• Title/Summary/Keyword: CAN Communication

Search Result 20,413, Processing Time 0.041 seconds

Multiuser chirp modulation for underwater acoustic channel based on VTRM

  • Yuan, Fei;Wei, Qian;Cheng, En
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.9 no.3
    • /
    • pp.256-265
    • /
    • 2017
  • In this paper, an ascheme is proposed for multiuser underwater acoustic communication by using the multi-chirp rate signals. It differs from the well known TDMA (Time Division Multiple Access), FDMA (Frequency Division Multiple Access) or CDMA (Code Division Multiple Access), by assigning each users with different chirp-rate carriers instead of the time, frequency or PN code. Multi-chirp rate signals can be separated from each other by FrFT (Fractional Fourier Transform), which can be regarded as the chirp-based decomposing, and superior to the match filter in the underwater acoustic channel. VTRM (Virtual Time Reverse Mirror) is applied into the system to alleviate the ISI caused by the multipatch and make the equalization more simple. Results of computer simulations and pool experiments prove that the proposed multiuser underwater acoustic communication based on the multi-chirp rate exhibit well performance. Outfield experments carrie out in Xiamen Port show that using about 10 kHz bandwidth, four users could communicate at the same time with 425 bps with low BER and can match the UAC application.

Control of Inverted Pendulum Using Continuous Time Deadbeat Control

  • Lee, Ho-Jin;Kim, Seung-Youal;Lee, Jung-Kook;Kim, Jin-Yong;Lee, Seung-Hwan;Lee, Keum-Won;Lee, Jun-Mo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.510-513
    • /
    • 2005
  • Due to the asymptotic property, deadbeat control can hardly be applied to the continuous time system control. But some delay element method can deal such a problem. Besides delay element method, well-known digital deadbeat control can be used by the aid of some smoothing elements. In this paper, 2nd order smoothing element is used for the smoothing of the digital deadbeat controller. And this element is argumented to the plant, and so control problem is to control the argumented system digitally. We simulated this control system using Matlab language and finally apply this algorithm to the rotary inverted pendulum system.

  • PDF

Performance Analysis for Relay System of Fixed-Path Vehicle (고정 경로 차량의 중계기화에 대한 성능 분석)

  • Kim, Tae-Wook;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.51-55
    • /
    • 2015
  • In this paper, we proposed scheme that obtain diversity gain in the cooperative communication to mitigate, applied to the effects of fading in the vehicle communication. Relay used bus that can available in the city environment. In addition, we applied the double rayleigh fading environment so that can applied in real-environments. Therefore, proposed scheme through this paper applied to vehicle communication, user can acquire a high quality service and the operation efficiency of the network is improved. Finally, performance of the proposed protocol is analyzed in terms of bit error rate.

Swarm Intelligence-based Power Allocation and Relay Selection Algorithm for wireless cooperative network

  • Xing, Yaxin;Chen, Yueyun;Lv, Chen;Gong, Zheng;Xu, Ling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1111-1130
    • /
    • 2016
  • Cooperative communications can significantly improve the wireless transmission performance with the help of relay nodes. In cooperative communication networks, relay selection and power allocation are two key issues. In this paper, we propose a relay selection and power allocation scheme RS-PA-PSACO (Relay Selection-Power Allocation-Particle Swarm Ant Colony Optimization) based on PSACO (Particle Swarm Ant Colony Optimization) algorithm. This scheme can effectively reduce the computational complexity and select the optimal relay nodes. As one of the swarm intelligence algorithms, PSACO which combined both PSO (Particle Swarm Optimization) and ACO (Ant Colony Optimization) algorithms is effective to solve non-linear optimization problems through a fast global search at a low cost. The proposed RS-PA-PSACO algorithm can simultaneously obtain the optimal solutions of relay selection and power allocation to minimize the SER (Symbol Error Rate) with a fixed total power constraint both in AF (Amplify and Forward) and DF (Decode and Forward) modes. Simulation results show that the proposed scheme improves the system performance significantly both in reliability and power efficiency at a low complexity.

Lightweight and adaptable solution for security agility

  • Vasic, Valter;Mikuc, Miljenko;Vukovic, Marin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1212-1228
    • /
    • 2016
  • Secure communication is an important aspect of today's interconnected environments and it can be achieved by the use of cryptographic algorithms and protocols. However, many existing cryptographic mechanisms are tightly integrated into communication protocols. Issues emerge when security vulnerabilities are discovered in cryptographic mechanisms because their replacement would eventually require replacing deployed protocols. The concept of cryptographic agility is the solution to these issues because it allows dynamic switching of cryptographic algorithms and keys prior to and during the communication. Most of today's secure protocols implement cryptographic agility (IPsec, SSL/TLS, SSH), but cryptographic agility mechanisms cannot be used in a standalone manner. In order to deal with the aforementioned limitations, we propose a lightweight cryptographically agile agreement model, which is formally verified. We also present a solution in the Agile Cryptographic Agreement Protocol (ACAP) that can be adapted on various network layers, architectures and devices. The proposed solution is able to provide existing and new communication protocols with secure communication prerequisites in a straightforward way without adding substantial communication overhead. Furthermore, it can be used between previously unknown parties in an opportunistic environment. The proposed model is formally verified, followed by a comprehensive discussion about security considerations. A prototype implementation of the proposed model is demonstrated and evaluated.

The Study of Performance Evaluation of Train Communication Network for EMU (전동차 차량 네트웍 성능평가기술 연구)

  • Lee Su-Gil;Han Seong-Ho;Koo Dong-Hoe;Song Young-Soo
    • Proceedings of the KSR Conference
    • /
    • 2003.10c
    • /
    • pp.659-665
    • /
    • 2003
  • This paper presents a Train Communication Network simulator (TCNS) that can be used to evaluate the performance of TCN. TCN was accepted as the standard of the protocol for the communication network in trains. We carry out some simulation tests using the TCNS to show practical uses of the simulator. Results of some simulation tests are also reported. This paper presents a Train Communication Network simulator(TCNS) that can be used to evaluate the performance of TCN. TCN was accepted as the standard of the protocol for the communication network in trains. TCN of fieldbus was adopted as international standardization IEC 61375 in 1999. It has been operating on G7 train in korea. This paper developed TCNS(Train Communication Network simulator) as a simulator for performance evaluation. We can verify TCNS for preventing many kinds of occurring problems between the devices in data-communication. This study was developed TCNS as a simulator for the performance evaluation. We analyzed correlation between token, transmission data per paket and transmission speed of bus, through the TCNS, also analyzed result according to error rate of TCN. We carry out some simulation tests using the TCNS to show practical uses of the simulator. Results of some simulation tests are also reported.

  • PDF

A Distributed Coexistence Mitigation Scheme for IoT-Based Smart Medical Systems

  • Kim, BeomSeok
    • Journal of Information Processing Systems
    • /
    • v.13 no.6
    • /
    • pp.1602-1612
    • /
    • 2017
  • Since rapidly disseminating of Internet of Things (IoT) as the new communication paradigm, a number of studies for various applications is being carried out. Especially, interest in the smart medical system is rising. In the smart medical system, a number of medical devices are distributed in popular area such as station and medical center, and this high density of medical device distribution can cause serious performance degradation of communication, referred to as the coexistence problem. When coexistence problem occurs in smart medical system, reliable transmitting of patient's biological information may not be guaranteed and patient's life can be jeopardized. Therefore, coexistence problem in smart medical system should be resolved. In this paper, we propose a distributed coexistence mitigation scheme for IoT-based smart medical system which can dynamically avoid interference in coexistence situation and can guarantee reliable communication. To evaluate the performance of the proposed scheme, we perform extensive simulations by comparing with IEEE 802.15.4 MAC protocol which is a traditional low-power communication technology.

Location management using user mobility pattern in mobile IP and WCDMA network (Mobile IP 와 WCDMA 망에서의 사용자 이동 pattern 에 따른 location management)

  • Kim, Seo-Young;Kim, Jeong-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.229-232
    • /
    • 2005
  • Many kinds of communication systems will be co-existed in the next generation communication environment. Location management will be one of the most important strategies in the future communication network. Whether the user gets the service in any kind of communication system, it is required to know the location of the user properly and manages this location information efficiently. In this paper, mobile IP and WCDMA systems are considered as next generation communication systems. We improve the performance of communication in heterogeneous networks adjusting the conventional region-based location management strategy in homogeneous network. This strategy can be adjusted dynamically to the communication system on the basis of packet-to-mobility ratio (PMR) in mobile IP system or call-to-mobility ratio (CMR) in WCDMA system, lots of different system parameters, and movement pattern of the user. This can be also based on the performance analysis with considering signaling cost and database access cost.

  • PDF

Interference Coordination for Device-to-Device (D2D) under Multi-channel of Cellular Networks

  • Zulkifli, Aunee Azrina;Huynh, Thong;Kuroda, Kaori;Hasegawa, Mikio
    • Journal of Multimedia Information System
    • /
    • v.3 no.4
    • /
    • pp.135-140
    • /
    • 2016
  • To improve the throughput of Device-to-Device (D2D) communication, we focus on the scenario where D2D pair can reuse multi-channel of cellular communication. However, as sharing same channel with cellular communication can cause interference between D2D communication and cellular communication, a proper interference management is needed. In this paper, we propose interference-based channel allocation to select the channels to be used by D2D communication and a solution from game theory perspective to optimize the D2D communication throughput under multi-channel as well as guarantee the interference from it to cellular network. The simulation results verify the stability of the proposed method.

WiFi-Based Home IoT Communication System

  • Chen, Wenhui;Jeong, Sangho;Jung, Hoekyung
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.8-15
    • /
    • 2020
  • Internet-of-Things (IoT) technologies are used everywhere, and communication is one of its core and essential aspect. To solve the networking and communication of small IoT terminals, in this paper, a communication scheme based on low-cost WiFi is proposed, which also has the advantages of good compatibility and low power consumption. At the same time, it has a convenient one-key configuration mode, which reduces the technical requirements for operators. In this study, a communication protocol is designed that mainly aims at up to dozens of domestic IoT terminals, in which the amount of data is not large, data exchange is not high, and network is unstable. According to the alarm data, update data, and equipment or network fault, the protocol can respectively transmit in real time, regularly and repeatedly. This protocol is open and easy to integrate, and after cooperating with tiny encryption algorithm, information can be safely transmitted.