首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
On the underground booster and leakage of the city water network pipe,a remote leakage monitoring and locating system based on GSM/GPRS is developed .The parameters of tap water pipe network ,i.e., flow, velocity, direction and pressure are collected by monitor terminal ,the data transmission is realized by GSM/GPRS network .Aiming at the feature of the underground booster and leakage of the water pipe, with the GIS technology and the signal processing methods ,such as negative P wave and flow detecting, accurate and prompt positioning of leakage location can be detected. The system can not only realize the leakage detection of low cost, city area, networking by GPRS network but also provide a emergency platform of tap water pipe network .The system has been used in practical tap water pipe network with excellent results.  相似文献   

2.
物联网技术在小麦气象灾害监控诊断系统中的应用研究   总被引:2,自引:1,他引:1  
针对小麦生长周期长,容易遭受多种气象灾害的情况,设计了基于物联网的小麦气象灾害诊断系统。本系统根据多年农学实验研究成果,通过建立小麦气象灾害诊断指标体系规范,并采用传感器技术、网络传输技术、Webservice技术和Socket调用技术等集成,搭建了基于小麦生长环境实时监测数据的苗情和气象灾害诊断平台。该平台具有异地数据资源共享、分布式管理的功能,能在多种网络通信环境下实现苗情监控和灾害诊断,为小麦生产科学管理、防灾减灾提供了有力的技术支持。  相似文献   

3.
Presently, ECG monitor encounters the trend of miniaturizing, intelligentizing and networking. Short distance and limited channels are shortcomings of the existed telemetric ECG (Electrocardiograph) monitoring system, while the existed remote monitoring system has the disadvantages of high cost and low Data Transfer Rate. Furthermore, neither of these two systems can implement real-time monitoring on the spot. So, an embedded ECG Monitor based on Linux, which successfully solves these problems, is introduced. With embedded system technique, this embedded monitor, which can not only realize real-time monitoring on the spot, but also analyse the ECG data, has the advantages of low cost, small volume, light weight, low power, high stability, powerful networking function and so on. And by communicating through Internet, which has the features of low cost, high data transfer rate and good expandability, it can also send ECG data to monitoring center in order to achieve long-term monitoring. The development of this monitor provides a new solution for medical instruments' implementation and networking, and is of certain reference value.  相似文献   

4.
The security of stream cipher, which is known as one of the main cipher techniques, dependents completely on the quality of generated pseudo-stochastic sequences. Chaotic systems can produce the pseudo-stochastic sequences with the properties of excessive dependence on initial conditions and the difficulty in forecasting, therefore, these systems are suitable to the stream cipher. A new encryption algorithm is proposed by analyzing the principle of the chaos encryption algorithm based on logistic formula. Moreover, the security and performance of the proposed algorithm is also estimated. Finally, an example is given to demonstrate our method via the Visual C++.  相似文献   

5.
As the important method and instrument of agile manufacture,the technology of distributed collaborative design and manufacturing has become the hotspot of manufacturing. The basic concept and key technologies of IP_VPN are introduced in this paper,and a collaborative design network model based on IP_VPN is presented. Distributed collaborative design is a multi_user,multitask involved system, which is consisted of lots of collaborative processs,so the network security is the key of distributed collaborative design. We research on the security of collaborative design network based on IP_VPN, hence get a conclusion:we can construct an economical?practical and secure collaborative design network system by the application of data encryption,user authentication and access control based on the role,etc.  相似文献   

6.
Since there exists multi-protocol attack when several security protocols are co-executed in a computer network, an automatic detection system for multi-protocol attack (ADMA) is proposed. The system is composed of two parts named protocol search subsystem and attack verification subsystem. According to the consistency condition of the type of encrypted messages between the target protocol and the secondary protocol, the protocol search subsystem can automatically search for the candidate secondary protocols, which may be used to attack the target protocol. By improving the SAT-based model checking, attack verification subsystem can automatically verify whether multi-protocol attack exists between the target protocol and the candidate secondary protocols or not. The experiment results show that ADMA system can implement automatic detection for multi-protocol attack, and some new multi-protocol attacks are found in the detection.  相似文献   

7.
This paper proposes an improvement for the traditional Optical Algorithm, and presents a new way to image segmentation in a complex background. In addition, combined with the neural network, the system can locate the possible human faces successfully by means of two-step location model. In our system, the searching and locating of the human face is the most important stage. According to this, the authors adopt the two-step way to run, firstly they take up the segmentation of the candidate human face areas and then the accurate face locating based on the neural network is used. This algorithm is fast and robust. Experimental results with real scene images are given out there, and all these prove that two-step method gains many advantages in the course of human face location with motion information, such as real-time, robustness and practicality. In addition, the proposed system is also the fundamental and important part of the perfect human face recognition system.  相似文献   

8.
9.
Intrusion detection system is an important component of the computer and information security framework. Its main goal is to differentiate between normal activities of the system and behaviors that can be classified as suspicious or intrusive, and its main challenge is to efficiently detect intrusion detection behaviors for reducing false positive rate and false negative rate. In view of the disadvantages of the existing intrusion detection methods, fuzzy c-means(FCM) clustering method is used to analyze intrusion detection data in order to detect anomaly network behavior patterns. Experimental results on the CUP99 data set data show that this method can not only feasible but also improve the accuracy and efficiency.  相似文献   

10.
In order to reliably monitor unexpected tool failure and prevent workpiece or machine tool from possible damages in batch machining, a tool breakage on-line monitoring method based on power information and cross-correlation algorithm is proposed. In this method, wavelet coefficients of spindle-power signal are used as the characteristic vector of machining information, and then the vector sequence extracted from a normal machining process via Mallat wavelet is defined as the reference template for monitoring cutting tool condition. In batch machining, real-time characteristic vector of the workpiece in machining process is extracted via an improved real-time wavelet algorithm. The correlation of two vector sub-sequences within a sampling time window, which is described by generalized cross-correlation coefficient, decreases apparently when the tool is broken. The generalized cross-correlation coefficient is defined as tool condition index (TCI), and tool breakage can be detected by monitoring the TCI with a threshold value. Experiments show that the method can accurately identify tool breakage failures in normal machining condition, and thus it is practical.  相似文献   

11.
In view of the actuality of the feeding oil pum monitoring,the network technology,the database technology and the Dot Net remote technology are integrated nimbly to construct the remote condition monitoring system for feeding oil pump,which has many functions such as the real-time data monitoring and alarm,real-time monitor data storage remote monitoring,network data sharing,fault analysis,and so on.The whole construction design of the system and the realization of its sub function are given.The worker's intensity of labor,the maintenance cost and the accident occurrence rate of the feeding oil pum were dramatically reduced when the system was applied to the oil storeroom successfully.  相似文献   

12.
A micro transfusion system faced to community hospital is presented.The system has real-time monitoring and alarming(when there exit abnormal instance or the transfusion is completed) functions,which well settle the inconvenience of venous transfusion in clinic,and increase the security and efficiency.In this system,the Photoelectric sensor technology and signal processing technology are applied to acquire the reliable detection of the transfusion.And microcontroller(MCU) and digital display technology are employed to count,display and monitor the quantity and velocity of the liquid,and alarm when there has no liquid or a jam.Moreover,the network technology is also added to the system to realize tele-monitor.At last,the authors briefly introduce the status of the system's application,and point out system's flaws and the main work in the following research.  相似文献   

13.
为满足贮运食品对冷链温度实时监测的需要,研究设计了一种基于ZigBee的冷链温度监测系统。该系统利用SZ05模块构建ZigBee网络,实现冷链温度的实时采集与传输,协调器节点采用ATmega128作为控制器,路由节点采用ATmega16作为控制器,分别设计出两种节点的硬、软件。经12 h组网通信测试,结果表明,该系统的硬件结构简单、体积小、设备可靠性高,组成的无线传感网络能够实现对温度准确、稳定、可靠的实时监测,对监控冷链温度、保证冷链中易腐食品品质和食用的安全性可起到重要作用。  相似文献   

14.
基于物联网技术的农业气象观测系统的研究与设计   总被引:2,自引:2,他引:0  
为了更好地实现农业气象数据观测的实时、可靠、准确性,研究设计了一种基于物联网的农业气象观测系统。该系统在Eclipse的开发环境中,利用B/S模式和专业数据库实现数据采集与应用实时结合的功能,解决了过去气象部门数据与应用软件分离,监测、分析功能实时性不高的问题。同时,后台应用软件利用前端无线传感网络的实时数据,并结合专家知识自动向用户推送农业气象预报信息。综上所述,研究设计的农业气象观测系统信息推送准确及时,极大地满足了现代农业对气象服务精准化的需求。  相似文献   

15.
The design of virtual instrument for automobile based on PC/104 has been presented by comparing with the traditional auto meter. The paper focuses on the development environment, system construction and operation principle. The data of the virtual instrument is transported by CAN bus, and this system can monitor in real-time, display in digit and fire the alarm to the super-speed, save the record.  相似文献   

16.
The communication of the application program among work tations of 3+ network is realized by the shared file on harddisk of the network server,which does not support the application program' s real-time communication among the network workstations nor supplies software or hardware needed for information refreshing, nor fits for field multibatch continuous real-time transmission and processing of working condition information, by using the NETBIOS function call method, the real-time communication among network workstations is realized and a power plant working information background real-time communication and data processing system is developed which effectively traces working condition from tow 200 MW power plant generators, altogether 321 points from a cycling detecting system and 78 binary points for broadcasting the information to other workstations,and realizes a complx display of 14 working condition graphs and a real-time data simulation graph.  相似文献   

17.
汽车转弯自动照明控制系统数据采集滤波方法   总被引:1,自引:0,他引:1  
为了减少汽车转弯自动照明控制系统数据滤波处理中的延时,在滑动中值滤波方法基础上,提出了一种带补偿的限幅滑动中值滤波算法,通过补偿的方式跟随信号的变化趋势。该算法通过2个步骤完成滤波,先对数据进行带补偿方式的限幅处理,再进行滑动中值滤波处理。该算法综合了滑动中值滤波法的实时性以及限幅滤波法对偶然性干扰滤除的有效性,实现更准确的滤波。仿真与实测结果表明,与滑动中值滤波方法相比较,改进后的算法滤波能够实时地滤除数据中的干扰,处理时间可减少62%,滤波效果较好,且速度信号的数据滞后时间较短,实时性较高,满足系统设计要求。  相似文献   

18.
李丽丽  施伟 《中国农学通报》2011,27(33):278-282
为了有效实施农业大棚温度动态实时监控,提出采用Zigbee无线网络和Linux嵌入式操作系统设计大棚温度监控系统。系统采用C/S结构设计,分为下位机和上位机2部分。下位机系统分为温度采集节点和汇聚节点,温度采集节点完成大棚内不同地点的温度信息采集和无线数据传输功能;汇聚节点除了完成数据中继任务外,还可根据上位机反馈的控制指令完成排风扇的打开或电热系统的开启工作;服务器端的上位机系统完成数据的储存和分析,并根据分析结果完成对下位机系统的实时控制。实践证明,该系统可精确监控大棚温度,有效降低布线成本,有助于降低劳动成本和提高农作物产量。  相似文献   

19.
GSM技术在棉田水分监测中的应用   总被引:1,自引:0,他引:1  
利用GSM无线通讯技术实时地采集棉田水分数据,然后将水分监测数据发送到集中监控中心,由上位机决策支持系统进行相应的数据处理,决策结果以GSM短消息方式发送到用户手机上,实现了水分信息的动态管理。  相似文献   

20.
基于无线传感器网络的智能粮仓监控系统   总被引:1,自引:0,他引:1  
刘宇静 《粮食储藏》2008,37(3):30-33
分析了目前粮仓监控的现状,设计了一个基于无线传感器网络监控系统体系结构.设计了系统的GSM通信模块,给出了系统数据传输数据的设计,及系统端口初始化的核心代码,设计了系统智能监控流程,从而解决了系统开发运行的难题.最后通过系统的试运行,验证了系统的设计与开发思路的正确性.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号