each other and communicate via the RS485 interface. The software installed on a computer (PC) consists of two separate modules (applications)—“server” and “operator”. The server runs continuously and communicates to and from the machines. Through the operator module, the nomenclature of customers, liquids, and cards can be created and edited. The operator module makes it possible to perform various operations such as loading credit on a card, blocking and unblocking cards, editing customer or card data, and others. Various reports can be made, such as a report on the consumption of a given customer, a report on the use of the customer card, a report on the liquid consumed, etc. The goal of the system is to perform automated dosing of liquid at the customer’s request, without the involvement of another person (operator). The choice of liquid, the amount, and the payment of the choice made is fully automatic. Payment is only by card, as in case of an attempt to make a dosage and insufficient availability for payment, the dosage is not carried out. The customer is informed of a small credit on the card. The connection between the machine and the operator display is based on a query from the display. The operator’s job involves replacing empty bottles in the machine and monitoring and following up on system irregularities.
- Published
- 2024
- Full Text
- View/download PDF
34. Adding Pull to Push Sum for Approximate Data Aggregation
- Author
-
Nugroho, Saptadi, Weinmann, Alexander, Schindelhauer, Christian, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Dolev, Shlomi, editor, and Schieber, Baruch, editor
- Published
- 2023
- Full Text
- View/download PDF
35. A Cooperative Protocol for Wireless Energy Networks
- Author
-
Lladó, Juan, Galmés, Sebastià, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, and Luo, Yuhua, editor
- Published
- 2023
- Full Text
- View/download PDF
36. Communication Protocol Optimization of Electric Low Power Wireless Sensor Network Based on Active Wakeup
- Author
-
An, Chunyan, Huang, Ziwei, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Tan, Kay Chen, Series Editor, Dong, Xuzhu, editor, Yang, Qingxin, editor, and Ma, Weiming, editor
- Published
- 2023
- Full Text
- View/download PDF
37. Communication Protocols
- Author
-
Ďud’ák, Juraj, Gaspar, Gabriel, Celebi, Emre, Series Editor, Chen, Jingdong, Series Editor, Gopi, E. S., Series Editor, Neustein, Amy, Series Editor, Liotta, Antonio, Series Editor, Di Mauro, Mario, Series Editor, Ďuďák, Juraj, and Gašpar, Gabriel
- Published
- 2023
- Full Text
- View/download PDF
38. Malicious Node Detection in Heterogeneous Internet of Things
- Author
-
Goel, Supriya, Somya, Sutar, Swapnil, Mekala, Priyanka, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Dubey, Ashwani Kumar, editor, Sugumaran, Vijayan, editor, and Chong, Peter Han Joo, editor
- Published
- 2023
- Full Text
- View/download PDF
39. Design and Implementation of UAV Formation Cooperative System
- Author
-
Qian, Cheng, Wu, Huanxing, Zhang, Qirui, Yang, Lvshun, Jiang, Qi, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Fu, Wenxing, editor, Gu, Mancang, editor, and Niu, Yifeng, editor
- Published
- 2023
- Full Text
- View/download PDF
40. Gesture-Based Smart-Assistive Device for Elderly and Disabled People Using IoT
- Author
-
Saraswathi, S., Gopala Krishnan, C., Theerthagiri, Prasanna Venkatesan, Chlamtac, Imrich, Series Editor, Sindhwani, Nidhi, editor, Anand, Rohit, editor, Niranjanamurthy, M, editor, Chander Verma, Dinesh, editor, and Valentina, Emilia Balas, editor
- Published
- 2023
- Full Text
- View/download PDF
41. Research on Dynamic Pressure Sensor Based on ZigBee Technology
- Author
-
Li, Tao, Wu, Ying, Yu, Yanxi, Ceccarelli, Marco, Series Editor, Agrawal, Sunil K., Advisory Editor, Corves, Burkhard, Advisory Editor, Glazunov, Victor, Advisory Editor, Hernández, Alfonso, Advisory Editor, Huang, Tian, Advisory Editor, Jauregui Correa, Juan Carlos, Advisory Editor, Takeda, Yukio, Advisory Editor, and Dai, Honghua, editor
- Published
- 2023
- Full Text
- View/download PDF
42. Protocol Adaptive Conversion Method of Power Transmission Internet of Things Terminal Based on Protocol Matching
- Author
-
Chen, Cheng, Jiao, Kang, Ling, Letao, Wang, Zhenhua, Liu, Yuan, Zheng, Jie, Xhafa, Fatos, Series Editor, Ahmad, Ishfaq, editor, Ye, Jun, editor, and Liu, Weidong, editor
- Published
- 2023
- Full Text
- View/download PDF
43. SERVICE FOR COMMUNICATION OF DEVICES WITH INTERNET ACCESS: ANALYSIS OF TECHNOLOGIES AND METHOD OF CREATION.
- Author
-
PEREPELITSYN, Artem, VDOVICHENKO, Oleksandr, and MIKHALEVSKYI, Vitalii
- Subjects
INTERNET access ,INTERNET of things ,SMART homes ,INTERNET security ,MICROCONTROLLERS - Abstract
The subject of study in this article is technologies and services of communication of elements of smart home, as well as the models, methods, and tools for prototyping of interaction of devices for Internet of Things (IoT). The goal is to simplify the process of creation a service for the programmable by an end user device with the ability to communicate over Internet and to simplify the process of choosing the components for such devices. Task: to perform the analysis of IoT systems requirements and possible issues during the process of creation; to perform the analysis of requirements of safety and cybersecurity for IoT systems; to perform the research and classification of components of IoT systems; to perform the research of communication process between elements of IoT system; to analyze IoT communication protocols; to perform the analysis of services for IoT communication; propose the models of communication of IoT nodes; propose technique for creation of service; and provide practical example of implementation of the research results. According to the tasks, the following results were obtained. The analysis of possible problems and requirements for prototyping elements of smart home systems with Internet access is performed. The analysis of the existing architectures layers of IoT systems is performed. Models of Edge and Fog for IoT system are considered. Analysis of cybersecurity considerations for the devices communication is performed. Five types of components for smart home systems were classified. The process of communication of smart home elements with service at the model level is described. Existing communication protocols for the communication of devices over Internet are analyzed. Commercial and open source communication services for different types of devices are analyzed. Models of IoT node interaction are proposed. Technique of creation of a service for communication of devices and example of use are proposed. Conclusions. The main contribution of this research is the proposed method of creation of own service for communication over Internet for devices implemented on the basis of widely used microcontrollers. Based on the proposed classification of IoT hardware components, it is possible to simplify the decision-making process of selection based on the parameters of price, required efforts from the end customer for installation, and expandability in terms of the possibility of integration of the solution with wider systems. The performed analysis allows to conclude that from existing services ThingSpeak is interesting for use with the simplest chips, and Home Assistant is the preferable solution for home automation. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
44. Agents and Multi-agent Systems in the Management of Electric Energy Systems.
- Author
-
BITIMANOVA, Saltanat and SHUKIROVA, Aliya
- Subjects
- *
MULTIAGENT systems , *ENERGY management , *ELECTRIC power consumption , *INTELLIGENT networks , *SYSTEMS design , *TELECOMMUNICATION systems - Abstract
Electric energy systems need constant modernization and updating to solve such problems as distributed management, self-sealing, improving the quality of electricity, demand management, and integration of renewable energy systems. Currently, energy systems need advanced and intelligent technologies to perform various system-level tasks. The purpose of this research is to analyze the existing control systems of electric energy systems, as well as to consider the possibility of using multi-agent systems to control electric energy systems. To achieve the aim of the research, the following scientific approaches were implemented: method of direct research, experimental method, questioning, comparative method, analysis method, and method of observation. The primary value of the research is in the novelty of the work and the fact, that functional components in multi-agent systems act as independent agents, which can interact with each other through a message communication system. This provides a simple connection between the components, which can benefit complex systems designed for an intelligent network. The intelligent network provides an efficient energy management system, and the modernization of the existing power system using a multi-agent system provides solutions to many problems. The best implementation of a multi-agent system can be achieved through the employment of fast and protected communication protocols. The authors of the research have conducted research and presented key statistical data on electricity usage in Kazakhstan over the past few years. The practical significance of the research is determined by the applied results, and their scientific significance, which is conditioned upon the use of deep, modern mathematical results and the development of an optimal control system. This research is a part of a universal model and optimal system of emergency quick response, conducting a quick preliminary prognosis as well as ensuring more lasting planning in electricity consumption. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
45. Study on the technical specification of communication interface and protocol for intelligent mine
- Author
-
DING Zhen, SUN Jiping, ZHANG Fan, WANG Peng, HU Eryi, DENG Wenge, GAO Jing, ZHENG Yaotao, WANG Bo, GAO Qiuqiu, LI Ximin, QIAN Haijun, LIU Jianhua, QIAO Shaoli, BAO Zhen, YANG Yongsheng, YANG Zhenyu, LI Yuxue, LI Yuhan, and SHAO Guangyao
- Subjects
intelligent mine ,communication interface ,communication protocol ,data fusion and sharing ,perception data ,text data ,audio-visual data ,Mining engineering. Metallurgy ,TN1-997 - Abstract
At present, there are some problems in the construction of the intelligent mine, such as the non-uniform interface protocol and the formation of new 'information island'. They lead to the difficulty of data fusion and sharing in mines and the difficulty of realizing the high-quality development of intelligent mine. It is pointed out that the key problem of mine intelligent construction lies in the lack of standardized and unified data acquisition, transmission and sharing standards. According to the core specification, application specification, and operation and maintenance specification, the technology system of intelligent mine communication interface and protocol is designed. The communication interface and protocol model of intelligent mine is proposed. The perception layer, transmission layer and application layer of the model are defined. The model of intelligent mining equipment is constructed, and the communication interface is described formally. The intelligent mine data is divided into perception data, text data and audio-visual data. The message structures of the three kinds of data are defined. According to the current mining equipment, technology application and development direction, the intelligent mine data acquisition modes are divided into equipment direct acquisition, protocol conversion acquisition, and system transfer acquisition. The application scenarios of three data acquisition modes are pointed out. The acquisition and transmission process of perception data, text data, and audio-visual data are described. The technical specification of intelligent mine communication interface and protocol covers the whole process of mine data fusion communication. It provides unified interface mode and communication protocol specification for intelligent mine data acquisition, transmission, fusion and sharing. And it realizes interconnection and intercommunication among various systems of the mine.
- Published
- 2023
- Full Text
- View/download PDF
46. Adaptive intelligent cutting technology of the shearer based on the high-precision three-dimensional dynamic geological model
- Author
-
Hou Yunbing, Zhang Hong, Mao Shanjun, Sun Zhenming, Li Mei, and Chen Huazhou
- Subjects
intelligent mining ,fully mechanized working face ,adaptive intelligent cutting of the shearer ,programming of the cutting paths ,high-precision three-dimensional dynamic geological model ,communication protocol ,Engineering geology. Rock mechanics. Soil mechanics. Underground construction ,TA703-712 ,Mining engineering. Metallurgy ,TN1-997 - Abstract
If the shearer is cutting coal using the "memory cutting" technique, a manual demonstration is required.The memory cutting technology has higher requirements on the reserving conditions of coal seams.When the coal seam fluctuates greatly, frequent manual demonstrations are required.The "memory cutting" technology only optimizes the cutting path of the coal seam roof for the next cutting.Along the advancing direction of the shearer, it is impossible to accurately plan and control the pitching angle of the shearer according to the reserving conditions of the coal seam.Based on the concept of shearer self-adaptive intelligent cutting, this paper designs the operation mode of the shearer intelligent cutting system in the fully mechanized working face.In this model, the high-precision three-dimensional geological model of the working face is first constructed by using the highly accurate geophysical data of the coal seam, and then the future cutting path of the shearer is planned by using the model.At the same time, the high-precision three-dimensional geological model is dynamically corrected by using the latest geological data of the working face during the mining process.In this paper, the high-precision three-dimensional dynamic geological model is coupled with the shearer mining planning algorithm.According to the model, a shearer mining control baseline planning algorithm that can adapt to the changes of the coal seam is proposed, which realizes the pitching control of the shearer in the advancing direction and the cutting control in the pulling direction, as well as the efficient cooperation between the update of the geological model, the planning of the mining baseline and the adjustment of the shearer drum.The calculation service interface of the drum adjustment parameters in the intelligent cutting system and the communication protocol between the intelligent cutting system is designed.Addtionally, the shearer control system is considered.This realizes the precise control of the shearer drum based on the planning cutting path.The intelligent cutting system of fully mechanized working face is applied to guide the production of shearers.The practice shows that the shearer intelligent cutting system is suitable for coal seams with various degrees of floor inclination.The cutting line of the shearer can better fit the roof and floor lines of the coal seam, which can save resources and improve production efficiency.
- Published
- 2023
- Full Text
- View/download PDF
47. Cloud-connected central unit for traffic control: interfacing sensing units and centralized control for efficient traffic management
- Author
-
Goyal, Rahul, Elawadhi, Ojas, Sharma, Akshat, Bhutani, Monica, and Jain, Arohi
- Published
- 2024
- Full Text
- View/download PDF
48. Cluster Synchronization and Finite-Time Bounded for Complex Networks Under DoS Attacks and Encoding–Decoding Communication Protocol
- Author
-
Shi, Zhennan, Chen, Qiaoyu, Tong, Dongbing, and Lu, Hongqian
- Published
- 2023
- Full Text
- View/download PDF
49. Application of 5G Communication Technology in IOV
- Author
-
Zhang, Yuheng, Striełkowski, Wadim, Editor-in-Chief, Black, Jessica M., Series Editor, Butterfield, Stephen A., Series Editor, Chang, Chi-Cheng, Series Editor, Cheng, Jiuqing, Series Editor, Dumanig, Francisco Perlas, Series Editor, Al-Mabuk, Radhi, Series Editor, Scheper-Hughes, Nancy, Series Editor, Urban, Mathias, Series Editor, Webb, Stephen, Series Editor, Ali, Ghaffar, editor, Birkök, Mehmet Cüneyt, editor, and Khan, Intakhab Alam, editor
- Published
- 2022
- Full Text
- View/download PDF
50. Preliminary Considerations for Asynchronous Circuit Design
- Author
-
Srivastava, Pallavi and Srivastava, Pallavi
- Published
- 2022
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.