首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 281 毫秒
1.
针对环形流水线上数据采集和工序状态问题,由于环形流水线布线难、繁复,构建了基于ZigBee无线传感器网络与射频识别(RFID)技术的环形流水线数据采集与监控系统。详细介绍系统软件和硬件设计。使用片上系统芯片CC2530F256实现z培Bee无线模块设计,RFID信息识别确定工序状态。通过ZigBee传感器网络实现信息传输。实验结果表明:该系统能够满足环形流水线数据采集和监控要求。  相似文献   

2.
1.前言 随着信息产业的日异革新以及网络的迅猛发展,智能卡技术已被社会的各行各业所接受并应用。其中非接触式智能卡“一卡通”因其技术的先进、使用的便利、保密安全等特性越来越广泛地应用在各个领域,政府机关、办公大楼、智能小区、大型企业、商业消费、高速公路收费、校园、医院等,身份识别、停车场管理、门禁、  相似文献   

3.
RFID是一种非接触识别技术,具有广阔的应用前景.针对有线门禁系统布线繁琐的缺点,设计了一种基于无线传输的门禁系统.系统采用RFID技术,对用户刷卡信息和密码进行认证.门禁控制器通过无线数据传输模块连接到管理计算机,对用户信息和卡信息进行文件和数据库管理.实际应用结果表明,系统运行稳定,实时性好.  相似文献   

4.
基于RFID的智能车辆管理系统   总被引:4,自引:0,他引:4  
介绍基于RFID智能车辆管理系统的软硬件设计,重点分析了系统构成、防盗设计、RFID卡的选择以及车辆出入管理软件的功能,该车辆管理系统不仅使用方便,而且还可以实现车辆智能识别和车辆防盗,在小区、学校、停车场等车辆管理场合中具有较好的推广应用价值。  相似文献   

5.
射频识别技术(Radio Frequency Identification,RFID)是一种利用射频通信实现的非接触式自动识别技术,它通过与互联网、通信等技术结合,实现全球范围内物品跟踪与信息共享。通过分析Fefica、NFC、双界面SIM卡、RF-SIM卡等4种射频识别技术的发展现状、技术和应用特征,为该技术的应用和推广提供参考性的策略和建议。  相似文献   

6.
通过对当前电子商务及电子政务安全性以及灵活性的分析,结合双因子认证技术,实现了一种基于SIM卡的安全移动通信解决方案。该SIM卡以硬件方式实现了加解密、签名、认证等模块,运用PKI技术实现移动通信过程中签名用户身份、认证以及安全传输等特定的业务信息。同时SIM卡使用了PIN码技术,保证了用户对SIM卡访问的合法性,进一步增强其应用系统的安全性。  相似文献   

7.
基于射频识别的停车场管理系统设计与实现   总被引:1,自引:0,他引:1  
介绍上海交大研制的以远距离无源UHF波段的射频识别技术为核心的PUR3000读写器的硬件系统,结合基于串口通信的读写器控制模块和上层逻辑模块给出了RFID停车场管理系统的应用解决方案,以Windows平台的Visual Studio 2005为开发环境,利用串口通信的API实现访问RFID读写器的功能,最终完成了停车场管理系统的基本功能。  相似文献   

8.
在大型停车场如何快速停车是管理者与停车者之间存在的最大的难题。为了解决这个困扰社会管理的难题,文中提出了一种基于ZigBee与S3C2440的大型停车场管理系统解决方案。该系统采用CC2430和超声波传感器采集与传输停车场车位信息,并用S3C2440和MFRC522模块解决停车场收费问题,用LED点阵屏实时显示停车场车位信息以及引导停车者快速停车。整个系统能够智能地管理与引导停车者快速停车。  相似文献   

9.
姜鹤松 《A&S》2009,(7):64-66
作为一项领先的智能识别技术,RFID在安防领域的应用非常广泛,如门禁控制、停车场管理、资产跟踪,食品安全等等。虽然RFID技术具有很多的优势及广阔的前景,但当前其发展仍然受到各种因素的制约。对此,本文试作分析。  相似文献   

10.
黄炯  王志明 《计算机系统应用》2013,22(10):100-102,99
针对小区停车场车辆被盗和现今汽车防盗报警产品的短距离报警与低可靠性等缺点,设计了基于ZigBee和GSM的车辆防盗报警系统.该系统利用多传感器技术对停车场内的车辆实时监测,将报警信息通过短距离无线通信网络和GSM短信平台发送至车主和停车场管理室,实现了短距离无线数据发送和远程报警功能.  相似文献   

11.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

12.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

13.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

14.
Kim  K. H. 《Real-Time Systems》2004,26(1):9-28
Distributed real-time simulation is a young technology field but its practice is under increasing demands. In recent years the author and his collaborators have been establishing a new approach called the distributed time-triggered simulation (DTS) scheme which is conceptually simple and easy to use but widely applicable. The concept was initiated in the course of developing a new-generation object-oriented real-time programming scheme called the time-triggered message-triggered object (TMO) programming scheme. Some fundamental issues inherent in distributed real-time simulation that were learned during recent experimental studies are discussed along with some approaches for resolving the issues. An execution engine developed to support both the TMOs engaged in control computation and the TMOs engaged in DTS is also discussed along with its possible extensions that will enable significantly larger-scale DTSs.  相似文献   

15.
Zusammenfassung Mit zunehmender Größe der Softwaresysteme verschärfen sich die für die Software-Herstellung typischen Probleme: Beherrschen großer Objektmengen, Erhalten der Systemkonsistenz, Kontrolle der ständigen Änderungseinflüsse und Gewährleisten einer langen Lebensdauer. Die Disziplin Konfigurationsmanagement bildet den methodischen Ansatz, diese Probleme besser zu beherrschen. Software-Konfigurationsmanagement faßt die Herstellung von Softwaresystemen als eine Abfolge von kontrollierten Änderungen an gesicherten Zwischen- und Endergebnissen auf. Dargestellt werden die Objekte und Funktionen des Software-Konfigurationsmanagements sowie die hierfür in großen Software-Projekten benötigten Methoden, Instanzen und Hilfsmittel.  相似文献   

16.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and  相似文献   

17.
正Brain-machine interfaces(BMIs)aim at building a direct communication pathway between the brain and an external device,and represent an area of research where significant progress has been made during the past decade.Based on BMIs,mind information can be read out by neural signals to control  相似文献   

18.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

19.
20.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号