-
541
Expandable Fully Actuated Aerial Vehicle Assembly: Geometric Control Adapted from an Existing Flight Controller and Real-World Prototype Implementation
Published 2022-09-01“…The real-time expandable communication protocol among the different sub-aircraft was designed based on the CAN bus. …”
Get full text
Article -
542
Counterfactual communication without a trace in the transmission channel
Published 2023-09-01“…Abstract We report an experimental realization of a modified counterfactual communication protocol that eliminates the dominant environmental trace left by photons passing through the transmission channel. …”
Get full text
Article -
543
Study on applicability of data collection frequency for heavy-duty vehicles based on remote monitoring
Published 2022-01-01“…The remote online system of heavy-duty vehicles is composed of vehicle terminal and monitoring platform based on the specified communication protocol, data format and data transmission frequency, which is an important embodiment of heavy-duty vehicle pollution control in the application for Internet of Vehicles. …”
Get full text
Article -
544
Channel Allocation for Connected Vehicles in Internet of Things Services
Published 2021-05-01“…Based on the existing Internet of Vehicles communication protocol and multi-channel allocation strategy, this paper studies the key issues with vehicle communication. …”
Get full text
Article -
545
A Highly Reliable Communication System for Internet of Robotic Things and Implementation in RT-Middleware With AMQP Communication Interfaces
Published 2021-01-01“…Based on this study’s findings, we conclude that AMQP should be fully used as a communication protocol for constructing IoRT systems.…”
Get full text
Article -
546
CardioID: Secure ECG-BCG Agnostic Interaction-Free Device Pairing
Published 2022-01-01“…We propose a quantization to derive secure keys for cross BCG-ECG device pairing from heart-rate variability and analyze the performance in (inter- and intra-subject) BCG-to-ECG pairing. A secure communication protocol for Body Area Networks (BAN) is discussed. …”
Get full text
Article -
547
Secure controlling method for scalable botnets
Published 2023-02-01“…Botnet is one of main threats towards the Internet.Currently, botnets can expand to the whole world due to various types of network services, pervasive security vulnerabilities and massive deployment of networked devices, e.g., internet of things (IoT) devices.Future botnets will become more cross-platform and stealthy, which introduces severe security risks to cyberspace.Therefore, in-depth research on botnets can offer study targets to corresponding defensive studies, which is very meaningful for designing an architecture to secure the next-generation cyberspace.Hence, an HTTP-based scalable botnet framework was proposed to address the problems of compatibility, stealthiness and security.Specifically, the framework adopted a centralized controlling model.Moreover, it used the HTTP protocol as the designed botnet’s communication protocol and block encryption mechanisms based on symmetric cryptography to protect the botnet’s communication contents.Furthermore, a secure control mechanism for multi-platform botnets was designed.In particular, the proposed mechanism utilized source-level code integration and cross-compilation techniques to solve the compatibility challenge.It also introduced encrypted communication with dynamic secret keys to overcome the drawbacks of network traffic regularity and ease of analysis in traditional botnets.Moreover, it designed server migration and reconnection mechanisms to address the weakness of single-point-failure in centralized botnet models.Simulation results in three experimental scenarios with different levels of botnet controllability show that there is a linear relationship between the size of a botnet and the service overhead of the related C&C servers.In addition, under the condition of the same botnet scale, a higher level of controllability introduces a higher throughput and a greater system overhead.The above results demonstrate the effectiveness and the practical feasibility of the proposed method.…”
Get full text
Article -
548
Dynamic Frame Update Policy for UHF RFID Sensor Tag Collisions
Published 2020-05-01“…Dynamic Frame Slotted Aloha (DFSA) anti-collision protocols have been used extensively in the literature because EPCglobal Class 1 Generation 2 (EPC C1G2), which is the current communication protocol standard in RFID, employs this strategy. …”
Get full text
Article -
549
Resilience of Reed-Solomon Codes against Single-Frequency Electromagnetic Disturbances: Fault Mechanisms and Fault Elimination through Symbol Inversion
Published 2022-04-01“…Accordingly, this paper proposes to add an extra inversion layer to the communication protocol to enhance the resiliency of these codes against single-frequency electromagnetic disturbances. …”
Get full text
Article -
550
On-line method for optimal tuning of PID controllers using standard OPC interface
Published 2022-09-01“…Objective− Automatically and remotely obtain the optimal parameters of the PID controller, taking advantage of an online connection via the OPC communication protocol to analyze the transient response of the system. …”
Get full text
Article -
551
Performance Analysis of IoT and Long-Range Radio-Based Sensor Node and Gateway Architecture for Solid Waste Management
Published 2021-04-01“…Long-range radio (LoRa) communication is a widespread communication protocol that offers long range transmission and low data rates with minimum power consumption. …”
Get full text
Article -
552
Vulnerability and Impact Analysis of the IEC 61850 GOOSE Protocol in the Smart Grid
Published 2021-02-01“…Generic Object-Oriented Substation Events (GOOSE), which is a widely used communication protocol defined in IEC 61850, provides reliable and fast transmission of events for the electrical substation system. …”
Get full text
Article -
553
Mechanical Design and Control System Development of a Rehabilitation Robotic System for Walking With Arm Swing
Published 2021-11-01“…Ten actuators and servocontrollers with EtherCAT communication protocol controlled the bilateral shoulder, elbow, hip, knee and ankle joints. …”
Get full text
Article -
554
Perception Enhancement and Improving Driving Context Recognition of an Autonomous Vehicle Using UAVs
Published 2022-09-01“…Logical rules about which communication protocols to use also exist. Finally, various driving context cognition rules are provided. …”
Get full text
Article -
555
Rekayasa Tempat Parkir Kendaraan Mobil Berbasis Teknologi Informasi
Published 2022-08-01“…Using the application design method by utilizing several object detection sensors including the Infrared Proximity Sensor and using the Message Queuing Telemetry Transport (MQTT) protocol which functions as a wireless communication protocol. The results of this study show that the system works as expected, that the sensor can detect parking objects that are filled or still empty and the system data communication also works well, namely the sensor sends data to wemos D1, then sent to the MQTT Broker (server) then resumes to wemos D1 and then the data is sent to the message viewer device, namely monitors and LEDs. …”
Get full text
Article -
556
CANPerFL: Improve In-Vehicle Intrusion Detection Performance by Sharing Knowledge
Published 2023-05-01“…The Controller Area Network (CAN) is a widely used communication protocol in automobiles, but it is vulnerable to various types of attacks. …”
Get full text
Article -
557
LP-MAB: Improving the Energy Efficiency of LoRaWAN Using a Reinforcement-Learning-Based Adaptive Configuration Algorithm
Published 2023-02-01“…In the Internet of Things (IoT), Low-Power Wide-Area Networks (LPWANs) are designed to provide low energy consumption while maintaining a long communications’ range for End Devices (EDs). LoRa is a communication protocol that can cover a wide range with low energy consumption. …”
Get full text
Article -
558
Toward Efficient Hierarchical Federated Learning Design Over Multi-Hop Wireless Communications Networks
Published 2022-01-01“…This paper proposes a two-hop communication protocol with a dynamic resource allocation strategy to investigate the possibility of bandwidth allocation from a limited network resource to the maximum number of clients participating in FL. …”
Get full text
Article -
559
The Use of the MQTT Protocol in Measurement, Monitoring and Control Systems as Part of the Implementation of Energy Management Systems
Published 2022-12-01“…The concept of the system is based on the Message Queue Telemetry Transport (MQTT) communication protocol, a wireless network, an ESP8266 microcontroller and a BME280 sensor. …”
Get full text
Article -
560
Bluetooth Low Energy Interference Awareness Scheme and Improved Channel Selection Algorithm for Connection Robustness
Published 2021-03-01“…Bluetooth Low Energy (BLE) is a popular wireless communication protocol heavily used in Internet of Things applications. …”
Get full text
Article