期刊文献+

基于虚拟仪器技术的桥梁监测网络化系统设计与实现 被引量:2

Design and Implementation of State Monitoring Network System for a Bridge
在线阅读 下载PDF
导出
摘要 提出将Intcrnet网络技术、虚拟仪器技术与桥梁状态监测技术有机地结合起来,将桥梁的状态监测提升到远程的网络环境,以提高状态监测的水平和时效性。通过采用TCP/IP网络体系结构,运用LabWindows、DataSocket、C/S拓扑技术等,实现桥梁状态监测的网络化。 The network technology based on Internet, virtual instruments, state monitoring of bridge with large-span are combined in this paper. It is believed that this approach can promote the state mo- nitoring to network environment. As a result, the capability and efficiency of the state monitoring will be significantly improved. The state monitoring is carried out by the aid of the TCP/IP structure, LabVIEW, and DataSocket technology. The reliably technical guarantee for bridge state monitoring is presented to ensure the safe, stable and economic operation.
出处 《交通科技》 2008年第1期28-30,共3页 Transportation Science & Technology
关键词 桥梁监测 虚拟仪器技术 DataSockct 互联网 bridge monitoring virtual instruments dataSocket internet
  • 相关文献

参考文献3

  • 1肖健,吕爱琴,陈吉忠,朱明华.无线传感器网络技术中的关键性问题[J].传感器世界,2004,10(7):14-18. 被引量:31
  • 2Sandra Loret. Static and Dynamic Bridge Moritoring with Fiber Optic Sensors[M]. SPIE International Photonics China Symposium on Laser Optoelectronics and Photoelectronics. 1998,
  • 3Chun Xiao, Qu Weilian. The Application of Internet Technologies in Structural Health Monitoring and Damage[M]. Third China-Japan-US Symposium on Structural Health Monitoring and Control and Fourth Chinese National Conference on Structural Control, 2004.

二级参考文献15

  • 1S. Yi, E Naldurg, R. Kravets. Security-aware ad hoc routing for wireless networks[C]. Proc. of 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2001, pp.299-302.
  • 2D.E. Bell, L.J. LaPadula. Secure computer systems: mathematical foundations and model[R]. Technical Report M74-244, Mitre Corporation, 1975.
  • 3Swades De .Chunming Qiao, Hongyi Wu. Meshed multipath routing with selective forwarding: an efficient strategy in wireless sensor networks[M].
  • 4Sasikanth Avancha, Je.rey Underco.er, Anupam Joshi, John Pinkston. Secure sensor networks for perimeter protection[M].
  • 5A. Perrig, R. Szewczyk, V. Wen, D. Culler, J.D. Tygar. SPINS:security protocols for sensor networks[J]. Wireless Networks 8 (2002)521-534.
  • 6W.R. Heinzelman, J. Kulik, H. Balalkrishnan. Adaptive protocols for information dissemination in wireless sensor networks[C].Proceedings of the Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom_99), Seattle, WA,August 1999, pp. 174-185.
  • 7J. Li, ,1. ,lannotti, D. Couto, D. Karger. R. Morris, A scalable location service for geographic ad hoc routing[C]. ACM Mobicom,2000.
  • 8Ahmed Helmy. Mobility assisted resolution of queries in large scale mobile sensor networks MARQ[J]. Computer Networks, 43(2003) 437458.
  • 9Koen Langendoen, Niels Reijers. Distributed localization in wireless sensor networks: a quantitative comparison[J]. Computer Networks, 43 (2003) 499-518. .
  • 10Hongwei Zhang, Anish Arora. GS3: scalable self-configuration and self-healing in wireless sensor networks[J]. Computer Networks,43 (2003) 459-480.

共引文献30

同被引文献22

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部