期刊文献+

基于Android手机的设备远程控制的研究与实现 被引量:3

Research and Implementation of Remote Control Based on Android Cell Phone
下载PDF
导出
摘要 物联网的发展为电器智能化提供了可能,工厂和车间等危险场所中的电器设备需要远程监测与控制。远程控制系统是在无线网络平台下,通过智能终端实现对电器设备的远程控制。提出了基于Android手机远程控制电器设备的通信接口设计方案,智能手机和WiFi模块通过无线互联网络与Web服务器通信。介绍了整个控制系统的工作原理,详细分析了各个模块的功能和具体实现方法。该系统实现了Android手机对服务器的访问和对设备的远程控制,具有很强的实用性,市场前景广阔。 With the development of the Internet of things, it makes intelligent appliances possible. Electricalequipment need to monitor and control in dangerous places such as factories and workshops. There motecontrol system is in the wireless net work plat form, and the intelligent terminal can realize the remote controlof electrical equipment. In this paper, a communication interface design scheme for remote control electricalequipment based on Android phones was proposed and the smart phone and Wifi module communicated withWeb server via wireless Internet connection. This paper introduced the working principle of the whole controlsystem, analyzed the function of each module and the realization method in detail. The system can realize theaccess of Android phones to the server and remote control of the equipment, which has a strong practicabilityand broad market prospect.
作者 张倩 ZHANG Qian(School of Automation Engineering,Shenyang Institute of Engineering,Shenyang 110136,Liaoning Province)
出处 《沈阳工程学院学报(自然科学版)》 2018年第4期381-384,共4页 Journal of Shenyang Institute of Engineering:Natural Science
关键词 ANDROID 通信接口 远程控制 HTTP协议 Android communication interface remote control HTTP protocol
  • 相关文献

参考文献4

二级参考文献47

  • 1陈振洲,李磊,姚正安.基于SVM的特征加权KNN算法[J].中山大学学报(自然科学版),2005,44(1):17-20. 被引量:51
  • 2张明华,张申生,曹健.无线局域网中基于信号强度的室内定位[J].计算机科学,2007,34(6):68-71. 被引量:66
  • 3D. Boneh, R. DeMillo, R. Lipton. On the impor- tance of checking cryptographic protocols for faults, J. CryptoL 14(2)(2001) 101-119.
  • 4R Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, in 16th Annual Int. Cryptology Conf, eds. N. Koblitz (California, USA, 1996), pp. 104-113.
  • 5P. Kocher, J. Jaffe, B. Jun. Differential power analysis, in 19th Annual Int. Cryptology Conf, eds. M. J. Wiener (California, USA, 1999), pp. 388-397.
  • 6H. C. Kim, J.- J. Quisquater. Faults, injection methods, and fault attacks. IEEE Des. Test Corn- put. 24(6) (2007) 544-545.
  • 7J. Kelsey, B. Schneier, D. Wagner, et al. Side channel cryptanalysis of product ciphers, in 5th European Syrnp. on Research in Cornpupter Security, eds. J. J. Quisquater, Y. Deswarte, C. Meadows, et al. (Louvain-la-Neuve, Belgium, 1998), pp. 97-110.
  • 8M. A. B. Shemaili, C. Y. Yeun, K. Mubarak, M. J. Zemerly. A new lightweight hybrid cryptogra- phic algorithm for the internet of things, in 7th Int. Conf for Internet Technology and Secured Transactions, eds. S. Nick, A. E. Safwan and A. S. Charles(London, UK, 2012), pp.87-92.
  • 9W. Erich, G. Johann. An 8-bit avr-based elliptic curve cryptographic risc processor for the internet of things, in 45th Annual Int. Symposium on Microarchitecture, (BC, Canada, 2012), pp. 39-46.
  • 10E. Biham, A. Shamir. Differential fault analysis of secret key cryptosystems, in 17th Annual Int. Cryptology Conf, eds. S. Burton and Jr. Kaliski (California, USA, 1997), pp. 513-525.

共引文献12

同被引文献11

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部