The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the lnternet of Vehicles (IoV). With the rapid development of computation and communication technologies, l...The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the lnternet of Vehicles (IoV). With the rapid development of computation and communication technologies, loV promises huge commercial interest and research value, thereby attracting a large number of companies and researchers. This paper proposes an abstract network model of the IoV, discusses the technologies required to create the IoV, presents different applications based on certain currently existing technologies, provides several open research challenges and describes essential future research in the area of loV.展开更多
This letter proposes fingerprint-based key binding/recovering with fuzzy vault. Fingerprint minutiae data and the cryptographic key are merged together by a multivariable linear function. First, the minutiae data are ...This letter proposes fingerprint-based key binding/recovering with fuzzy vault. Fingerprint minutiae data and the cryptographic key are merged together by a multivariable linear function. First, the minutiae data are bound by a set of random data through the linear function. The number of the function’s variables is determined by the required number of matched minutiae. Then, a new key de- rived from the random data is used to encrypt the cryptographic key. Lastly, the binding data are protected using fuzzy vault scheme. The proposed scheme provides the system with the flexibility to use changeable number of minutiae to bind/recover the protected key and a unified method regardless of the length of the key.展开更多
Cognitive radio and cooperative communication can greatly improve the spectrum efficiency in wireless communications.We study a cognitive radio network where two secondary source terminals exchange their information w...Cognitive radio and cooperative communication can greatly improve the spectrum efficiency in wireless communications.We study a cognitive radio network where two secondary source terminals exchange their information with the assistance of a relay node under interference power constraints.In order to enhance the transmit rate and maintain fairness between two source terminals,a practical 2-phase analog network coding protocol is adopted and its optimal power allocation algorithm is proposed.Numerical results verify the superiority of the proposed algorithm over the conventional direct transmission protocol and 4-phase amplify-and-forward relay protocol.展开更多
Since the frequency of network security incidents is nonlinear,traditional prediction methods such as ARMA,Gray systems are difficult to deal with the problem.When the size of sample is small,methods based on artifici...Since the frequency of network security incidents is nonlinear,traditional prediction methods such as ARMA,Gray systems are difficult to deal with the problem.When the size of sample is small,methods based on artificial neural network may not reach a high degree of preciseness.Least Squares Support Vector Machines (LSSVM) is a kind of machine learning methods based on the statistics learning theory,it can be applied to solve small sample and non-linear problems very well.This paper applied LSSVM to predict the occur frequency of network security incidents.To improve the accuracy,it used an improved genetic algorithm to optimize the parameters of LSSVM.Verified by real data sets,the improved genetic algorithm (IGA) converges faster than the simple genetic algorithm (SGA),and has a higher efficiency in the optimization procedure.Specially,the optimized LSSVM model worked very well on the prediction of frequency of network security incidents.展开更多
We study the transmission capacities of two coexisting spread-spectrum wireless networks (a primary network vs. a secondary network) that operate in the same geographic region and share the same spectrum. We defi ne t...We study the transmission capacities of two coexisting spread-spectrum wireless networks (a primary network vs. a secondary network) that operate in the same geographic region and share the same spectrum. We defi ne transmission capacity as the product among the density of transmissions, the transmission rate, and the successful transmission probability. The primary (PR) network has a higher priority to access the spectrum without particular considerations for the secondary (SR) network, while the SR network limits its interference to the PR network by carefully controlling the density ofits transmitters. Considering two types of spread-spectrum transmission schemes (FH-CDMA and DS-CDMA) and the channel inversion power control mechanism, we quantify the transmission capacities for these two networks based on asymptotic analysis. Our results show that if the PR network permits a small increase ofits outage probability, the sum transmission capacities of the two networks (i.e., the overall spectrumefficiency per unit area) will be boosted significantly over that of a single network.展开更多
Pull-based P2P live streaming is a promising solution for the large scale streaming systems, like PPStream, PPlive, due to its high scalability, low cost and high resilience. However, they usually suffer from bad dela...Pull-based P2P live streaming is a promising solution for the large scale streaming systems, like PPStream, PPlive, due to its high scalability, low cost and high resilience. However, they usually suffer from bad delay performance. In this paper, we seek to improve the delay performance under ensuring video display quality stemming from chunk scheduling. And so we model Pull-based chunk scheduling problem as a multi-objective optimization problem to minimize the video delay and maximize video display quality in the environment of heterogeneous upload bandwidths, heterogeneous and dynamic propagation delays. Finally we put up with a greedy Pull-based scheduling approach(GPSA) to solve the optimization problem. The evaluation shows GPSA can outperform two classical chunk scheduling approaches and adapt to dynamic variance of propagation delays.展开更多
Capacity reduction is a major problem faced by wireless mesh networks. An efficient way to alleviate this problem is proper channel assignment. Current end-toend channel assignment schemes usually focus on the case wh...Capacity reduction is a major problem faced by wireless mesh networks. An efficient way to alleviate this problem is proper channel assignment. Current end-toend channel assignment schemes usually focus on the case where channels in distinct frequency bands are assigned to mesh access and backbone, but actually backbone network and access network can use the same IEEE 802.11 technology. Besides, these channel assignment schemes only utilize orthogonal channels to perform channel assignment, and the resulting network interference dramatically degrades network performance. Moreover, Internet-oriented traffic is considered only, and peerto-peer traffic is omitted, or vice versa. The traffic type does not match the practical network. In this paper, we explore how to exploit partially overlapped channels to perform endto-end channel assignment in order to achieve effective end-to-end flow transmissions. The proposed flow-based end-to-end channel assignment schemes can conquer the limitations aforementioned. Simulations reveal that loadaware channel assignment can be applied to networks with stable traffic load, and it can achieve near-optimal performance; Traffic-irrelevant channel assignment is suitable for networks with frequent change of traffic load,and it can achieve good balance between performance and overhead. Also, partially overlapped channels' capability of improving network performance is situation-dependent, they should be used carefully.展开更多
In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used ...In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used in multi domains environment is proposed and designed,in which,the certificate issuer located in outside of domain can be considered as a proxy server to issue the DAA certificate for valid member nodes directly.Our designed mechanism accords with present trusted computing group (TCG) international specification,and can solve the problems of practical authentication and privacy information protection between different trusted domains efficiently.Compared with present DAA scheme,in our protocol,the anonymity,unforgeability can be guaranteed,and the replay-attack also can be avoided.It has important referenced and practical application value in trusted computing field.展开更多
This paper presents an overview of the current status of the development of the smart grid in Great Britain(GB).The definition,policy and technical drivers,incentive mechanisms,technological focus,and the industry'...This paper presents an overview of the current status of the development of the smart grid in Great Britain(GB).The definition,policy and technical drivers,incentive mechanisms,technological focus,and the industry's progress in developing the smart grid are described.In particular,the Low Carbon Networks Fund and Electricity Network Innovation Competition projects,together with the rollout of smart metering,are detailed.A more observable,controllable,automated,and integrated electricity network will be supported by these investments in conjunction with smart meter installation.It is found that the focus has mainly been on distribution networks as well as on real-time flows of information and interaction between suppliers and consumers facilitated by improved information and communications technology,active power flow management,demand management,and energy storage.The learning from the GB smart grid initiatives will provide valuable guidelines for future smart grid development in GB and other countries.展开更多
Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applicatio...Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applications. There are two types of safety messages which may be exchanged between vehicles: alarm and beacon. In this paper we investigate the feasibility of deploying safety applications based on beacon message dissemination through extensive simulation study and pay special attention to the safety requirements. Vehicles are supposed to issue these messages periodically to announce to other vehicles their current situation and use received messages for preventing possible unsafe situations. We evaluate the performance of a single-hop dissemination protocol while taking into account the quality of service (QoS) metrics like delivery rate and delay. We realize that reliability is the main concern in beacon message dissemination. Thus, a new metric named effective range is defined which gives us more accurate facility for evaluating QoS in safety applications specifically. Then, in order to improve the performance, the effects of three parameters including vehicle's transmission range, message transmission's interval time and message payload size are studied. Due to special characteristics of the safety applications, we model the relationship between communication-level QoS and application-level QoS and evaluate them for different classes of safety applications. As a conclusion, the current technology of IEEE 802.11 MAC layer has still some challenges for automatic safety applications but it can provide acceptable QoS to driver assistance safety applications.展开更多
In Discrete Multi-Tone (DMT) modulation systems, the well-known technique to overcome the Inter-Carrier Interference (ICI)/Inter-Symbol Interference (ISI) caused by the inadequate Cyclic Prefix (CP) length is to use a...In Discrete Multi-Tone (DMT) modulation systems, the well-known technique to overcome the Inter-Carrier Interference (ICI)/Inter-Symbol Interference (ISI) caused by the inadequate Cyclic Prefix (CP) length is to use a Time-Domain Equalizer (TDE) at the receiver front-end. An algorithm used to calculate the coefficients of the optimal shortening Time Domain Equalizer (TDE) was given by Melsa. However, this algorithm requires that the length of the TDE must be smaller than or equal to the memory length of the target impulse response. This paper modifies this algorithm and makes it not only fit for calculating the coefficients of the TDE with arbitrary length, but also have a much less computational time.展开更多
In this paper,the basic requirements of the smart grid in China are studied.By applying Internet of Things(IoT) technologies,various intelligent services can be created.The development of the smart grid would rely hea...In this paper,the basic requirements of the smart grid in China are studied.By applying Internet of Things(IoT) technologies,various intelligent services can be created.The development of the smart grid would rely heavily on the application of IoT.The three-layer architecture of IoT for the smart grid in China is introduced.Various information and communication technologies of IoT applied to smart grid are discussed.Particularly,several typical IoT application solutions such as power transmission line monitoring,smart patrol,smart home and electric vehicle management,are provided.展开更多
Our study deals with two major issues impacting current WebGIS development: interoperability of heterogeneous data and visualization of vector data on the Web. By using the combination of Geography Markup Language (...Our study deals with two major issues impacting current WebGIS development: interoperability of heterogeneous data and visualization of vector data on the Web. By using the combination of Geography Markup Language (GML), Scalable Vector Graphics (SVG) and Web Feature Service (WFS) Implementation Specifications developed by the OpenGIS Consortium (OGC), a strategy of WebGIS is proposed. The GML is used as a coding and data transportation mechanism to realize interoperability, the SVG to display GML data on the Web and the WFS as a data query mechanism to access and retrieve data at the feature level in real time on the Web. A case study shows that the combination mentioned above has enormous potential to achieve interoperability while not requiring considerable changes to existing legacy data. Original data formats need not be changed and could still be retrieved using WFS and transformed into GML in real time. SVG can oroduce suoerior ouality vector maps on a Web browser.展开更多
An integrated monitoring system for running parameters of key mining equipmenton the basis of condition monitoring technology and modern communication networktechnology was developed.The system consists of a client co...An integrated monitoring system for running parameters of key mining equipmenton the basis of condition monitoring technology and modern communication networktechnology was developed.The system consists of a client computer with functions ofsignal acquisition and processing, and a host computer in the central control room.Thesignal acquisition module of the client computer can collect the running parameters fromvarious monitoring terminals in real-time.The DSP high-speed data processing system ofthe main control module can quickly achieve the numerical calculation for the collectedsignal.The signal modulation and signal demodulation are completed by the frequencyshift keying circuit and phase-locked loop frequency circuit, respectively.Finally, the signalis sent to the host computer for logic estimation and diagnostic analysis using the networkcommunication technology, which is helpful for technicians and managers to control therunning state of equipment.展开更多
The concepts of information fusion and the basic principles of neural networks are introduced. Neural net-works were introduced as a way of building an information fusion model in a coal mine monitoring system. This a...The concepts of information fusion and the basic principles of neural networks are introduced. Neural net-works were introduced as a way of building an information fusion model in a coal mine monitoring system. This assures the accurate transmission of the multi-sensor information that comes from the coal mine monitoring systems. The in-formation fusion mode was analyzed. An algorithm was designed based on this analysis and some simulation results were given. Finally,conclusions that could provide auxiliary decision making information to the coal mine dispatching officers were presented.展开更多
Laboratory information management based on the technology of Interact of things technology is the development trend of digital and information technology education in our country and the inevitable choice. Through the...Laboratory information management based on the technology of Interact of things technology is the development trend of digital and information technology education in our country and the inevitable choice. Through the fiLnher study of the current situation of laboratory management in colleges and universities and the characteristics of the Internet of things technology, this paper introduces the concept of Interact of things tec^mology, history and current situation of the development. With the most representative IOT architecture and Ubiquitous ID IOT system as an example, analyzes the RFID technology, sensor network and detection technology, intelligent technology and characteristics of Nanometer technology. Analysis the technical foundation for the development of the campus Interact of things, and give the Internet of things technology in the application of the laboratory management technology.展开更多
The next wave of communication and applications will rely on new services provided by the Internet of Things which is becoming an important aspect in human and machines future. IoT services are a key solution for prov...The next wave of communication and applications will rely on new services provided by the Internet of Things which is becoming an important aspect in human and machines future. IoT services are a key solution for providing smart environments in homes, buildings, and cities. In the era of massive number of connected things and objects with high growth rate, several challenges have been raised, such as management, aggregation, and storage for big produced data. To address some of these issues, cloud computing emerged to the IoT as Cloud of Things (COT), which provides virtually unlimited cloud services to enhance the large-scale IoT platforms. There are several factors to be considered in the design and implementation of a CoT platform. One of the most important and challenging problems is the heterogeneity of different objects. This problem can be addressed by deploying a suitable "middleware" which sits between things and applications as a reliable platform for communication among things with different interfaces, operating systems, and architectures. The main aim of this paper is to study the middleware technologies for CoT. Toward this end, we first present the main features and characteristics of middlewares. Next, we study different architecture styles and service domains. Then, we present several middlewares that are suitable for CoT-based platforms and finally, a list of current challenges and issues in the design of CoT-based middlewares is discussed.展开更多
基金supported by the Natural Science Foundation of Beijing under Grant No.4132048,NSFC(61472047),and NSFC(61202435)
文摘The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the lnternet of Vehicles (IoV). With the rapid development of computation and communication technologies, loV promises huge commercial interest and research value, thereby attracting a large number of companies and researchers. This paper proposes an abstract network model of the IoV, discusses the technologies required to create the IoV, presents different applications based on certain currently existing technologies, provides several open research challenges and describes essential future research in the area of loV.
基金Supported by the National Natural Science Foundation of China (No.60472069)
文摘This letter proposes fingerprint-based key binding/recovering with fuzzy vault. Fingerprint minutiae data and the cryptographic key are merged together by a multivariable linear function. First, the minutiae data are bound by a set of random data through the linear function. The number of the function’s variables is determined by the required number of matched minutiae. Then, a new key de- rived from the random data is used to encrypt the cryptographic key. Lastly, the binding data are protected using fuzzy vault scheme. The proposed scheme provides the system with the flexibility to use changeable number of minutiae to bind/recover the protected key and a unified method regardless of the length of the key.
基金Acknowledgements The work was supported by National Natural Science Foundation of China (Grant No.60972008). The corresponding author is Jiang Wei.
文摘Cognitive radio and cooperative communication can greatly improve the spectrum efficiency in wireless communications.We study a cognitive radio network where two secondary source terminals exchange their information with the assistance of a relay node under interference power constraints.In order to enhance the transmit rate and maintain fairness between two source terminals,a practical 2-phase analog network coding protocol is adopted and its optimal power allocation algorithm is proposed.Numerical results verify the superiority of the proposed algorithm over the conventional direct transmission protocol and 4-phase amplify-and-forward relay protocol.
基金supported in part by the National High Technology Research and Development Program of China ("863" Program) (No.2007AA010502)
文摘Since the frequency of network security incidents is nonlinear,traditional prediction methods such as ARMA,Gray systems are difficult to deal with the problem.When the size of sample is small,methods based on artificial neural network may not reach a high degree of preciseness.Least Squares Support Vector Machines (LSSVM) is a kind of machine learning methods based on the statistics learning theory,it can be applied to solve small sample and non-linear problems very well.This paper applied LSSVM to predict the occur frequency of network security incidents.To improve the accuracy,it used an improved genetic algorithm to optimize the parameters of LSSVM.Verified by real data sets,the improved genetic algorithm (IGA) converges faster than the simple genetic algorithm (SGA),and has a higher efficiency in the optimization procedure.Specially,the optimized LSSVM model worked very well on the prediction of frequency of network security incidents.
基金supported in part by the China 863 Program grants 2007AA10Z235, 2007AA01Z179, 2006BAJ09B05, 2008BADA0B05the NSFC grants 60972073, 60871042, 60872049, and 60971082+1 种基金the China National Great Science Specifi c Project grant 2009ZX03003-011the China 973 Program grant 2009CB320407
文摘We study the transmission capacities of two coexisting spread-spectrum wireless networks (a primary network vs. a secondary network) that operate in the same geographic region and share the same spectrum. We defi ne transmission capacity as the product among the density of transmissions, the transmission rate, and the successful transmission probability. The primary (PR) network has a higher priority to access the spectrum without particular considerations for the secondary (SR) network, while the SR network limits its interference to the PR network by carefully controlling the density ofits transmitters. Considering two types of spread-spectrum transmission schemes (FH-CDMA and DS-CDMA) and the channel inversion power control mechanism, we quantify the transmission capacities for these two networks based on asymptotic analysis. Our results show that if the PR network permits a small increase ofits outage probability, the sum transmission capacities of the two networks (i.e., the overall spectrumefficiency per unit area) will be boosted significantly over that of a single network.
基金supported by National Key Basic Research Program of China(973 Program)(2009CB320504)the Foundation for Innovative Research Groups of the National Natural Science Foundation of China (Grant No. 60821001)+1 种基金Beijing Municipal Commission of Education to build the project special,Research Fund for the Doctoral Program of Higher Education of China (20090005120012)National Natural Science Foundation (60672121)
文摘Pull-based P2P live streaming is a promising solution for the large scale streaming systems, like PPStream, PPlive, due to its high scalability, low cost and high resilience. However, they usually suffer from bad delay performance. In this paper, we seek to improve the delay performance under ensuring video display quality stemming from chunk scheduling. And so we model Pull-based chunk scheduling problem as a multi-objective optimization problem to minimize the video delay and maximize video display quality in the environment of heterogeneous upload bandwidths, heterogeneous and dynamic propagation delays. Finally we put up with a greedy Pull-based scheduling approach(GPSA) to solve the optimization problem. The evaluation shows GPSA can outperform two classical chunk scheduling approaches and adapt to dynamic variance of propagation delays.
基金supported by the National Natural Science Foundation of China under Grants No.61373124
文摘Capacity reduction is a major problem faced by wireless mesh networks. An efficient way to alleviate this problem is proper channel assignment. Current end-toend channel assignment schemes usually focus on the case where channels in distinct frequency bands are assigned to mesh access and backbone, but actually backbone network and access network can use the same IEEE 802.11 technology. Besides, these channel assignment schemes only utilize orthogonal channels to perform channel assignment, and the resulting network interference dramatically degrades network performance. Moreover, Internet-oriented traffic is considered only, and peerto-peer traffic is omitted, or vice versa. The traffic type does not match the practical network. In this paper, we explore how to exploit partially overlapped channels to perform endto-end channel assignment in order to achieve effective end-to-end flow transmissions. The proposed flow-based end-to-end channel assignment schemes can conquer the limitations aforementioned. Simulations reveal that loadaware channel assignment can be applied to networks with stable traffic load, and it can achieve near-optimal performance; Traffic-irrelevant channel assignment is suitable for networks with frequent change of traffic load,and it can achieve good balance between performance and overhead. Also, partially overlapped channels' capability of improving network performance is situation-dependent, they should be used carefully.
基金Acknowledgements This work was supported by Research Funds of Information Security Key Laboratory of Beijing Electronic Science & Technology Institute National Natural Science Foundation of China(No. 61070219) Building Together Specific Project from Beijing Municipal Education Commission.
文摘In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used in multi domains environment is proposed and designed,in which,the certificate issuer located in outside of domain can be considered as a proxy server to issue the DAA certificate for valid member nodes directly.Our designed mechanism accords with present trusted computing group (TCG) international specification,and can solve the problems of practical authentication and privacy information protection between different trusted domains efficiently.Compared with present DAA scheme,in our protocol,the anonymity,unforgeability can be guaranteed,and the replay-attack also can be avoided.It has important referenced and practical application value in trusted computing field.
基金supported in part by the UK-China NSFC/ EPSRC OPEN project (EP/K006274/1 and 51261130473)the Horizon 2020 project P2P-Smart Test
文摘This paper presents an overview of the current status of the development of the smart grid in Great Britain(GB).The definition,policy and technical drivers,incentive mechanisms,technological focus,and the industry's progress in developing the smart grid are described.In particular,the Low Carbon Networks Fund and Electricity Network Innovation Competition projects,together with the rollout of smart metering,are detailed.A more observable,controllable,automated,and integrated electricity network will be supported by these investments in conjunction with smart meter installation.It is found that the focus has mainly been on distribution networks as well as on real-time flows of information and interaction between suppliers and consumers facilitated by improved information and communications technology,active power flow management,demand management,and energy storage.The learning from the GB smart grid initiatives will provide valuable guidelines for future smart grid development in GB and other countries.
基金the Iran Telecommunication Research Center (ITRC)
文摘Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applications. There are two types of safety messages which may be exchanged between vehicles: alarm and beacon. In this paper we investigate the feasibility of deploying safety applications based on beacon message dissemination through extensive simulation study and pay special attention to the safety requirements. Vehicles are supposed to issue these messages periodically to announce to other vehicles their current situation and use received messages for preventing possible unsafe situations. We evaluate the performance of a single-hop dissemination protocol while taking into account the quality of service (QoS) metrics like delivery rate and delay. We realize that reliability is the main concern in beacon message dissemination. Thus, a new metric named effective range is defined which gives us more accurate facility for evaluating QoS in safety applications specifically. Then, in order to improve the performance, the effects of three parameters including vehicle's transmission range, message transmission's interval time and message payload size are studied. Due to special characteristics of the safety applications, we model the relationship between communication-level QoS and application-level QoS and evaluate them for different classes of safety applications. As a conclusion, the current technology of IEEE 802.11 MAC layer has still some challenges for automatic safety applications but it can provide acceptable QoS to driver assistance safety applications.
文摘In Discrete Multi-Tone (DMT) modulation systems, the well-known technique to overcome the Inter-Carrier Interference (ICI)/Inter-Symbol Interference (ISI) caused by the inadequate Cyclic Prefix (CP) length is to use a Time-Domain Equalizer (TDE) at the receiver front-end. An algorithm used to calculate the coefficients of the optimal shortening Time Domain Equalizer (TDE) was given by Melsa. However, this algorithm requires that the length of the TDE must be smaller than or equal to the memory length of the target impulse response. This paper modifies this algorithm and makes it not only fit for calculating the coefficients of the TDE with arbitrary length, but also have a much less computational time.
基金supported by the foundations of the Important National Science & Technology Specific Projects of China under Grant 2010ZX03006-005-02the National Basic Research Program of China (973 Program) under Grant 2011CB302900
文摘In this paper,the basic requirements of the smart grid in China are studied.By applying Internet of Things(IoT) technologies,various intelligent services can be created.The development of the smart grid would rely heavily on the application of IoT.The three-layer architecture of IoT for the smart grid in China is introduced.Various information and communication technologies of IoT applied to smart grid are discussed.Particularly,several typical IoT application solutions such as power transmission line monitoring,smart patrol,smart home and electric vehicle management,are provided.
基金Project 2006A018 supported by the Youth Scientific Research Foundation of China University of Mining & Technology
文摘Our study deals with two major issues impacting current WebGIS development: interoperability of heterogeneous data and visualization of vector data on the Web. By using the combination of Geography Markup Language (GML), Scalable Vector Graphics (SVG) and Web Feature Service (WFS) Implementation Specifications developed by the OpenGIS Consortium (OGC), a strategy of WebGIS is proposed. The GML is used as a coding and data transportation mechanism to realize interoperability, the SVG to display GML data on the Web and the WFS as a data query mechanism to access and retrieve data at the feature level in real time on the Web. A case study shows that the combination mentioned above has enormous potential to achieve interoperability while not requiring considerable changes to existing legacy data. Original data formats need not be changed and could still be retrieved using WFS and transformed into GML in real time. SVG can oroduce suoerior ouality vector maps on a Web browser.
基金Supported by the National Hi-tech Research and Development Program of China(2007AA04Z415)the Hunan Province and Xiangtan City Natural Science Joint Foundation(09JJ8005)the Torch Program Project of Hunan Province(2008SH044)
文摘An integrated monitoring system for running parameters of key mining equipmenton the basis of condition monitoring technology and modern communication networktechnology was developed.The system consists of a client computer with functions ofsignal acquisition and processing, and a host computer in the central control room.Thesignal acquisition module of the client computer can collect the running parameters fromvarious monitoring terminals in real-time.The DSP high-speed data processing system ofthe main control module can quickly achieve the numerical calculation for the collectedsignal.The signal modulation and signal demodulation are completed by the frequencyshift keying circuit and phase-locked loop frequency circuit, respectively.Finally, the signalis sent to the host computer for logic estimation and diagnostic analysis using the networkcommunication technology, which is helpful for technicians and managers to control therunning state of equipment.
基金project BK2001073 supported by Jiangsu Province Natural Science Foundation
文摘The concepts of information fusion and the basic principles of neural networks are introduced. Neural net-works were introduced as a way of building an information fusion model in a coal mine monitoring system. This assures the accurate transmission of the multi-sensor information that comes from the coal mine monitoring systems. The in-formation fusion mode was analyzed. An algorithm was designed based on this analysis and some simulation results were given. Finally,conclusions that could provide auxiliary decision making information to the coal mine dispatching officers were presented.
文摘Laboratory information management based on the technology of Interact of things technology is the development trend of digital and information technology education in our country and the inevitable choice. Through the fiLnher study of the current situation of laboratory management in colleges and universities and the characteristics of the Internet of things technology, this paper introduces the concept of Interact of things tec^mology, history and current situation of the development. With the most representative IOT architecture and Ubiquitous ID IOT system as an example, analyzes the RFID technology, sensor network and detection technology, intelligent technology and characteristics of Nanometer technology. Analysis the technical foundation for the development of the campus Interact of things, and give the Internet of things technology in the application of the laboratory management technology.
文摘The next wave of communication and applications will rely on new services provided by the Internet of Things which is becoming an important aspect in human and machines future. IoT services are a key solution for providing smart environments in homes, buildings, and cities. In the era of massive number of connected things and objects with high growth rate, several challenges have been raised, such as management, aggregation, and storage for big produced data. To address some of these issues, cloud computing emerged to the IoT as Cloud of Things (COT), which provides virtually unlimited cloud services to enhance the large-scale IoT platforms. There are several factors to be considered in the design and implementation of a CoT platform. One of the most important and challenging problems is the heterogeneity of different objects. This problem can be addressed by deploying a suitable "middleware" which sits between things and applications as a reliable platform for communication among things with different interfaces, operating systems, and architectures. The main aim of this paper is to study the middleware technologies for CoT. Toward this end, we first present the main features and characteristics of middlewares. Next, we study different architecture styles and service domains. Then, we present several middlewares that are suitable for CoT-based platforms and finally, a list of current challenges and issues in the design of CoT-based middlewares is discussed.