The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper considers the problem of synchronous and noise free information exchange in the low-end and mid-end mechatronic systems such as multi-axis 3D FDM printers. Problems which prevents the usage of common industrial technologies and protocols such as ModBus, CAN etc. are stated. Approach based on the usage of known standard interfaces present in general-purpose microcontrollers for their successful...
The problem of decision making accuracy increasing of control systems elements technical state is solved in this paper. The approach to quantitative assessment of diagnostic test realization result is offered. The areas of accurate decision making and uncertainty are defined. For removal of uncertainty the logical conditions analysis method is developed. This method is based on offered quantitative...
A routing algorithm based on Q-routing paradigm is proposed for ad-hoc dynamically changing networks. The technique derived from Full Echo approach is used to enhance exploration capacity and prevent instability of routing under high load conditions. The performance of routing is increased by random polling of neighbors according to the local estimates of the average delivery time in the network.
There are several groups of routing algorithms in dynamically changing networks developing every year. We introduce an additional parameter “Battery Life decrease” in the existing Q-Routing protocol. The Battery Life is reduced in direct proportion to the number of packets transmitted to the node. The efficiency of the Optimized Battery Life Q-Routing protocol is estimated by total loss of network...
This article is described to research of noise stability providing different methods of data communication net-works as a part of control systems. Importance and significance of redundancy encoding and feedback for pro-viding reliable information transfer between elements and devised of control systems are showing. The analytic methods of redundancy codes (Reed-Solomon and convolution) construction,...
Every day the popularity of 3D printing is growing. It is used in almost all fields of the modern science and techniques. Applications of this technology is widespread: from architecture and design, to Biomedicine and aerospace. Despite its popularity, the process of additive 3D printing usually takes a while. During this process we need to be sure that the printed object stays static, besides, we...
This paper considers the problem of managing and maintaining the quality in communication networks. The significance of the end-to-end quality control on all network layers is shown. The problem of projection of the quality of experience requirements posed by customers on the plane of quality of service metrics is stated. Multilevel quality relationship model corresponding to the current state-of-the-art...
This paper considers the problem of network monitoring and management in distributed wireless industrial control systems. The urgency of the implementation of management and monitoring systems in such networks is stated. The possibility of using network management architectures known from general purpose networks is shown. Usage of a mixed approach to realize monitoring and management system in wireless...
The article describes state-of-the-art models and methods to estimate probabilistic and temporal characteristics of distributed control systems (DCS), based on industrial real-time networks, or fleldbuses. Conducted review and synthesis of recent publications shows the lack of information about using of integral criteria for DCS performance evaluation. Being implemented at the example of LonWorks...
This report analyses security threat of a covert channels to popular P2P networks and their support protocols, like Kademlia, Mainline DHT. This kind of a threat was almost unattended by majority of researchers, despite its considerable potential dangerousness. Using a new, comprehensive approach to the analysis of the covert channels, based on previously proposed generalized model of covert channel,...
The problem of countering one of most dangerous unconventional information security threats for modern industrial control systems covert channels is considered. A universal method of countering such a threat based on earlier unknown formal condition of existence of covert channels is proposed. An illustration of the method to counter covert channels in a real industrial control system is given.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.