期刊文献+

基于无线网络的血液冷藏温度监控系统的设计

The Design of Wireless Network Temperature Monitoring System for Blood Refrigeration
下载PDF
导出
摘要 针对血液温度监控的特殊情况,利用Delphi,采用Windows API函数配合多线程技术对血站冰箱温度实时监控,通过通讯接口在上位机端完成现场数据实时采集与动态图形显示,同时将采集到的数据存储在SQL Server数据库中,实现血站冰箱温度网络化系统管理,可解决血站对冷藏设备温度手工控制的问题。 For the special situations of blood temperature monitoring, Delphi as well as Windows API multi-thread technology are used to have a realtime monitoring on the refrigerator tempera- ture in the blood station. Through the communication interface on the PC end, realtime on-site data are collected and dynamic graphical data are displayed. At the same time, the collected data is stored in the SQL Server database ~ the refrigerator temperature in the blood station can be man- aged by network system;the current problem of the manual control of the cold storage facility temperature can be solved.
作者 郑向阳
出处 《唐山学院学报》 2013年第3期91-93,共3页 Journal of Tangshan University
关键词 网络通讯 温度监控系统 数据库 血液冷藏 network communication temperature monitoring system database blood refrigeration
  • 相关文献

参考文献2

二级参考文献17

  • 1王福豹,史龙,任丰原.无线传感器网络中的自身定位系统和算法[J].软件学报,2005,16(5):857-868. 被引量:672
  • 2Boyd C, Mathuria A. Key establishment protocols for secure mobile communications: a selective survey [ C]//Australasian Conference on Information Security and Privacy. Brisbane: Springer, 1998:344- 355.
  • 3Law Y W, Corin R, Etalle S, et al. A formally verified decentralized key management architecture for wireless sensor networks[C]//Lecture Notes of Computer Science: Personal Wireless Conununieations. Berlin: Springer-Verlag, 2003:27-39.
  • 4Perrig A, Szewczyk R, Wen V, et al. SPINS: security protocols for sensor networks[J]. Wireless Networks, 2002, 8(5) :521 - 534.
  • 5Sabbah E, Majeed A, Kang K D, et al. An applicationdriven perspective on wireless sensor network security[C]// Proceedings of the 2nd ACM International Workshop on Quality of Service & Security for Wireless and Mobile Networks. Terromolinos: ACM Press, 2006:1 - 8.
  • 6Liu D G, Ning P. Multilevel μTESLA: broadcast authentication for distributed sensor networks [ J ]. ACM Transactions on Embedded Computing Systems, 2004, 3 (4) :800 - 836.
  • 7Khalil I, Bagchi S. SECOS: key management for scalable and energy efficient crypto on sensorsE R]. West Lafayette: Purdue University, 2006.
  • 8Krishna P, Vaidya N H, Chatterjee M, et al. A clusterbased approach for routing in dynamic networks [ J ]. ACM SIGCOMM Computer Communication Review, 1997, 27 (2) :49 - 64.
  • 9Mishra A, Nadkarni K, Patcha A. Intrusion detection in wireless ad hoc networks [ J ]. IEEE Wireless Communications, 2004,11 ( 1 ) : 48 - 60.
  • 10Buchegger S, Boudec J L. Performance analysis of the CONFIDANT protocol[C]//Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoe Networking & Computing. Lausanne: ACM Press, 2002:226- 236.

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部