Font Size: a A A

Research On Intelligent Monitoring And Management System Technique Based On The Wireless Sensor Networks

Posted on:2012-07-25Degree:MasterType:Thesis
Country:ChinaCandidate:J HeFull Text:PDF
GTID:2178330335499636Subject:Pattern Recognition and Intelligent Systems
Abstract/Summary:PDF Full Text Request
With China's continuous progress of information technology, information security becomes predominantly important. The characteristics of secret vector - small size, high capacity and easy to carry - threat information security management greatly. The existing information security management methods contain human management and regulation restriction mainly which are lack of identity authentication and with weak self-protect capacity. The moving places always go out of control. Thereby, the traditional information security management methods cannot meet the full range of requirements from enterprises and institutions.This paper uses security vector management as study background. Closely around the characteristics and design requirement, using secret vector?s activity region as starting point, taking advantage of the features of the wireless sensor technology and based on the full analysis of the wireless sensor?s network framework, an intelligent control system solution based on wireless sensor network is proposed. The safety concept of secret vector ?Region Control? is mentioned for the first time in this system. This concept not only improves intelligence but also the capacity of the control system.Secondly, this paper elaborates the key technology adopted in secret vector control system.In the automatic identification technology, this paper analyzes the features of the currently popular automation identification technology in detail.In the automatic identification technology, this paper analyzes the features of the currently popular automation identification technology in detail. Combining the characteristic of the clear bound of Low Frequency Signal with the characteristic of the penetrability of the High Frequency Signal , a smart identification method based on dual-frequency is raised. This method not only reduces the power consumption of the radio frequency card, but also improves the automatic identification efficiency and range. The ability of identifying rough locations is improved too.As for the wake-up technology in low-frequency, this paper describes the low-frequency wake-up methods both from hardware and software perspectives in detail. According to the practical application, Soft Demodulated Algorithm which not only improves the detection precision and wake up accuracy but also expands the coverage of low-frequency signals effectively.In wireless data access technology, taking serious communication channel blockage of multi-carrier in small range into consideration and analyzing ALOHA protocol based on time slot, a wireless data access method is designed. The application results show that this method obtains a high data packet delivery ratio, greatly improves the system?s concurrent identification accuracy to a large number of RF cards.On the judgment of in-out state of carriers, a new method judging carrier?s in and out state is developed. Because of the characteristic of the clear bound of Low Frequency Signal and the different RSSI of the Wide-bean directional antenna, we can judge the n-out state of carriers. This method is simple, reliable and easy to construct.The application suggests that the proposed monitoring program can provide a safer secret vector management. Research results can be applied to enterprises and institutions, to build viable and efficient protection and defense services for secret information.
Keywords/Search Tags:Security Vector, Wireless Sensor Networks (WSNs), Low-Frequency Wake-up Technology, Radio Frequency Identification (RFID), Intelligent Monitoring and Management, Information Security
PDF Full Text Request
Related items