期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Orthogonal experiment design of EMI of security monitoring system in coal mines 被引量:20
1
作者 Xiang Liu Chaoqun Jiao Aifen Yao 《International Journal of Coal Science & Technology》 EI 2015年第4期325-332,共8页
Security monitoring system of coal mines is indispensable to ensure the safe and efficient production of colliery. Due to the special and narrow underground field of the coal mine, the electromagnetic interference can... Security monitoring system of coal mines is indispensable to ensure the safe and efficient production of colliery. Due to the special and narrow underground field of the coal mine, the electromagnetic interference can cause a series of misstatements and false positives on the monitoring system, which will severely hamper the safe production of coal industry. In this paper, first, the frequency characteristics of the interference source on the power line are extracted when equipment runs normally. Then the finite difference time domain method is introduced to analyze the effects of the electromagnetic interference parameters on the security monitoring signal line. And the interference voltage of the two terminal sides on the single line is taken as evaluating indexes. Finally, the electromagnetic interference parameters are optimized by orthogonal experimental design based on the MATLAB simulation on the normal operation of equipment. 展开更多
关键词 security monitoring system Finite difference time domain method (FDTD) Electromagnetic interference(EMI) Orthogonal experimental design
下载PDF
A multipath routing protocol for wireless sensor network for mine security monitoring 被引量:7
2
作者 XIAO Shuo WEI Xueye WANG Yu 《Mining Science and Technology》 EI CAS 2010年第1期148-151,共4页
Underground mining is a hazardous industrial activity. In order to provide a safe working environment for miners, a Wireless Sensor Network (WSN) technology has been used for security monitoring. It can provide a wide... Underground mining is a hazardous industrial activity. In order to provide a safe working environment for miners, a Wireless Sensor Network (WSN) technology has been used for security monitoring. It can provide a wide range of surveillance with a relatively low cost. In this study, an Energy-Based Multipath Routing (EBMR) protocol is proposed, which considers residual energy capacity and link quality in choosing hops and routing paths. Hops and paths with a high residual energy capacity and link quality will have the best chance to be selected to transmit data packages. Since the EBMR stores several routes in the routing table, when the current path fails, another path will be chosen to fulfill the task immediately. In this way, EBMR improves reliability and decrease time latency. Compared to AOMDV and REAR, EBMR decreases time latency by 51% and 12%. 展开更多
关键词 coal mine security monitoring multipath routing wireless sensor network
下载PDF
Experiment Study of Fiber Optic Sensing in Railway Security Monitoring 被引量:1
3
作者 Dian Fan De-Sheng Jiang Wei-Lai Li 《Journal of Electronic Science and Technology of China》 2008年第4期499-501,共3页
Aiming at some security problems in railway running and the application condition of existing technology, this paper studies some issues of using fiber optic sensing technology in railway security monitoring. Through ... Aiming at some security problems in railway running and the application condition of existing technology, this paper studies some issues of using fiber optic sensing technology in railway security monitoring. Through field experiment measuring the strain of the rail and analyzing the experiment data, the method of diagnosing the health condition of rail and wheel is investigated. 展开更多
关键词 Fiber optic sensing health monitor railway security.
下载PDF
A Concurrent Security Monitoring Method for Virtualization Environments
4
作者 TIAN Donghai JIA Xiaoqi +1 位作者 CHEN Junhua HU Changzhen 《China Communications》 SCIE CSCD 2016年第1期113-123,共11页
Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechani... Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechanism into the normal functionality of the target systems.However,these methods are either prone to be tempered by attackers or introduce considerable performance overhead for target systems.To address these problems,in this paper,we present a concurrent security monitoring method which decouples traditional serial mechanisms,including security event collector and analyzer,into two concurrent components.On one hand,we utilize the SIM framework to deploy the event collector into the target virtual machine.On the other hand,we combine the virtualization technology and multi-core technology to put the event analyzer into a trusted execution environment.To address the synchronization problem between these two concurrent components,we make use of Lamport's ring buffer algorithm.Based on the Xen hypervisor,we have implemented a prototype system named COMO.The experimental results show that COMO can monitor the security of the target virtual machine concurrently within a little performance overhead. 展开更多
关键词 security virtualization technology concurrent monitoring
下载PDF
Research on UAV Campus Patrol Monitoring System Based on Deep Learning
5
作者 Jun Mao Kun Deng Jun Yang 《Journal of Contemporary Educational Research》 2020年第7期12-15,共4页
With the sweeping of the age of science and technology,science and technology has developed rapidly in China.As a common monitoring system,drone technology has attracted more attention.Nowadays,with the continuous imp... With the sweeping of the age of science and technology,science and technology has developed rapidly in China.As a common monitoring system,drone technology has attracted more attention.Nowadays,with the continuous improvement of drone technology,campuses have also begun to introduce drone technology for patrol monitoring to ensure students’safety. 展开更多
关键词 UAV security monitoring system Safe campus
下载PDF
The intelligent security system based on the public switch telephone network
6
作者 Tian-fu YUAN (Shanghai University of Engineering Science,shanghai 201620,China) 《Journal of Measurement Science and Instrumentation》 CAS 2010年第S1期11-14,共4页
This paper elaborates the design and development of the intelligent security system based on the public switch telephone network.The system includes two parts:security detection emission,and radio reception and signal... This paper elaborates the design and development of the intelligent security system based on the public switch telephone network.The system includes two parts:security detection emission,and radio reception and signal process connected to the phone line with the telephone set at home or in the office.The core of radio reception and signal process is Micro Control Unit,which, in coordination with other peripheral circuits such as telephone line interface,signaling tone detection,dual tone multi-frequency(DTMF)reception and emission,and voice notification,informs the subscriber of the alarm via voice through Public Switch Telephone Network(PSTN).In addition,the subscriber can easily modify telephone numbers stored in the system. 展开更多
关键词 intelligent control environment monitor security monitor
下载PDF
A Hierarchical P2P Model and a Data Fusion Method for Network Security Situation Awareness System 被引量:5
7
作者 GUO Fangfang HU Yibing +2 位作者 XIU Longting FENG Guangsheng WANG Shuaishuai 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第2期126-132,共7页
A hierarchical peer-to-peer(P2P)model and a data fusion method for network security situation awareness system are proposed to improve the efficiency of distributed security behavior monitoring network.The single po... A hierarchical peer-to-peer(P2P)model and a data fusion method for network security situation awareness system are proposed to improve the efficiency of distributed security behavior monitoring network.The single point failure of data analysis nodes is avoided by this P2P model,in which a greedy data forwarding method based on node priority and link delay is devised to promote the efficiency of data analysis nodes.And the data fusion method based on repulsive theory-Dumpster/Shafer(PSORT-DS)is used to deal with the challenge of multi-source alarm information.This data fusion method debases the false alarm rate.Compared with improved Dumpster/Shafer(DS)theoretical method based on particle swarm optimization(PSO)and classical DS evidence theoretical method,the proposed model reduces false alarm rate by 3%and 7%,respectively,whereas their detection rate increases by 4%and 16%,respectively. 展开更多
关键词 distributed security behavior monitoring peer-to- peer (P2P) data fusion DS evidence theory PSO algorithm
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部