期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
济南市地下水监测体系构建与应用
1
作者 王燕河 赵倩 马河宽 《电大理工》 2023年第2期7-11,共5页
为解决济南市原有地下水监测点网布局不合理、自动化监测水平不高、监测点未有机融合等问题,建设形成布局全面、分布合理、及时有效监测地下水的地下水监测体系。该系统通过整合现有地下水监测点、新建和改建监测点,整理监测数据信息,... 为解决济南市原有地下水监测点网布局不合理、自动化监测水平不高、监测点未有机融合等问题,建设形成布局全面、分布合理、及时有效监测地下水的地下水监测体系。该系统通过整合现有地下水监测点、新建和改建监测点,整理监测数据信息,强化数据分析,提升数据自动化处理能力,实现了地下水水位实时监测,自动比对分析不同时间、不同区域地下水水位数据,为济南泉水保护、生态补源、地下水科学合理开发利用提供了数据支撑和决策依据。 展开更多
关键词 地下水监控体系 监测点网 监测系统 数据分析技术 泉水预测预报
下载PDF
An Overlay Network for Monitoring Activities of Computer Viruses
2
作者 Li Ying Cao Yiqun +3 位作者 Qiu Ben Jiao Jian Shan Xiuming Ren Yong 《Engineering Sciences》 EI 2008年第1期52-58,共7页
To accurately track computer viruses,an overlay network that monitors the activities of viruses is constructed.Identifying and locating nodes infected by virus on network is achieved by a naming system in which a node... To accurately track computer viruses,an overlay network that monitors the activities of viruses is constructed.Identifying and locating nodes infected by virus on network is achieved by a naming system in which a node in the network is mapped to a unique serial number of the hard-drive.By carefully monitoring and recording sensitive communication between local system and remote nodes on the network,and suspicious operations on files that originate from remote nodes and entered via some form of file transfer,activities of viruses in both local and network level are recorded and ready for future analysis.These data can also be used in analysis of the mechanism of a computer virus as well as its spreading mode and pattern. 展开更多
关键词 overlay network VIRUS OBSERVATION DNS
下载PDF
Intrusion Detection for Wireless Mesh Networks using Finite State Machine 被引量:5
3
作者 Yi Ping Wu Yue +1 位作者 Liu Ning Wang Zhiyang 《China Communications》 SCIE CSCD 2010年第5期40-48,共9页
Wireless Mesh Networks is vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, Lack of centralized monitoring and management point. The traditional way of protec... Wireless Mesh Networks is vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, Lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer suffi- cient and effective for those features. In this paper, we propose a distributed intrusion detection ap- proach based on timed automata. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then we con- struct the Finite State Machine (FSM) by the way of manually abstracting the correct behaviors of the node according to the routing protocol of Dynamic Source Routing (DSR). The monitor nodes can verify every node's behavior by the Finite State Ma- chine (FSM), and validly detect real-time attacks without signatures of intrusion or trained data.Compared with the architecture where each node is its own IDS agent, our approach is much more efficient while maintaining the same level of effectiveness. Finally, we evaluate the intrusion detection method through simulation experiments. 展开更多
关键词 wireless mesh networks SECURITY intrusion detection finite state machine
下载PDF
Design and Implementation of Remote Health Monitoring Sensor Network Based on the Internet of Things
4
作者 LiHua Zhou Qing Lai 《International Journal of Technology Management》 2015年第1期11-13,共3页
From the view of practical application, this paper designs the human body physiology information collection nodes, the coordinator node, wireless transmission system using CC2430 microcontroller, and detailed design i... From the view of practical application, this paper designs the human body physiology information collection nodes, the coordinator node, wireless transmission system using CC2430 microcontroller, and detailed design information of human body sensor (temperature, heart rate, ECG / pulse) circuit diagram. This paper set up software of a wireless network (ZigBee protocol), sensor signal acquisition, wireless transmitting and receiving, and communicate with PC machine by serial communication coordinator node. Experiments show that the network node data transmission accurate, reliable work, basically reached the requirements of the design issues. 展开更多
关键词 Remote monitoring CC2430 sensor node Coordinator node ZigBee protocol
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部