期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Cloud Storage Technology and Its Applications 被引量:1
1
作者 Zhou Ke Wang Hua Li Chunhua 《ZTE Communications》 2010年第4期27-30,共4页
Cloud storage employs software that interconnects and facilitates collaboration between different types of storage devices Compared with traditional storage methods, cloud storage poses new challenges in data security... Cloud storage employs software that interconnects and facilitates collaboration between different types of storage devices Compared with traditional storage methods, cloud storage poses new challenges in data security, reliability, and management. This paper introduces four layers of cloud storage architecture: data storage layer (connecting multiple storage components), data management layer (providing common support technology for multiple services), data service layer (sustaining multiple storage applications), and user access layer. A typical cloud storage application--Backup Cloud (B-Cloud)--is examined and its software architecture, characteristics, and main research areas are discussed. 展开更多
关键词 cloud storage SERVICE backup cloud
在线阅读 下载PDF
A New Design and Implementation of an Attendance Checking Node for Coal Mines 被引量:4
2
作者 XIA Shi-xiong QIAO Da-lei CHEN Dai ZHOU Yong 《Journal of China University of Mining and Technology》 EI 2007年第2期193-196,共4页
A novel design and implementation of an attendance checking node for coal mines based on the CAN bus is presented in this paper. Hardware circuits and programming methods for the attendance checking node are discussed... A novel design and implementation of an attendance checking node for coal mines based on the CAN bus is presented in this paper. Hardware circuits and programming methods for the attendance checking node are discussed,including the single-chip computer with CAN controller AT89C51CC03,the CAN bus transceiver TJA1050,the large capacity DataFlash memory,the real-time clock DS1302,the voice chip ISD2560 and the card-reading circuit in Wie-gand format. All the extended hardware satisfies the requirements for intrinsically safe circuits (GB3836.4-2000) and intrinsically safe authentication promoted by the national explosion-proof institute. Further,the software programming methods for the CAN controller (AT89C51CC03) and the implementation of the CAN communications protocol are presented as well. 展开更多
关键词 CAN bus attendance checking node wiegand message passing
在线阅读 下载PDF
Mine-hoist fault-condition detection based on the wavelet packet transform and kernel PCA 被引量:3
3
作者 XIA Shi-xiong NIU Qiang ZHOU Yong ZHANG Lei 《Journal of China University of Mining and Technology》 EI 2008年第4期567-570,共4页
A new algorithm was developed to correctly identify fault conditions and accurately monitor fault development in a mine hoist. The new method is based on the Wavelet Packet Transform (WPT) and kernel PCA (Kernel Princ... A new algorithm was developed to correctly identify fault conditions and accurately monitor fault development in a mine hoist. The new method is based on the Wavelet Packet Transform (WPT) and kernel PCA (Kernel Principal Compo- nent Analysis, KPCA). For non-linear monitoring systems the key to fault detection is the extracting of main features. The wavelet packet transform is a novel technique of signal processing that possesses excellent characteristics of time-frequency localization. It is suitable for analysing time-varying or transient signals. KPCA maps the original input features into a higher dimension feature space through a non-linear mapping. The principal components are then found in the higher dimen- sion feature space. The KPCA transformation was applied to extracting the main nonlinear features from experimental fault feature data after wavelet packet transformation. The results show that the proposed method affords credible fault detection and identification. 展开更多
关键词 kernel method PCA KPCA fault condition detection
在线阅读 下载PDF
Energy optimal routing for long chain-type wireless sensor networks in underground mines 被引量:12
4
作者 Jiang Haifeng Qian Jiansheng +1 位作者 Sun Yanjing Zhang Guoyong 《Mining Science and Technology》 EI CAS 2011年第1期17-21,共5页
Wireless sensor networks are useful complements to existing monitoring systems in underground mines. They play an important role of enhancing and improving coverage and flexibility of safety monitoring systems.Regions... Wireless sensor networks are useful complements to existing monitoring systems in underground mines. They play an important role of enhancing and improving coverage and flexibility of safety monitoring systems.Regions prone to danger and environments after disasters in underground mines require saving and balancing energy consumption of nodes to prolong the lifespan of networks.Based on the structure of a tunnel,we present a Long Chain-type Wireless Sensor Network(LC-WSN)to monitor the safety of underground mine tunnels.We define the optimal transmission distance and the range of the key region and present an Energy Optimal Routing(EOR)algorithm for LC-WSN to balance the energy consumption of nodes and maximize the lifespan of networks.EOR constructs routing paths based on an optimal transmission distance and uses an energy balancing strategy in the key region.Simulation results show that the EOR algorithm extends the lifespan of a network,balances the energy consumption of nodes in the key region and effectively limits the length of routing paths,compared with similar algorithms. 展开更多
关键词 Wireless sensor network Energy optimal routing Underground mine Lifespan of network
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部