Industrial automation systems are pivotal in enhancing the digitization and intelligence of the industrial sector. In recent years, wireless communication technologies (such as B5G/6G) and Cloud Fog automation (CFA) h...
详细信息
ISBN:
(数字)9798331527471
ISBN:
(纸本)9798331527488
Industrial automation systems are pivotal in enhancing the digitization and intelligence of the industrial sector. In recent years, wireless communication technologies (such as B5G/6G) and Cloud Fog automation (CFA) have revolutionized the industrial sector, providing unparalleled flexibility and scalability. However, the prevailing CFA architecture predominantly concentrates on network and system levels, often neglecting the optimization of the physical layer communication process. To achieve the optimal system-level performance of wireless CFA, this study introduces CFA-OpenRAN, an integrated architecture encompassing communication, computing, and control. By leveraging the open design, standardized interfaces, and software-defined paradigm of O-RAN, CFA-OpenRAN facilitates cross-domain optimization of communication, computing, and industrial control in wireless CFA. In the end, an application scenario of joint resource allocation and the corresponding experiment setup was developed.
The most vehicle manufacturers have been using the CAN (controller Area Network) in order to communicate among ECUs in vehicle systems for a long time. However, CAN has a disadvantage in that it cannot send and receiv...
详细信息
ISBN:
(纸本)9788993215243
The most vehicle manufacturers have been using the CAN (controller Area Network) in order to communicate among ECUs in vehicle systems for a long time. However, CAN has a disadvantage in that it cannot send and receive large amounts of data quickly due to its limited speed and short data transmission size. The CAN FD (controller Area Network with Flexible Data rate) was developed to compensate for this disadvantage, and it has the advantage of being able to communicate at more fast speed and eight times the data transmission size compared to CAN. These CAN and CAN FD are vulnerable to message replay attacks because they do not provide data authentication. In this paper, secure communication is implemented by applying CMAC (Cipher based Message Authentication Code) based on CAN and CAN FD. Also, the performance of the two secure communications is compared and analyzed. To implement CMAC, HW-based AES-128 ( Advanced Encryption Standard) CBC (Cipher Block Chaining) algorithm is used. This paper compares the performance of Secure CAN and CAN FD communication based on CMAC and can help to check communication traffic of ECU (Electronic control Unit) in advance when applying the function in the real vehicle system.
As a critical component of the power system, the operational stability and efficiency of the converter station directly affect the safety and reliability of the entire power system. The existing converter station mana...
详细信息
This article is devoted to the theoretical study of the properties of discrete optimization problems, as well as methods of their effective implementation on modern multiprocessor computing systems and the experimenta...
详细信息
This paper presents a flexible Industrial Internet of Things (IIoT) infrastructure model, highlighting the integration of the Long Short-Term Memory (LSTM) algorithm for predictive analysis. A key component of this mo...
详细信息
Intelligence control leverages the power of artificial intelligence (AI). Traditional simulation techniques limited by their dependence on accurate and complete data. To address the issues of a lack of such data in pr...
详细信息
The Low Earth Orbit (LEO) satellite network, serving as a vital complement to the terrestrial backbone network, has emerged as a prospective path for future mobile communication systems, owing to its extensive coverag...
详细信息
ISBN:
(纸本)9798400709265
The Low Earth Orbit (LEO) satellite network, serving as a vital complement to the terrestrial backbone network, has emerged as a prospective path for future mobile communication systems, owing to its extensive coverage. In this paper, a three-tier computing architecture catering for application scenarios where ground terminal has limited resources and elevated quality of service (QoS) requisites is presented. The proposed design features vertical collaboration among ground users, LEO satellites, and remote cloud servers, providing collaborative computing task offloading capabilities. We consider the delay and energy consumption of the system, formulated the offloading decision problem as a nonlinear integer programming problem, and then introduced an offloading mechanism that utilizes an improved version of the Gale-Shapley (GS) algorithm and non-cooperative game theory (MGSCO) to approximate the optimal solution under specified constraints. The outcomes of simulations indicate that this strategy can significantly mitigate system delays and energy consumption, in contrast to reference strategies.
The Kalman filter is an important tool for state estimation of linear dynamic systems and is widely used in signal processing, control systems, navigation and other fields. The computational efficiency of the traditio...
详细信息
In this paper, we utilize internet-of-things and semantic technologies to automate the assessment of socio-technical behaviors in engineering students in a circuits laboratory setting. Socio-technical learning objecti...
详细信息
A special form of multicarrier modulation (MCM) with widely spaced subcarriers and overlapping spectra called Orthogonal Frequency Division Multiplexing (ofDM) was patented in the US in the 1970s. Modern ofDM is widel...
详细信息
暂无评论