Computer Science ›› 2016, Vol. 43 ›› Issue (7): 115-119.doi: 10.11896/j.issn.1002-137X.2016.07.020

Previous Articles     Next Articles

Architecture Design and Implementation of Intelligent Monitoring System in Unattended Operation Regions

LI Hui, ZHANG Ke and XU Liang   

  • Online:2018-12-01 Published:2018-12-01

Abstract: In this paper,a new detection system based on intelligence detection was proposed due to target monitoring acquirements in unattended operation regions and abominable environment.It is an innovation application of existing methods.The system architecture and design (including frame structure,software and hardware design) were described in detail and related tests were carried out.Experimental results show that the system meets the application of most of the network scenarios.

Key words: ZigBee,Wireless sensor network,Unattended operation regions,Monitoring system

[1] ZigBee Alliance Std.ZigBee Specification(ZigBee Document 053474r06 Version 1.0)[R/OL].http://www.eet-China.com/ARTICLES/2006AUG/PDF/ZigBee_01.pdf
[2] Wheeler A.Commercial applications of wireless sensor networks using ZigBee [J].Communications Magazine,IEEE,2007,45(4):70-77
[3] Baker N.ZigBee and Bluetooth strengths and weaknesses for industrial applications [J].Computing & Control Engineering Journal,2005,16(2):20-25
[4] Khusvinder G,Yang Shuang-hua.A ZigBee-based home automation system [J].IEEE Transactions on Consumer Electronics, 2009,55(2):422-430
[5] Malhi K,Mukhopadhyay S C,et al.A ZigBee-based wearable physiological parameters monitoring system [J].IEEE Sensors Journal,2012,12(3):423-430
[6] Song Zhe-cun,Chen Ning,Li Di-fei.Application of Zigbee Wireless Sensor Technology in Forest Conflagration Surveillance[J].Process Automation Instrumentation,2011,32(4):50-52(in Chinese) 宋蛰存,陈宁,李迪飞.ZigBee无线传感技术在森林火灾监测中的应用 [J].自动化仪表,2011,32(4):50-52
[7] Chang Kai,Xue Dong-liang,Sun Qiang,et al.Research and Design of Temperature and Humidity Intelligent Control System in Library[J].Computer Science,2014,41(11):436-439(in Chinese) 昌凯,薛栋梁,孙强,等.图书馆温湿度智能控制系统研究与设计 [J].计算机科学,2014,41(11):436-439
[8] Fan Qing-gang,Ye Xue-mei,Cai Yan-ning.Performance Evaluation of Zigbee Routing Protocol in VANET Monitoring System[J].Computer Science,2014,41(6):326-328(in Chinese) 范青刚,叶雪梅,蔡艳宁.ZigBee路由协议在车载自组网监控系统中的性能研究 [J].计算机科学,2014,41(6):326-328
[9] Cuomo F,Abbagnale A,Cipollone E.Cross-layer network formation for energy-efficient IEEE 802.4/ZigBee Wireless Sensor Networks [J].Ad Hoc Networks,2013,11(2):672-686
[10] Texas Instrument.Z-Stack Developer’s Guide(Document Number:SWRA176).http://www.ti.com.cn
[11] Texas Instrument.CC2530 Datasheethttp://www.ti.com.cn
[12] IEEE Computer Society.IEEE Standards for Local and Metropolitan Area Networks:Overview and Architecture [S/OL].http://www.ieee802.org/1/files/public/docs2013/802-rev-D1T-CMP.pdf
[13] Shuaib K,Boulmalf M.Co-existence of ZigBee and WLAN,aperformance study [C]∥International Conference on Wireless and Optical Communications Networks.2006:1-6
[14] Vinay S,Rahul S,Singh T M.An Analytical Study of Interfe-rence Problem between ZigBee and WI-FI [C]∥International Conference on Communication Systems and Network Technologies.2013:257-261

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .