Laboratory remote monitoring system
A remote monitoring system and monitoring system technology, applied in transmission systems, emergency protection circuit devices for limiting overcurrent/overvoltage, electrical components, etc. , the monitoring data is not encrypted, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0075] Such as figure 1 A laboratory remote monitoring system shown includes a laboratory monitoring system, a web embedded node system and a communication system, and the laboratory monitoring system transmits the monitored information to a remote terminal through the communication system, and the remote terminal will The received monitoring information is transmitted to the web server through the web embedded node system to realize online information sharing and remote whole network control; the communication system includes a communication optimization algorithm and a communication security algorithm; Registration service.
[0076] The web server includes the following operations:
[0077] S1: Written in C++ language, its source code is portable;
[0078] S2: Utilize CPU resources;
[0079] S3: optimize the SQL algorithm;
[0080] S4: Provide TCP / IP, ODBC database connection methods;
[0081] S5: Effectively store data information.
[0082] The web embedded node syste...
Embodiment 2
[0085] The present embodiment discloses that in the communication security algorithm, given Chebyshev mapping τ(x)=cos( μ cos -1 (x))
[0086] Where x is the orbital value of communication data, satisfying x∈I=[-1,1], I is an integer; defining the real orbital value of communication data as:
[0087] |x|=0,B 1 (x),B 2 (x)...B i (x); B i (x)∈{0,1}
[0088] its i-th bit B i (x) can be expressed as:
[0089]
[0090] where Θ i (x) is the threshold function, defined as:
[0091]
[0092] It can be concluded The masking of the communication encryption algorithm breaks the fixed relationship between the symbol sequence of the information to be transmitted and the mapping sub-intervals.
[0093] In the communication security algorithm, the information to be transmitted σ n represented as a binary sequence {s i},details as follows:
[0094]
[0095] use pair sequence {s i} for masking, ie mask m i for
[0096] where B i is a sequence of only one bit.
...
Embodiment 3
[0110] In this embodiment, in the communication optimization algorithm, the data transmission rate C is defined j for
[0111]
[0112] Among them, l∈U, U represents the set of users who need a data packet j, k is the selected sender; g kl is the channel gain, and the transmit power is p d and p c, the interference is Inf, N 0 is the Gaussian white noise spectral density, and B is the channel loan.
[0113] According to Neigh j The set of U selects the best relay node, and the transmission rate is obtained as:
[0114]
[0115] where l ∈ Neigh j ∪U is the set of neighbor nodes that can provide data packet j for the target node.
[0116] This embodiment image 3 The transmission rate CDF curves corresponding to different algorithms are shown. Among them, the cooperative algorithm based on relay forwarding is significantly better than the D2D multicast algorithm transmission. This method has similar system throughput to the D2D multicast algorithm using the relay t...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com