Showing 541 - 560 results of 1,303 for search '"communication protocol"', query time: 0.16s Refine Results
  1. 541

    Expandable Fully Actuated Aerial Vehicle Assembly: Geometric Control Adapted from an Existing Flight Controller and Real-World Prototype Implementation by Chuanbeibei Shi, Kaidi Wang, Yushu Yu

    Published 2022-09-01
    “…The real-time expandable communication protocol among the different sub-aircraft was designed based on the CAN bus. …”
    Get full text
    Article
  2. 542

    Counterfactual communication without a trace in the transmission channel by Wei-Wei Pan, Xiao Liu, Xiao-Ye Xu, Qin-Qin Wang, Ze-Di Cheng, Jian Wang, Zhao-Di Liu, Geng Chen, Zong-Quan Zhou, Chuan-Feng Li, Guang-Can Guo, Justin Dressel, Lev Vaidman

    Published 2023-09-01
    “…Abstract We report an experimental realization of a modified counterfactual communication protocol that eliminates the dominant environmental trace left by photons passing through the transmission channel. …”
    Get full text
    Article
  3. 543

    Study on applicability of data collection frequency for heavy-duty vehicles based on remote monitoring by Zhen Kai, Li Gang, Ji Zhe, Liu Baoxian, Yang Yanyan, Qin Kongjian, Guo Kuiyuan

    Published 2022-01-01
    “…The remote online system of heavy-duty vehicles is composed of vehicle terminal and monitoring platform based on the specified communication protocol, data format and data transmission frequency, which is an important embodiment of heavy-duty vehicle pollution control in the application for Internet of Vehicles. …”
    Get full text
    Article
  4. 544

    Channel Allocation for Connected Vehicles in Internet of Things Services by Ahmed Abdulhakim Al-Absi, Mohammed Abdulhakim Al-Absi, Mangal Sain, Hoon Jae Lee

    Published 2021-05-01
    “…Based on the existing Internet of Vehicles communication protocol and multi-channel allocation strategy, this paper studies the key issues with vehicle communication. …”
    Get full text
    Article
  5. 545

    A Highly Reliable Communication System for Internet of Robotic Things and Implementation in RT-Middleware With AMQP Communication Interfaces by Daishi Yoshino, Yutaka Watanobe, Keitaro Naruse

    Published 2021-01-01
    “…Based on this study’s findings, we conclude that AMQP should be fully used as a communication protocol for constructing IoRT systems.…”
    Get full text
    Article
  6. 546

    CardioID: Secure ECG-BCG Agnostic Interaction-Free Device Pairing by Si Zuo, Stephan Sigg, Le Ngu Nguyen, Nils Beck, Nico Jahne-Raden, Marie Cathrine Wolf

    Published 2022-01-01
    “…We propose a quantization to derive secure keys for cross BCG-ECG device pairing from heart-rate variability and analyze the performance in (inter- and intra-subject) BCG-to-ECG pairing. A secure communication protocol for Body Area Networks (BAN) is discussed. …”
    Get full text
    Article
  7. 547

    Secure controlling method for scalable botnets by Qiang LIU, Pengfei LI, Zhangjie FU

    Published 2023-02-01
    “…Botnet is one of main threats towards the Internet.Currently, botnets can expand to the whole world due to various types of network services, pervasive security vulnerabilities and massive deployment of networked devices, e.g., internet of things (IoT) devices.Future botnets will become more cross-platform and stealthy, which introduces severe security risks to cyberspace.Therefore, in-depth research on botnets can offer study targets to corresponding defensive studies, which is very meaningful for designing an architecture to secure the next-generation cyberspace.Hence, an HTTP-based scalable botnet framework was proposed to address the problems of compatibility, stealthiness and security.Specifically, the framework adopted a centralized controlling model.Moreover, it used the HTTP protocol as the designed botnet’s communication protocol and block encryption mechanisms based on symmetric cryptography to protect the botnet’s communication contents.Furthermore, a secure control mechanism for multi-platform botnets was designed.In particular, the proposed mechanism utilized source-level code integration and cross-compilation techniques to solve the compatibility challenge.It also introduced encrypted communication with dynamic secret keys to overcome the drawbacks of network traffic regularity and ease of analysis in traditional botnets.Moreover, it designed server migration and reconnection mechanisms to address the weakness of single-point-failure in centralized botnet models.Simulation results in three experimental scenarios with different levels of botnet controllability show that there is a linear relationship between the size of a botnet and the service overhead of the related C&C servers.In addition, under the condition of the same botnet scale, a higher level of controllability introduces a higher throughput and a greater system overhead.The above results demonstrate the effectiveness and the practical feasibility of the proposed method.…”
    Get full text
    Article
  8. 548

    Dynamic Frame Update Policy for UHF RFID Sensor Tag Collisions by Laura Arjona, Hugo Landaluce, Asier Perallos, Enrique Onieva

    Published 2020-05-01
    “…Dynamic Frame Slotted Aloha (DFSA) anti-collision protocols have been used extensively in the literature because EPCglobal Class 1 Generation 2 (EPC C1G2), which is the current communication protocol standard in RFID, employs this strategy. …”
    Get full text
    Article
  9. 549

    Resilience of Reed-Solomon Codes against Single-Frequency Electromagnetic Disturbances: Fault Mechanisms and Fault Elimination through Symbol Inversion by Pejman Memar, Jens Vankeirsbilck, Dries Vanoost, Tim Claeys, Davy Pissoort, Jeroen Boydens

    Published 2022-04-01
    “…Accordingly, this paper proposes to add an extra inversion layer to the communication protocol to enhance the resiliency of these codes against single-frequency electromagnetic disturbances. …”
    Get full text
    Article
  10. 550

    On-line method for optimal tuning of PID controllers using standard OPC interface by Cristhian Ivan Riaño Jaimes, Jorge Luis Diaz Rodriguez, Diego Armando Mejía Bugallo

    Published 2022-09-01
    “…Objective− Automatically and remotely obtain the optimal parameters of the PID controller, taking advantage of an online connection via the OPC communication protocol to analyze the transient response of the system. …”
    Get full text
    Article
  11. 551

    Performance Analysis of IoT and Long-Range Radio-Based Sensor Node and Gateway Architecture for Solid Waste Management by Shaik Vaseem Akram, Rajesh Singh, Mohammed A. AlZain, Anita Gehlot, Mamoon Rashid, Osama S. Faragallah, Walid El-Shafai, Deepak Prashar

    Published 2021-04-01
    “…Long-range radio (LoRa) communication is a widespread communication protocol that offers long range transmission and low data rates with minimum power consumption. …”
    Get full text
    Article
  12. 552

    Vulnerability and Impact Analysis of the IEC 61850 GOOSE Protocol in the Smart Grid by Haftu Tasew Reda, Biplob Ray, Pejman Peidaee, Adnan Anwar, Abdun Mahmood, Akhtar Kalam, Nahina Islam

    Published 2021-02-01
    “…Generic Object-Oriented Substation Events (GOOSE), which is a widely used communication protocol defined in IEC 61850, provides reliable and fast transmission of events for the electrical substation system. …”
    Get full text
    Article
  13. 553

    Mechanical Design and Control System Development of a Rehabilitation Robotic System for Walking With Arm Swing by Juan Fang, Kenneth J. Hunt

    Published 2021-11-01
    “…Ten actuators and servocontrollers with EtherCAT communication protocol controlled the bilateral shoulder, elbow, hip, knee and ankle joints. …”
    Get full text
    Article
  14. 554

    Perception Enhancement and Improving Driving Context Recognition of an Autonomous Vehicle Using UAVs by Abderraouf Khezaz, Manolo Dulva Hina, Amar Ramdane-Cherif

    Published 2022-09-01
    “…Logical rules about which communication protocols to use also exist. Finally, various driving context cognition rules are provided. …”
    Get full text
    Article
  15. 555

    Rekayasa Tempat Parkir Kendaraan Mobil Berbasis Teknologi Informasi by Husain Husain, Asmah Akhriana, Herlinda Herlinda, Ahmad Ahmad, Nurdiansah Nurdiansah, Risma Putri Willy Tutang

    Published 2022-08-01
    “…Using the application design method by utilizing several object detection sensors including the Infrared Proximity Sensor and using the Message Queuing Telemetry Transport (MQTT) protocol which functions as a wireless communication protocol. The results of this study show that the system works as expected, that the sensor can detect parking objects that are filled or still empty and the system data communication also works well, namely the sensor sends data to wemos D1, then sent to the MQTT Broker (server) then resumes to wemos D1 and then the data is sent to the message viewer device, namely monitors and LEDs. …”
    Get full text
    Article
  16. 556

    CANPerFL: Improve In-Vehicle Intrusion Detection Performance by Sharing Knowledge by Thien-Nu Hoang, Md Rezanur Islam, Kangbin Yim, Daehee Kim

    Published 2023-05-01
    “…The Controller Area Network (CAN) is a widely used communication protocol in automobiles, but it is vulnerable to various types of attacks. …”
    Get full text
    Article
  17. 557

    LP-MAB: Improving the Energy Efficiency of LoRaWAN Using a Reinforcement-Learning-Based Adaptive Configuration Algorithm by Benyamin Teymuri, Reza Serati, Nikolaos Athanasios Anagnostopoulos, Mehdi Rasti

    Published 2023-02-01
    “…In the Internet of Things (IoT), Low-Power Wide-Area Networks (LPWANs) are designed to provide low energy consumption while maintaining a long communications’ range for End Devices (EDs). LoRa is a communication protocol that can cover a wide range with low energy consumption. …”
    Get full text
    Article
  18. 558

    Toward Efficient Hierarchical Federated Learning Design Over Multi-Hop Wireless Communications Networks by Tu Viet Nguyen, Nhan Duc Ho, Hieu Thien Hoang, Cuong Danh Do, Kok-Seng Wong

    Published 2022-01-01
    “…This paper proposes a two-hop communication protocol with a dynamic resource allocation strategy to investigate the possibility of bandwidth allocation from a limited network resource to the maximum number of clients participating in FL. …”
    Get full text
    Article
  19. 559

    The Use of the MQTT Protocol in Measurement, Monitoring and Control Systems as Part of the Implementation of Energy Management Systems by Anna Manowska, Artur Wycisk, Andrzej Nowrot, Joachim Pielot

    Published 2022-12-01
    “…The concept of the system is based on the Message Queue Telemetry Transport (MQTT) communication protocol, a wireless network, an ESP8266 microcontroller and a BME280 sensor. …”
    Get full text
    Article
  20. 560

    Bluetooth Low Energy Interference Awareness Scheme and Improved Channel Selection Algorithm for Connection Robustness by Bozheng Pang, Kristof T’Jonck, Tim Claeys, Davy Pissoort, Hans Hallez, Jeroen Boydens

    Published 2021-03-01
    “…Bluetooth Low Energy (BLE) is a popular wireless communication protocol heavily used in Internet of Things applications. …”
    Get full text
    Article