IEEE 1588 for clock synchronization in industrial IoT and related applications: A review on contributing technologies, protocols and enhancement methodologies
Precise time synchronization becomes a vital constituent due to the rigorous needs of
several time-sensitive applications. The clock synchronization protocol is one of the …
several time-sensitive applications. The clock synchronization protocol is one of the …
OpenIGTLink: an open network protocol for image‐guided therapy environment
Background With increasing research on system integration for image‐guided therapy (IGT),
there has been a strong demand for standardized communication among devices and …
there has been a strong demand for standardized communication among devices and …
Wireless network cloud: Architecture and system requirements
Y Lin, L Shao, Z Zhu, Q Wang… - IBM Journal of …, 2010 - ieeexplore.ieee.org
With the growth of the mobile communication network, from second-generation to third-
generation or fourth-generation networks, technologists in the mobile industry continue to …
generation or fourth-generation networks, technologists in the mobile industry continue to …
Multi-camera real-time three-dimensional tracking of multiple flying animals
Automated tracking of animal movement allows analyses that would not otherwise be
possible by providing great quantities of data. The additional capability of tracking in real …
possible by providing great quantities of data. The additional capability of tracking in real …
Estimators for time synchronization—survey, analysis, and outlook
Time (or clock) synchronization is a large and vital field of research, as synchronization is a
precondition for many applications. A few example applications are distributed data …
precondition for many applications. A few example applications are distributed data …
Direct discriminative pattern mining for effective classification
The application of frequent patterns in classification has demonstrated its power in recent
studies. It often adopts a two-step approach: frequent pattern (or classification rule) mining …
studies. It often adopts a two-step approach: frequent pattern (or classification rule) mining …
Effects of augmented reality on the performance of teleoperated industrial assembly tasks in a robotic embodiment
F Brizzi, L Peppoloni, A Graziano… - … on Human-Machine …, 2017 - ieeexplore.ieee.org
Teleoperation in robotic embodiments allows operators to perform and program
manipulation tasks with better accuracy, dexterity, and visualization than what is possible …
manipulation tasks with better accuracy, dexterity, and visualization than what is possible …
Resilient control of cyber-physical system using nonlinear encoding signal against system integrity attacks
In this article, we propose an attack-resilient control structure for a cyber-physical system
(CPS) to enhance the CPS security against stealthy system integrity attacks that manipulate …
(CPS) to enhance the CPS security against stealthy system integrity attacks that manipulate …
Feasibility of time-synchronization attacks against PMU-based state estimation
The emerging measurement technology of phasor measurement units (PMUs) makes it
possible to estimate the state of electrical grids in real time, thus opening the way to new …
possible to estimate the state of electrical grids in real time, thus opening the way to new …
On the use of IEEE 1588 in existing IEC 61850-based SASs: Current behavior and future challenges
The International Electrotechnical Commission (IEC) 61850 standard describes the
communication inside the substation automation system (SAS) setting the base for new …
communication inside the substation automation system (SAS) setting the base for new …