This paper presents a recovery algorithm for self-stabilizing communication protocols. It first describes some concepts and a formal description method for the algorithm. Then it proposes the algorithm procedures, pro...This paper presents a recovery algorithm for self-stabilizing communication protocols. It first describes some concepts and a formal description method for the algorithm. Then it proposes the algorithm procedures, proves its correctness and analyses its complexity. Finally, it also verifies the availability and efficiency of the algorithm by illustrating an example protocol with multi-processes.展开更多
The prerequisite for the existing protocols' correctness is that protocols can be normally operated under the normal conditions, rather than dealing with abnormal conditions. In other words, protocols with the fau...The prerequisite for the existing protocols' correctness is that protocols can be normally operated under the normal conditions, rather than dealing with abnormal conditions. In other words, protocols with the fault-tolerance can not be provided when some fault occurs. This paper discusses the self fault-tolerance of protocols. It describes some concepts and methods for achieving self fault-tolerance of protocols. Meanwhile, it provides a case study, investigates a typical protocol that does not satisfy the self fault-tolerance, and gives a new redesign version of this existing protocol using the proposed approach.展开更多
This paper discusses the algorithms for achieving global states and self-stabilizationfor communication protocols. It first describes a primary algorithm including its suitability forachieving global states and limita...This paper discusses the algorithms for achieving global states and self-stabilizationfor communication protocols. It first describes a primary algorithm including its suitability forachieving global states and limitation of self-stabilization for communication protocols, and thenpresents an improved algorithm that can be suitable to achieve global states and can be also usedto self-stabilizing communication protocols. Filially, it gives the proof of correctness and analysis ofcomplexity of the improved algorithm, and verifies its availability and efficiency by illustrating anexample protocol.展开更多
To deeply exploit the mechanisms of ant colony optimization (ACO) applied to develop routing in mobile ad hoe networks (MANETS),some existing representative ant colony routing protocols were analyzed and compared....To deeply exploit the mechanisms of ant colony optimization (ACO) applied to develop routing in mobile ad hoe networks (MANETS),some existing representative ant colony routing protocols were analyzed and compared.The analysis results show that every routing protocol has its own characteristics and competitive environment.No routing protocol is better than others in all aspects.Therefore,based on no free lunch theory,ant routing protocols were decomposed into three key components:route discovery,route maintenance (including route refreshing and route failure handling) and data forwarding.Moreover,component based ant routing protocol (CBAR) was proposed.For purpose of analysis,it only maintained basic ant routing process,and it was simple and efficient with a low overhead.Subsequently,different mechanisms used in every component and their effect on performance were analyzed and tested by simulations.Finally,future research strategies and trends were also summarized.展开更多
Combat effectiveness of unmanned aerial vehicle(UAV)formations can be severely affected by the mission execution reliability.During the practical execution phase,there are inevitable risks where UAVs being destroyed o...Combat effectiveness of unmanned aerial vehicle(UAV)formations can be severely affected by the mission execution reliability.During the practical execution phase,there are inevitable risks where UAVs being destroyed or targets failed to be executed.To improve the mission reliability,a resilient mission planning framework integrates task pre-and re-assignment modules is developed in this paper.In the task pre-assignment phase,to guarantee the mission reliability,probability constraints regarding the minimum mission success rate are imposed to establish a multi-objective optimization model.And an improved genetic algorithm with the multi-population mechanism and specifically designed evolutionary operators is used for efficient solution.As in the task-reassignment phase,possible trigger events are first analyzed.A real-time contract net protocol-based algorithm is then proposed to address the corresponding emergency scenario.And the dual objective used in the former phase is adapted into a single objective to keep a consistent combat intention.Three cases of different scales demonstrate that the two modules cooperate well with each other.On the one hand,the pre-assignment module can generate high-reliability mission schedules as an elaborate mathematical model is introduced.On the other hand,the re-assignment module can efficiently respond to various emergencies and adjust the original schedule within a millisecond.The corresponding animation is accessible at bilibili.com/video/BV12t421w7EE for better illustration.展开更多
To solve the problem of providing the best initial situation for terminal guidance when multiple missiles intercept multiple targets,a group cooperative midcourse guidance law(GCMGL)considering time-to-go is proposed....To solve the problem of providing the best initial situation for terminal guidance when multiple missiles intercept multiple targets,a group cooperative midcourse guidance law(GCMGL)considering time-to-go is proposed.Firstly,a threedimensional(3D)guidance model is established and a cooperative trajectory shaping guidance law is given.Secondly,for estimating the unknown target maneuvering acceleration,an adaptive disturbance observer(ADO)is designed,combining finitetime theory with a radial basis function(RBF)neural network,and the convergence of the estimation error is proven using Lyapunov stability theory.Then,to ensure time-to-go cooperation among missiles within the same group and across different groups,the group consensus protocols of virtual collision point mean and the inter-group cooperative consensus protocol are designed respectively.Based on the group consensus protocols,the virtual collision point cooperative guidance law is given,and the finite-time convergence is proved by Lyapunov stability theory.Simultaneously,combined with trajectory shaping guidance law,virtual collision point cooperative guidance law and the intergroup cooperative consensus protocol,the design of GCMGL considering time-to-go is given.Finally,numerical simulation results show the effectiveness and the superiority of the proposed GCMGL.展开更多
A task allocation problem for the heterogeneous unmanned aerial vehicle (UAV) swarm in unknown environments is studied in this paper.Considering that the actual mission environment information may be unknown,the UAV s...A task allocation problem for the heterogeneous unmanned aerial vehicle (UAV) swarm in unknown environments is studied in this paper.Considering that the actual mission environment information may be unknown,the UAV swarm needs to detect the environment first and then attack the detected targets.The heterogeneity of UAVs,multiple types of tasks,and the dynamic nature of task environment lead to uneven load and time sequence problems.This paper proposes an improved contract net protocol (CNP) based task allocation scheme,which effectively balances the load of UAVs and improves the task efficiency.Firstly,two types of task models are established,including regional reconnaissance tasks and target attack tasks.Secondly,for regional reconnaissance tasks,an improved CNP algorithm using the uncertain contract is developed.Through uncertain contracts,the area size of the regional reconnaissance task is determined adaptively after this task assignment,which can improve reconnaissance efficiency and resource utilization.Thirdly,for target attack tasks,an improved CNP algorithm using the fuzzy integrated evaluation and the double-layer negotiation is presented to enhance collaborative attack efficiency through adjusting the assignment sequence adaptively and multi-layer allocation.Finally,the effectiveness and advantages of the improved method are verified through comparison simulations.展开更多
Despite numerous research investigations to understand the influences of various structural parameters,to the authors'knowledge,no research has been the effect of different angles of incidence on stab response and...Despite numerous research investigations to understand the influences of various structural parameters,to the authors'knowledge,no research has been the effect of different angles of incidence on stab response and performance of different types of protective textiles.Three distinct structures of 3D woven textiles and 2D plain weave fabric made with similar high-performance fiber and areal density were designed and manufactured to be tested.Two samples,one composed of a single and the other of 4-panel layers,from each fabric type structure,were prepared,and tested against stabbing at[0○],[22.5○],and[45○]angle of incidence.A new stabbing experimental setup that entertained testing of the specimens at various angles of incidence was engineered and utilized.The stabbing bench is also equipped with magnetic sensors and a UK Home Office Scientific Development Branch(HOSDB)/P1/B sharpness engineered knives to measure the impact velocity and exerted impact energy respectively.A silicon compound was utilized to imprint the Back Face Signature(BFS)on the backing material after every specimen test.Each silicon print was then scanned,digitized,and precisely measured to evaluate the stab response and performance of the specimen based on different performance variables,including Depth of Trauma(DOT),Depth of Penetration(DOP),and Length of Penetration(LOP).Besides,the post-impact surface failure modes of the fabrics were also measured using Image software and analyzed at the microscale level.The results show stab angle of incidence greatly influences the stab response and performance of protective textiles.The outcome of the study could provide not only valuable insights into understanding the stab response and capabilities of protective textiles under different angle of incidence,but also provide valuable information for protective textile manufacturer,armor developer and stab testing and standardizing organizations to consider the angle of incidence while developing,testing,optimizing,and using protective textiles in various applications.展开更多
The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for...The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for IIoT in cloud-edge envi-ronment with three modes of 5G.For 5G based IIoT,the time sensitive network(TSN)service is introduced in transmission network.A 5G logical TSN bridge is designed to transport TSN streams over 5G framework to achieve end-to-end configuration.For a transmission control protocol(TCP)model with nonlinear disturbance,time delay and uncertainties,a robust adaptive fuzzy sliding mode controller(AFSMC)is given with control rule parameters.IIoT workflows are made up of a series of subtasks that are linked by the dependencies between sensor datasets and task flows.IIoT workflow scheduling is a non-deterministic polynomial(NP)-hard problem in cloud-edge environment.An adaptive and non-local-convergent particle swarm optimization(ANCPSO)is designed with nonlinear inertia weight to avoid falling into local optimum,which can reduce the makespan and cost dramatically.Simulation and experiments demonstrate that ANCPSO has better performances than other classical algo-rithms.展开更多
Population Protocols是一种受生物启发的计算模型,能够表示无线网络中数量庞大但计算能力弱的多组件间的交互,它为无线传感器网络提供了一种可计算推理的理论框架。将Population Protocol理论引入到RFID识别协议中,提出了RFID识别协议...Population Protocols是一种受生物启发的计算模型,能够表示无线网络中数量庞大但计算能力弱的多组件间的交互,它为无线传感器网络提供了一种可计算推理的理论框架。将Population Protocol理论引入到RFID识别协议中,提出了RFID识别协议系统模型验证框架;构建了标签与阅读器交互产生的状态变迁模型;最后用spin模型检测工具和LTL线性时序逻辑验证了弱公平条件下该模型的自稳定性,为分析与验证无线传感器网络中协议的正确性提供了一种行之有效的方法。展开更多
传统TCP(transmission control protocol)本是为有线网络设计,它假设包丢失全是由网络拥塞引起,这个假设不能适应于MANET (mobile ad hoc network),因为MANET 中除了拥塞丢包以外,还存在由于较高比特误码率、路由故障等因素引起的丢包现...传统TCP(transmission control protocol)本是为有线网络设计,它假设包丢失全是由网络拥塞引起,这个假设不能适应于MANET (mobile ad hoc network),因为MANET 中除了拥塞丢包以外,还存在由于较高比特误码率、路由故障等因素引起的丢包现象.当出现非拥塞因素丢包时,传统 TCP 将错误地触发拥塞控制,从而引起TCP 性能低下.任何改进机制都可以分为发现问题和解决问题两个阶段.首先概括了 MANET 中影响 TCP 性能的若干问题;然后针对发现问题和解决问题两个阶段,详细地对每一阶段中存在的各种可行方法进行了分类、分析和比较;最后指出了 MANET 中 TCP 性能优化的研究方向.展开更多
基金National Natural Science Foundation of China and NSF of Hubei Province.
文摘This paper presents a recovery algorithm for self-stabilizing communication protocols. It first describes some concepts and a formal description method for the algorithm. Then it proposes the algorithm procedures, proves its correctness and analyses its complexity. Finally, it also verifies the availability and efficiency of the algorithm by illustrating an example protocol with multi-processes.
基金This project was supported by the National Natural Science Foundation of China and the Natural Science Foundation of Hubei Prov
文摘The prerequisite for the existing protocols' correctness is that protocols can be normally operated under the normal conditions, rather than dealing with abnormal conditions. In other words, protocols with the fault-tolerance can not be provided when some fault occurs. This paper discusses the self fault-tolerance of protocols. It describes some concepts and methods for achieving self fault-tolerance of protocols. Meanwhile, it provides a case study, investigates a typical protocol that does not satisfy the self fault-tolerance, and gives a new redesign version of this existing protocol using the proposed approach.
文摘This paper discusses the algorithms for achieving global states and self-stabilizationfor communication protocols. It first describes a primary algorithm including its suitability forachieving global states and limitation of self-stabilization for communication protocols, and thenpresents an improved algorithm that can be suitable to achieve global states and can be also usedto self-stabilizing communication protocols. Filially, it gives the proof of correctness and analysis ofcomplexity of the improved algorithm, and verifies its availability and efficiency by illustrating anexample protocol.
基金Project(61225012)supported by the National Science Foundation for Distinguished Young Scholars of ChinaProjects(61070162,71071028,70931001)supported by the National Natural Science Foundation of China+4 种基金Project(20120042130003)supported by the Specialized Research Fund of the Doctoral Program of Higher Education for the Priority Development Areas,ChinaProjects(20100042110025,20110042110024)supported by the Specialized Research Fund for the Doctoral Program of Higher Education,ChinaProject(2012)supported by the Specialized Development Fund for the Internet of Things from the Ministry of Industry and Information Technology of ChinaProject(N110204003)supported by the Fundamental Research Funds for the Central Universities of ChinaProject(L2013001)supported by the Scientific Research Fund of Liaoning Provincial Education Department,China
文摘To deeply exploit the mechanisms of ant colony optimization (ACO) applied to develop routing in mobile ad hoe networks (MANETS),some existing representative ant colony routing protocols were analyzed and compared.The analysis results show that every routing protocol has its own characteristics and competitive environment.No routing protocol is better than others in all aspects.Therefore,based on no free lunch theory,ant routing protocols were decomposed into three key components:route discovery,route maintenance (including route refreshing and route failure handling) and data forwarding.Moreover,component based ant routing protocol (CBAR) was proposed.For purpose of analysis,it only maintained basic ant routing process,and it was simple and efficient with a low overhead.Subsequently,different mechanisms used in every component and their effect on performance were analyzed and tested by simulations.Finally,future research strategies and trends were also summarized.
基金supported by the National Key Research and Development Plan(Grant No.2021YFB3302501)the National Natural Science Foundation of China(Grant Nos.12102077,12161076,U2241263).
文摘Combat effectiveness of unmanned aerial vehicle(UAV)formations can be severely affected by the mission execution reliability.During the practical execution phase,there are inevitable risks where UAVs being destroyed or targets failed to be executed.To improve the mission reliability,a resilient mission planning framework integrates task pre-and re-assignment modules is developed in this paper.In the task pre-assignment phase,to guarantee the mission reliability,probability constraints regarding the minimum mission success rate are imposed to establish a multi-objective optimization model.And an improved genetic algorithm with the multi-population mechanism and specifically designed evolutionary operators is used for efficient solution.As in the task-reassignment phase,possible trigger events are first analyzed.A real-time contract net protocol-based algorithm is then proposed to address the corresponding emergency scenario.And the dual objective used in the former phase is adapted into a single objective to keep a consistent combat intention.Three cases of different scales demonstrate that the two modules cooperate well with each other.On the one hand,the pre-assignment module can generate high-reliability mission schedules as an elaborate mathematical model is introduced.On the other hand,the re-assignment module can efficiently respond to various emergencies and adjust the original schedule within a millisecond.The corresponding animation is accessible at bilibili.com/video/BV12t421w7EE for better illustration.
基金supported by the National Natural Science Foundation of China(62003264).
文摘To solve the problem of providing the best initial situation for terminal guidance when multiple missiles intercept multiple targets,a group cooperative midcourse guidance law(GCMGL)considering time-to-go is proposed.Firstly,a threedimensional(3D)guidance model is established and a cooperative trajectory shaping guidance law is given.Secondly,for estimating the unknown target maneuvering acceleration,an adaptive disturbance observer(ADO)is designed,combining finitetime theory with a radial basis function(RBF)neural network,and the convergence of the estimation error is proven using Lyapunov stability theory.Then,to ensure time-to-go cooperation among missiles within the same group and across different groups,the group consensus protocols of virtual collision point mean and the inter-group cooperative consensus protocol are designed respectively.Based on the group consensus protocols,the virtual collision point cooperative guidance law is given,and the finite-time convergence is proved by Lyapunov stability theory.Simultaneously,combined with trajectory shaping guidance law,virtual collision point cooperative guidance law and the intergroup cooperative consensus protocol,the design of GCMGL considering time-to-go is given.Finally,numerical simulation results show the effectiveness and the superiority of the proposed GCMGL.
基金National Natural Science Foundation of China (12202293)Sichuan Science and Technology Program (2023NSFSC0393,2022NSFSC1952)。
文摘A task allocation problem for the heterogeneous unmanned aerial vehicle (UAV) swarm in unknown environments is studied in this paper.Considering that the actual mission environment information may be unknown,the UAV swarm needs to detect the environment first and then attack the detected targets.The heterogeneity of UAVs,multiple types of tasks,and the dynamic nature of task environment lead to uneven load and time sequence problems.This paper proposes an improved contract net protocol (CNP) based task allocation scheme,which effectively balances the load of UAVs and improves the task efficiency.Firstly,two types of task models are established,including regional reconnaissance tasks and target attack tasks.Secondly,for regional reconnaissance tasks,an improved CNP algorithm using the uncertain contract is developed.Through uncertain contracts,the area size of the regional reconnaissance task is determined adaptively after this task assignment,which can improve reconnaissance efficiency and resource utilization.Thirdly,for target attack tasks,an improved CNP algorithm using the fuzzy integrated evaluation and the double-layer negotiation is presented to enhance collaborative attack efficiency through adjusting the assignment sequence adaptively and multi-layer allocation.Finally,the effectiveness and advantages of the improved method are verified through comparison simulations.
文摘Despite numerous research investigations to understand the influences of various structural parameters,to the authors'knowledge,no research has been the effect of different angles of incidence on stab response and performance of different types of protective textiles.Three distinct structures of 3D woven textiles and 2D plain weave fabric made with similar high-performance fiber and areal density were designed and manufactured to be tested.Two samples,one composed of a single and the other of 4-panel layers,from each fabric type structure,were prepared,and tested against stabbing at[0○],[22.5○],and[45○]angle of incidence.A new stabbing experimental setup that entertained testing of the specimens at various angles of incidence was engineered and utilized.The stabbing bench is also equipped with magnetic sensors and a UK Home Office Scientific Development Branch(HOSDB)/P1/B sharpness engineered knives to measure the impact velocity and exerted impact energy respectively.A silicon compound was utilized to imprint the Back Face Signature(BFS)on the backing material after every specimen test.Each silicon print was then scanned,digitized,and precisely measured to evaluate the stab response and performance of the specimen based on different performance variables,including Depth of Trauma(DOT),Depth of Penetration(DOP),and Length of Penetration(LOP).Besides,the post-impact surface failure modes of the fabrics were also measured using Image software and analyzed at the microscale level.The results show stab angle of incidence greatly influences the stab response and performance of protective textiles.The outcome of the study could provide not only valuable insights into understanding the stab response and capabilities of protective textiles under different angle of incidence,but also provide valuable information for protective textile manufacturer,armor developer and stab testing and standardizing organizations to consider the angle of incidence while developing,testing,optimizing,and using protective textiles in various applications.
文摘The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for IIoT in cloud-edge envi-ronment with three modes of 5G.For 5G based IIoT,the time sensitive network(TSN)service is introduced in transmission network.A 5G logical TSN bridge is designed to transport TSN streams over 5G framework to achieve end-to-end configuration.For a transmission control protocol(TCP)model with nonlinear disturbance,time delay and uncertainties,a robust adaptive fuzzy sliding mode controller(AFSMC)is given with control rule parameters.IIoT workflows are made up of a series of subtasks that are linked by the dependencies between sensor datasets and task flows.IIoT workflow scheduling is a non-deterministic polynomial(NP)-hard problem in cloud-edge environment.An adaptive and non-local-convergent particle swarm optimization(ANCPSO)is designed with nonlinear inertia weight to avoid falling into local optimum,which can reduce the makespan and cost dramatically.Simulation and experiments demonstrate that ANCPSO has better performances than other classical algo-rithms.
基金Supported by the National Natural Science Foundation of China under Grant Nos.6047207660673178+3 种基金60434030(国家自然科学基金)the National Grand Fundamental Research973Program of China under Grant No.2006CB303007(国家重点基础研究发展规划(973))the National High-Tech Research and Development Plan of China under Grant.Nos.2006AA01Z2182006AA01Z215(国家高技术研究发展计划(863))