虫虫首页|资源下载|资源专辑|精品软件
登录|注册

monitoring

  • how to add arrays * Use of const (constant) values. * Creation of vectors. * Passing

    how to add arrays * Use of const (constant) values. * Creation of vectors. * Passing vectors as function arguments. * Reading from files of unknown size (monitoring istream status). * Repetitive structures (while and for loops). * The increment operators (++). * Selection structures (if-else statements). * Use of the .size, .empty, .begin, .insert, .erase, .resize, .clear and .swap vector class member functions.

    标签: Creation constant Passing vectors

    上传时间: 2017-04-25

    上传用户:1079836864

  • "Hard to find" full description of ContactID protocol from Ademco used by many home security devices

    "Hard to find" full description of ContactID protocol from Ademco used by many home security devices to send messages to CMS (Central monitoring Station) about security events. Has full technical description and can be used to easy make CMS communication module that sends info from your alarm system to CMS station.

    标签: description ContactID protocol security

    上传时间: 2017-05-30

    上传用户:lifangyuan12

  • The ¸ GX401EM VXI module provides a powerful digital signal processing platform for efficient

    The ¸ GX401EM VXI module provides a powerful digital signal processing platform for efficient RF wideband and narrowband interception and monitoring

    标签: processing efficient provides powerful

    上传时间: 2017-09-27

    上传用户:15071087253

  • 6LoWPAN+The+Wireless+Embedded+Internet

    The Internet of Things is considered to be the next big opportunity, and challenge, for the Internet engineering community, users of technology, companies and society as a whole. It involves connecting embedded devices such as sensors, home appliances, weather stations and even toys to Internet Protocol (IP) based networks. The number of IP-enabled embedded devices is increasing rapidly, and although hard to estimate, will surely outnumber the number of personal computers (PCs) and servers in the future. With the advances made over the past decade in microcontroller,low-power radio, battery and microelectronic technology, the trend in the industry is for smart embedded devices (called smart objects) to become IP-enabled, and an integral part of the latest services on the Internet. These services are no longer cyber, just including data created by humans, but are to become very connected to the physical world around us by including sensor data, the monitoring and control of machines, and other kinds of physical context. We call this latest frontier of the Internet, consisting of wireless low-power embedded devices, the Wireless Embedded Internet. Applications that this new frontier of the Internet enable are critical to the sustainability, efficiency and safety of society and include home and building automation, healthcare, energy efficiency, smart grids and environmental monitoring to name just a few.

    标签: Embedded Internet Wireless 6LoWPAN The

    上传时间: 2020-05-25

    上传用户:shancjb

  • UMTS+Performance+Measurement+A+Practical+Guide

    Having dealt with in-depth analysis of SS#7, GSM and GPRS networks I started to monitor UTRAN interfaces approximately four years ago. monitoring interfaces means decoding the data captured on the links and analysing how the different data segments and messages are related to each other. In general I wanted to trace all messages belonging to a single call to prove if the network elements and protocol entities involved worked fine or if there had been failures or if any kind of suspicious events had influenced the normal call proceeding or the call’s quality of service. Cases showing normal network behaviour have been documented in Kreher and Ruedebusch (UMTS Signaling. John Wiley & Sons, Ltd, 2005), which provides examples for technical experts investigating call flows and network procedures.

    标签: Performance Measurement Practical Guide UMTS

    上传时间: 2020-06-01

    上传用户:shancjb

  • Wide Area monitoring, Protection

    Today, electric power transmission systems should face many demanding chal- lenges, which include balancing between reliability, economics, environmental, and other social objectives to optimize the grid assets and satisfy the growing electrical demand. Moreover, the operational environment of transmission systems is becoming increasingly rigorous due to continually evolving functions of interconnected power networks from operation jurisdiction to control responsibly – coupled with the rising demand and expectation for reliability.

    标签: monitoring Protection Wide Area

    上传时间: 2020-06-07

    上传用户:shancjb

  • RFID AND SENSOR NETWORKS Architectures

    Radio frequency identification (RFID) technology is witnessing a recent explosion of development in both industry and academia. A number of applications include supply chain management, electronic payments, RFID passports, environmental monitoring and control, office access control, intelligent labels, target detection and tracking, port management, food production control, animal identification, and so on. RFID is also an indispensable foundation to realize the pervasive computing paradigm—“Internet of things.” It is strongly believed that many more scenarios will be identified when the principles of RFID are thoroughly understood, cheap components available, and when RFID security is guaranteed.

    标签: Architectures NETWORKS SENSOR RFID AND

    上传时间: 2020-06-08

    上传用户:shancjb

  • RFID+Security

    Radio frequency identification (RFID) is a type of automatic identification systems which has gained popularity in recent years for being fast and reliable in keeping track of the individual objects. In RFID systems, contactless object identification is achieved using radio signals without the need for physical contact as the case with other existing identification technologies such as barcodes. Therefore, a huge number of items can be identified in a short amount of time with high reliability and low cost which makes the RFID technology very attractive for a wide range of applications such as supply chain management, e-health, monitoring humans, pets, animals, and many other objects, toll control, and electrical tagging. Furthermore, RFID technology eliminates the human error and reduces the total cost of the products.

    标签: Security RFID

    上传时间: 2020-06-08

    上传用户:shancjb

  • RFID+Technologies+for+Internet+of+Things

    Internet of Things (IoT) [26] is a new networking paradigm for cyber-physical systems that allow physical objects to collect and exchange data. In the IoT, physical objects and cyber-agents can be sensed and controlled remotely across existing network infrastructure, which enables the integration between the physical world and computer-based systems and therefore extends the Internet into the real world. IoT can find numerous applications in smart housing, environmental monitoring, medical and health care systems, agriculture, transportation, etc. Because of its significant application potential, IoT has attracted a lot of attention from both academic research and industrial development.

    标签: Technologies Internet Things RFID for of

    上传时间: 2020-06-08

    上传用户:shancjb

  • Atmospheric+monitoring+With+Arduino

    There’s a story (it’s either an old vaudeville joke or a Zen koan) in which a fisherman asks a fish, “What’s the water like down there?” and the fish replies “What is water?” If the story is just a joke, the point is to make us laugh; but if it’s a koan, the point is that the most obvious and ubiquitous parts of our immediate environ- ment are, paradoxically, often the easiest to overlook.

    标签: Atmospheric monitoring Arduino With

    上传时间: 2020-06-09

    上传用户:shancjb