期刊文献+
共找到21篇文章
< 1 2 >
每页显示 20 50 100
基于ZigBee无线感测网络的中药种植环境监测系统设计
1
作者 马健 《河北北方学院学报(自然科学版)》 2018年第5期33-36,共4页
目的针对亳州中药材传统化种植,结合ZigBee无线感测技术和网络技术,构建中药材种植环境的监测系统,以提高中药材种植的产量和质量。方法以亳州道地药材种植基地为研究对象,建立监测系统,包括装置端、服务器端与客户端3部分,在中药材种... 目的针对亳州中药材传统化种植,结合ZigBee无线感测技术和网络技术,构建中药材种植环境的监测系统,以提高中药材种植的产量和质量。方法以亳州道地药材种植基地为研究对象,建立监测系统,包括装置端、服务器端与客户端3部分,在中药材种植环境中安装ZigBee无线感测设备,收集环境参数数据,利用网络技术传输到中药材种植户操作平台。结果中药材种植户可以通过操作计算机查看中药材基地里面监测的环境参数具体数据。结论亳州中药材种植直接影响全国中药材交易量和交易价格,提高中药材种植的产量和质量,增加中药材种植户的收益,同时政府部门能够有效地对中药材市场进行宏观调控,促进中药材交易良性发展。 展开更多
关键词 ZigBee无线感测网络 中药种植 系统 网络服务
下载PDF
无线感测网络上节能的事件驱动数据汇集机制
2
作者 黄秀芬 李哲玮 +1 位作者 苏奕宇 窦其仁 《北京交通大学学报》 CAS CSCD 北大核心 2010年第3期15-22,共8页
针对无线感测网络上动态改变的事件,设计一套有效率的数据汇集机制.采用网格架构,建立数据汇集树将事件数据传送至汇集点.在初始建立数据汇集树架构时便尽量减少多余的回传节点,以减少感测点的能量消耗.而在事件产生变动时,可应事件变... 针对无线感测网络上动态改变的事件,设计一套有效率的数据汇集机制.采用网格架构,建立数据汇集树将事件数据传送至汇集点.在初始建立数据汇集树架构时便尽量减少多余的回传节点,以减少感测点的能量消耗.而在事件产生变动时,可应事件变化的调整机制让树架构依然有效率的运作.本文提出的方法与无线感测网络中的3个数据汇集技术EADA、Dual-Tree-Based和Range Query做比较,仿真结果显示本文的方法能够有效的延长网络存活时间,且在总能量消耗及系统开销(overhead)皆有良好表现. 展开更多
关键词 无线感测网络 事件驱动 数据汇集 网格
下载PDF
无线感测网络WSN的芯片技术与解决方案
3
作者 Digitimes 《集成电路应用》 2015年第1期29-31,共3页
由许多感测节点所构成的无线感测网络WSN,可各种环境需求来设置。而为了长期运行,大多采用低功耗与节电设计,必要时再搭配能源采集的功能,让运行时间更长久。在感测资料的搜集与传递部份,除传感器必须量测精准,各节点之间的资料传输也... 由许多感测节点所构成的无线感测网络WSN,可各种环境需求来设置。而为了长期运行,大多采用低功耗与节电设计,必要时再搭配能源采集的功能,让运行时间更长久。在感测资料的搜集与传递部份,除传感器必须量测精准,各节点之间的资料传输也必须力求通畅,并具有容错能力,各个厂商也推出不同传输技术与解决方案。 展开更多
关键词 无线感测网络 WSN 器RFID
下载PDF
物联网技术于人文艺术之应用
4
作者 张志勇 郭经华 +2 位作者 谢嘉浚 林志宇 邓振亚 《集成技术》 2012年第1期26-31,共6页
近年来,物联网(Internet of Things,IoT)产业受到许多的关注,世界各国均视其为潜在无限商机的高科技产业,并投入大量的资源从事研发与推广。由于物联网的应用非常广泛,且透过物联网技术人类得以提升生活质量,让生活更加便利,因此,本论... 近年来,物联网(Internet of Things,IoT)产业受到许多的关注,世界各国均视其为潜在无限商机的高科技产业,并投入大量的资源从事研发与推广。由于物联网的应用非常广泛,且透过物联网技术人类得以提升生活质量,让生活更加便利,因此,本论文首先简介物联网的背景及应用,并介绍其基本概念与架构。接着,本论文以「无线感测真菌人文树道」为例,针对物联网技术应用于人文艺术领域进行说明,并详细叙述其所使用到之各项软件、韧体及硬件技术,透过真菌的感测、无线通信及异质网络连网功能的设计,使真菌网络成为物联网在人文艺术应用的一个重要典范。 展开更多
关键词 物联网 无线感测网络 人文艺术
下载PDF
农业格网与农业信息系统的发展
5
作者 万一怒 《农业工程学报》 EI CAS CSCD 北大核心 2008年第S2期319-324,共6页
信息与通信科技的快速发展与因特网数据系统不断建立所形成的知识平台,其最重要的发展效益是能整合运用许多网络资源与分散的异质数据。农业信息系统的终极发展与体系之建立,其架构将会有如农业格网,基于格网发展农业信息系统,能适当的... 信息与通信科技的快速发展与因特网数据系统不断建立所形成的知识平台,其最重要的发展效益是能整合运用许多网络资源与分散的异质数据。农业信息系统的终极发展与体系之建立,其架构将会有如农业格网,基于格网发展农业信息系统,能适当的共享网络上多元的计算能力、各类的农业技术数据库、无线多媒体感测网络、生产规划与分析模型、不同来源与形式的信息等,而能达到积极有效的应用发展,例如全面的食品安全生产履历系统、决策支持系统等多元化的应用。该文除简介农业格网发展相关的分散与共用整合之格网架构,并探讨了台湾农业格网相关的发展计划,包括无线多媒体感测网络的发展与应用、生产履历、自动化系统整合等。并据此探讨农业信息系统的分层发展架构及提供农业信息系统发展接口,以及农民使用者接口的需要。 展开更多
关键词 格网技术 农业信息系统 无线感测网络 田间监 生产履历
下载PDF
Key Environmental Factors Monitoring System of Low-power Greenhouse Based on WSN Technology
6
作者 柳军 陶建平 吕晓兰 《Agricultural Science & Technology》 CAS 2016年第2期449-452,共4页
A low-power environmental monitoring system based on WSN technology is proposed to effectively monitor the environmental status and ensure the healthy growth of greenhouse crops in the greenhouse. The system performs ... A low-power environmental monitoring system based on WSN technology is proposed to effectively monitor the environmental status and ensure the healthy growth of greenhouse crops in the greenhouse. The system performs dynamic mon- itoring on the environmental data of temperature, humidity, illumination, soil tempera- ture and humidity of the greenhouse, and it reduces the energy consumption by us- ing solar energy and lithium battery as the power supply mode and dynamic power management algorithm combined with improved routing protocol. Stable and reliable, the system could effectively monitor the key environmental factors in the green- house, making it of certain promotion value. 展开更多
关键词 Environmental monitoring GREENHOUSE Wireless sensor network WSN technology Key factor
下载PDF
Real-time Threshold Routing Algorithm Based on Wireless Sensor Network
7
作者 罗桂兰 左国超 冯立波 《Agricultural Science & Technology》 CAS 2012年第4期917-920,F0003,共5页
[Objective] This study was to design an intelligent greenhouse real-time monitoring system based on the core technology of Internet of Things in order to meet the needs of agricultural informatization and intellectual... [Objective] This study was to design an intelligent greenhouse real-time monitoring system based on the core technology of Internet of Things in order to meet the needs of agricultural informatization and intellectualization. [Method] Based on the application characteristics of Wireless Sensor Network (WSN), the intelligent greenhouse monitoring system was designed. And for the incompleteness strategy of load balancing in the Low-Energy Adaptive Clustering Hierarchy (LEACH), a Real- time Threshold Routing Algorithm (RTRA) was proposed. [Result] The performance of network lifetime and network delay of RTRA were tested in MATLAB and found that, within the same testing environment, RTRA can save nodes energy consumption, prolong network lifetime, and had better real-time performance than LEACH. The al- gorithm satisfies the crops' requirements on real-time and energy efficiency in the greenhouse system. [Conclusion] For the good performance on real-time, the de- signed intelligent greenhouse real-time monitoring system laid the foundation for the research and development of agricultural informatization and intellectualization. 展开更多
关键词 Internet of Things Wireless sensor network Intelligent greenhouse mon- itoring Real time Routing algorithm
下载PDF
WSN-智能型高速公路信息平台规划
8
作者 李苏雷 谷川 《南昌工程学院学报》 CAS 2013年第S1期47-48,共2页
介绍了无线感测网络(WSN)技术搭建智能型运输系统平台的优势和特征,详细描述了WSN实验平台的硬件特征,操作系统,实现语言以及主要功能模块的原理和逻辑关系,并采用实地试验的方法,在该平台上对多项应用如行车信息采集、信息处理、路况... 介绍了无线感测网络(WSN)技术搭建智能型运输系统平台的优势和特征,详细描述了WSN实验平台的硬件特征,操作系统,实现语言以及主要功能模块的原理和逻辑关系,并采用实地试验的方法,在该平台上对多项应用如行车信息采集、信息处理、路况播报、电子收费等进行初步的试验研究,并根据高速公路上的不同行车速度,实现了对高速公路车辆实时速度的监控,也对后续应用系统研究的开展有一定借鉴作用。 展开更多
关键词 无线感测网络 智能型传输系统 实时采集 双向传输
下载PDF
Coordinate-free k-coverage hole detection algorithm in wireless sensor networks 被引量:11
9
作者 Ma Wenyu Yan Feng +2 位作者 Zuo Xuzhou Xia Weiwei Shen Lianfeng 《Journal of Southeast University(English Edition)》 EI CAS 2019年第1期8-15,共8页
For wireless sensor networks, a simple and accurate coordinate-free k-coverage hole detection scheme is proposed. First, an algorithm is presented to detect boundary cycles of 1-coverage holes. The algorithm consists ... For wireless sensor networks, a simple and accurate coordinate-free k-coverage hole detection scheme is proposed. First, an algorithm is presented to detect boundary cycles of 1-coverage holes. The algorithm consists of two components, named boundary edge detection and boundary cycle detection. Then, the 1-coverage hole detection algorithm is extended to k-coverage hole scenarios. A coverage degree reduction scheme is proposed to find an independent covering set of nodes in the covered region of the target field and to reduce the coverage degree by one through sleeping those nodes. Repeat the 1-coverage hole detection algorithm and the higher order of coverage holes can be found. By iterating the above steps for k-1 times, the boundary edges and boundary cycles of all k-coverage holes can be discovered. Finally, the proposed algorithm is compared with a location-based coverage hole detection algorithm. Simulation results indicate that the proposed algorithm can accurately detect over 99% coverage holes. 展开更多
关键词 k-coverage hole detection K-COVERAGE wireless sensor networks
下载PDF
A multipath routing protocol for wireless sensor network for mine security monitoring 被引量:7
10
作者 XIAO Shuo WEI Xueye WANG Yu 《Mining Science and Technology》 EI CAS 2010年第1期148-151,共4页
Underground mining is a hazardous industrial activity. In order to provide a safe working environment for miners, a Wireless Sensor Network (WSN) technology has been used for security monitoring. It can provide a wide... Underground mining is a hazardous industrial activity. In order to provide a safe working environment for miners, a Wireless Sensor Network (WSN) technology has been used for security monitoring. It can provide a wide range of surveillance with a relatively low cost. In this study, an Energy-Based Multipath Routing (EBMR) protocol is proposed, which considers residual energy capacity and link quality in choosing hops and routing paths. Hops and paths with a high residual energy capacity and link quality will have the best chance to be selected to transmit data packages. Since the EBMR stores several routes in the routing table, when the current path fails, another path will be chosen to fulfill the task immediately. In this way, EBMR improves reliability and decrease time latency. Compared to AOMDV and REAR, EBMR decreases time latency by 51% and 12%. 展开更多
关键词 coal mine security monitoring multipath routing wireless sensor network
下载PDF
Coal mine gas monitoring system based on wireless sensor network 被引量:2
11
作者 王建 王汝琳 +1 位作者 王学民 沈传河 《Journal of Coal Science & Engineering(China)》 2007年第1期107-111,共5页
Based on the nowadays' condition, it is urgent that the gas detection cable communication system must be replaced by the wireless communication systems. The wireless sensors distributed in the environment can achieve... Based on the nowadays' condition, it is urgent that the gas detection cable communication system must be replaced by the wireless communication systems. The wireless sensors distributed in the environment can achieve the intelligent gas monitoring system. Apply with multilayer data fuse to design working tactics, and import the artificial neural networks to analyze detecting result. The wireless sensors system communicates with the control center through the optical fiber cable. All the gas sensor nodes distributed in coal mine are combined into an intelligent, flexible structure wireless network system, forming coal mine gas monitoring system based on wireless sensor network. 展开更多
关键词 GAS communication system wireless sensor network data fuse artificial neural networks
下载PDF
Determination of Threshold for Energy Detection in Cognitive Radio Sensor Networks 被引量:4
12
作者 郝建军 黎晋 《China Communications》 SCIE CSCD 2011年第1期14-19,共6页
The Internet of Things (loT) is called the world' s third wave of the information industry. As the core technology of IoT, Cognitive Radio Sensor Networks (CRSN) technology can improve spectrum utilization effici... The Internet of Things (loT) is called the world' s third wave of the information industry. As the core technology of IoT, Cognitive Radio Sensor Networks (CRSN) technology can improve spectrum utilization efficiency and lay a sofid foundation for large-scale application of IoT. Reliable spectrum sensing is a crucial task of the CR. For energy de- tection, threshold will determine the probability of detection (Pd) and the probability of false alarm Pf at the same time. While the threshold increases, Pd and Pf will both decrease. In this paper we focus on the maximum of the difference of Pd and Pf, and try to find out how to determine the threshold with this precondition. Simulation results show that the proposed method can effectively approach the ideal optimal result. 展开更多
关键词 Internet of Sensor Networks energy Things Cognitive Radio detection THRESHOLD
下载PDF
Efficient Algorithm for K-Barrier Coverage Based on Integer Linear Programming 被引量:15
13
作者 Yanhua Zhang Xingming Sun Baowei Wang 《China Communications》 SCIE CSCD 2016年第7期16-23,共8页
Barrier coverage of wireless sensor networks is an important issue in the detection of intruders who are attempting to cross a region of interest.However,in certain applications,barrier coverage cannot be satisfied af... Barrier coverage of wireless sensor networks is an important issue in the detection of intruders who are attempting to cross a region of interest.However,in certain applications,barrier coverage cannot be satisfied after random deployment.In this paper,we study how mobile sensors can be efficiently relocated to achieve k-barrier coverage.In particular,two problems are studied:relocation of sensors with minimum number of mobile sensors and formation of k-barrier coverage with minimum energy cost.These two problems were formulated as 0–1 integer linear programming(ILP).The formulation is computationally intractable because of integrality and complicated constraints.Therefore,we relax the integrality and complicated constraints of the formulation and construct a special model known as RELAX-RSMN with a totally unimodular constraint coefficient matrix to solve the relaxed 0–1 ILP rapidly through linear programming.Theoretical analysis and simulation were performed to verify the effectiveness of our approach. 展开更多
关键词 k-barrier coverage linear programming wireless sensor networks
下载PDF
Landslide Monitoring Using Low Cost GNSS Equipment - Experiences from Two Alpine Testing Sites 被引量:2
14
作者 Otto Heunecke Jessica Glabsch Stefan Schuhback 《Journal of Civil Engineering and Architecture》 2011年第8期661-669,共9页
Simple GNSS navigation receivers, developed for the mass market, can be used for positioning with sub centimeter accuracy in a wireless sensor network if the read-out of the carrier phase data is possible and all data... Simple GNSS navigation receivers, developed for the mass market, can be used for positioning with sub centimeter accuracy in a wireless sensor network if the read-out of the carrier phase data is possible and all data is permanently broadcast to a central computer for near real time processing of the respective base lines. Experiences gained in two research projects related to landslide monitoring are depicted in terms of quality and reliability of the results by the developed approach. As far as possible a modular system set up with commercial off-the-shelf components, e.g., standard WLAN fur commtmication, solar batteries with solar panels for autarkic power supply and in cooperation of existing proofed program tools is chosen. The challenge of the still ongoing development is to have a flexible and robust GNSS based sensor network available - concerned not only for landslide monitoring in future. 展开更多
关键词 Early warning systems geo sensor networks low cost precise differential GNSS near real time processing.
下载PDF
Behavior analysis of malicious sensor nodes based on optimal response dynamics
15
作者 GONG Junhui HU Xiaohui HONG Peng 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2022年第1期96-104,共9页
Wireless sensor networks are extremely vulnerable to various security threats.The intrusion detection method based on game theory can effectively balance the detection rate and energy consumption of the system.The acc... Wireless sensor networks are extremely vulnerable to various security threats.The intrusion detection method based on game theory can effectively balance the detection rate and energy consumption of the system.The accurate analysis of the attack behavior of malicious sensor nodes can help to configure intrusion detection system,reduce unnecessary system consumption and improve detection efficiency.However,the completely rational assumption of the traditional game model will cause the established model to be inconsistent with the actual attack and defense scenario.In order to formulate a reasonable and effective intrusion detection strategy,we introduce evolutionary game theory to establish an attack evolution game model based on optimal response dynamics,and then analyze the attack behavior of malicious sensor nodes.Theoretical analysis and simulation results show that the evolution trend of attacks is closely related to the number of malicious sensors in the network and the initial state of the strategy,and the attacker can set the initial strategy so that all malicious sensor nodes will eventually launch attacks.Our work is of great significance to guide the development of defense strategies for intrusion detection systems. 展开更多
关键词 wireless sensor network intrusion detection malicious node evolutionary game optimal response dynamics
下载PDF
AN ACCURATE PREDICTION MODEL FOR COMPUTATIONAL OVERHEADS OF SECURITY MECHANISMS IN WIRELESS SENSOR NETWORKS
16
作者 Liu Wei Luo Rong Yang Huazhong 《Journal of Electronics(China)》 2009年第5期699-705,共7页
In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and ... In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and flexible model to predict overheads of these mechanisms. This model is based on overheads of basic operations frequently used in cryptography algorithms, which are essential elements of security mechanisms. Several popular cryptography algorithms and security mechanisms are evaluated using this model. According to simulation results, relative prediction errors are less than 7% for most cryptography algorithms and security mechanisms. 展开更多
关键词 Wireless Sensor Network (WSN) Cryptography algorithm Security mechanism Computational overhead
下载PDF
Clustered trajectories anonymity in wireless sensor networks
17
作者 Seble Hailu Dady Wang Jiahao +1 位作者 Qin Zhiguang Yang Fan 《High Technology Letters》 EI CAS 2015年第2期140-146,共7页
This paper proposes a clustered trajectories anonymity scheme (CTA) that enhances the kano nymity scheme to provide the intended level of source location privacy in mobile event monitoring when a global attacker is ... This paper proposes a clustered trajectories anonymity scheme (CTA) that enhances the kano nymity scheme to provide the intended level of source location privacy in mobile event monitoring when a global attacker is assumed. CTA applies isomorphic property of rotation to create traces of the fake sources distributions which are similar to those of the real sources. Thus anonymity of each trajectory and that of the clustered is achieved. In addition, location kdiversity is achieved by dis tributing fake sources around the base station. To reduce the time delay, tree rooted at the base sta tion is constructed to overlap part of the beacon interval of the nodes in the hierarchy. Both the ana lytical analysis and the simulation results prove that proved energy overhead and time delay. our scheme provides perfect anonymity with improved energy overhead and time delay. 展开更多
关键词 clustered trajectories anonymity scheme (CTA) source location privacy K-ANONYMITY global attackers wireless sensor networks (WSNs)
下载PDF
Spectrum sensing sequence prediction in cognitive radio networks
18
作者 An Chunyan Ji Hong +1 位作者 Si Pengbo Maoxu 《High Technology Letters》 EI CAS 2011年第4期371-376,共6页
Spectrum sensing is one of the key issues in cognitive radio networks. Most of previous work concenates on sensing the spectrum in a single spectrum band. In this paper, we propose a spectrum sensing sequence predicti... Spectrum sensing is one of the key issues in cognitive radio networks. Most of previous work concenates on sensing the spectrum in a single spectrum band. In this paper, we propose a spectrum sensing sequence prediction scheme for cognitive radio networks with multiple spectrum bands to decrease the spectrum sensing time and increase the throughput of secondary users. The scheme is based on recent advances in computational learning theory, which has shown that prediction is synonymous with data compression. A Ziv-Lempel data compression algorithm is used to design our spectrum sensing sequence prediction scheme. The spectrum band usage history is used for the prediction in our proposed scheme. Simulation results show that the proposed scheme can reduce the average sensing time and improve the system throughput significantly. 展开更多
关键词 spectrum sensing sequence prediction cognitive radio network Ziv-Lempel algorithm
下载PDF
Bamboo Winding Composite Utility Tunnels:a case study on mechanical behavior with WSN monitoring and numerical simulation
19
作者 Hengdong Wang Jiawei Wang +1 位作者 Xin Xie Fei Wang 《Low-carbon Materials and Green Construction》 2023年第1期241-253,共13页
Bamboo Winding Composite Pipes(BWCPs)have many advantages such as good mechanical properties,low cost,low carbon,environmental friendliness,thermal insulation and easy installation et al.At present,BWCP is widely used... Bamboo Winding Composite Pipes(BWCPs)have many advantages such as good mechanical properties,low cost,low carbon,environmental friendliness,thermal insulation and easy installation et al.At present,BWCP is widely used in urban water supply,drainage,communication cable protection,farmland irrigation etc.It is obvious that the Bamboo Winding Composite materials have good application prospects in the field of utility tunnels.However,considering that the size of utility tunnels is much larger than that of normal pipelines,the wide application of Bamboo Composite Utility Tunnels(BCUTs)is still a challenge.In this paper,the force performance of BCUT in Datong Shanxi Province,was studied using two methods:real time monitoring and numerical simulation.Wireless sensor networks were used for monitoring,and the real time monitoring data of horizontal convergence and strains under the condition of backfill were obtained.The monitoring data indicated that the horizontal convergence can meet the requirement of relevant technical standards.A three-dimensional numerical model of the utility tunnel was established using FEM software.The influence of soil parameters on the deformation and strain of the BCUT was studied using the numerical method.The simulation results were compared with real-time monitoring data.The soil parameters K_(0) and k_(sh) have significant effects on the deformation,stress and strain of the utility tunnel.This kind of utility tunnel is recommended to use in areas with relatively good geological conditions. 展开更多
关键词 Utility tunnel BIOMATERIALS Real time monitoring Wireless sensor networks Numerical simulation
原文传递
远程医疗监护系统的新技术及其在慢性退行性疾病治疗中的应用
20
作者 叶云燕 《磁性元件与电源》 2014年第5期134-137,146,共5页
本文对用32位处理器的硬件与软件平台所构建的远程监护系统与基于ZigBee技术的远程医疗监护系统的构建及其在漫性退行性疾病治疗中的应用作分析研讨。
关键词 远程医疗监护 生命体征 无线感测网络
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部