CN106210066A - A kind of indoor irrigation system of long-range monitoring - Google Patents

A kind of indoor irrigation system of long-range monitoring Download PDF

Info

Publication number
CN106210066A
CN106210066A CN201610556376.XA CN201610556376A CN106210066A CN 106210066 A CN106210066 A CN 106210066A CN 201610556376 A CN201610556376 A CN 201610556376A CN 106210066 A CN106210066 A CN 106210066A
Authority
CN
China
Prior art keywords
data
mail
information
crop
indoor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201610556376.XA
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610556376.XA priority Critical patent/CN106210066A/en
Publication of CN106210066A publication Critical patent/CN106210066A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • AHUMAN NECESSITIES
    • A01AGRICULTURE; FORESTRY; ANIMAL HUSBANDRY; HUNTING; TRAPPING; FISHING
    • A01GHORTICULTURE; CULTIVATION OF VEGETABLES, FLOWERS, RICE, FRUIT, VINES, HOPS OR SEAWEED; FORESTRY; WATERING
    • A01G25/00Watering gardens, fields, sports grounds or the like
    • A01G25/16Control of watering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network

Landscapes

  • Engineering & Computer Science (AREA)
  • Water Supply & Treatment (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Environmental Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The indoor irrigation system of a kind of long-range monitoring, including cloud network, weather data storehouse, crop data storehouse, optimal parameter computing unit, wireless router, controller, mobile phone terminal, spray equipment, temperature sensor, soil moisture detection device and room conditioning;Described temperature sensor and soil moisture detection device detect the moisture in indoor temperature and soil respectively, and the data detected are sent to cloud network and process by controller and wireless router and store, the data relevant with crop are stored in crop data storehouse;Weather data storehouse obtains meteorological observatory's weather forecast data at Web realease automatically, optimal parameter computing unit calculates the Optimum Irrigation water yield, time and the indoor temperature of every kind of crop according to crop data and weather forecast data according to the formula pre-entered, and result of calculation is sent to mobile phone terminal, user controls spray equipment and room conditioning by controller, thus controls duty and indoor temperature.

Description

A kind of indoor irrigation system of long-range monitoring
Technical field
The present invention relates to crop irrigation field, in particular to the indoor irrigation system of a kind of long-range monitoring.
Background technology
The irrigation method used in the market is substantially all the most original, wastes the most serious.Therefore one is developed Can extensively apply, highly intelligent, cost is the highest, can calculate crop Optimum Irrigation parameter and have the indoor of high Information Security Irrigation system will have extremely important realistic meaning.
Summary of the invention
It is an object of the invention to provide the indoor irrigation system of a kind of long-range monitoring, to solve above-mentioned problem.
For solving above-mentioned technical problem, the technical solution used in the present invention is:
The indoor irrigation system of a kind of long-range monitoring, including cloud network, weather data storehouse, crop data storehouse, optimal parameter Computing unit, wireless router, controller, mobile phone terminal, spray equipment, temperature sensor, soil moisture detection device and indoor Air-conditioning;Described temperature sensor and soil moisture detection device detect the moisture in indoor temperature and soil respectively, and by controlling The data detected are sent to cloud network and process and store by device and wireless router, and the data relevant with crop are stored into In crop data storehouse;Described weather data storehouse obtains meteorological observatory's weather forecast data at Web realease, optimal parameter meter automatically Calculate unit and calculate the Optimum Irrigation water of every kind of crop according to crop data and weather forecast data according to the formula pre-entered Amount, time and indoor temperature, and result of calculation is sent to mobile phone terminal, user controls spray equipment and room by controller Interior air-conditioning, thus control duty and indoor temperature.
Beneficial effect: utilizing cloud network to control irrigation system, unit cost significantly declines, it is possible to achieve indoor irrigation Remotely control, detect, and the Optimum Irrigation parameter of crop can be calculated, be convenient for people to be controlled.
It should be appreciated that it is only exemplary that above general description and details hereinafter describe, can not be limited this Open.
Accompanying drawing explanation
Fig. 1 is the connection diagram of each module of the present invention;
Fig. 2 is the structured flowchart of secure visual system.
Reference:
Information data excavates module-1;Information pre-processing module-2;Information storage module-3;Information analysis and displaying mould Block-4;Data Dimensionality Reduction unit-21;Data identification unit-22;Data sorting unit-23;Contact relation analysis displaying submodule- 41;Submodule-42 is shown in daily record number of times distributional analysis;Between IP, information sends relation analysis displaying submodule-43;Sensitive mail turns Send out path analysis and show submodule-44;Distributed denial of service attack data analysis and displaying submodule-45;Cloud network- 100;Weather data storehouse-200;Crop data storehouse-300;Optimal parameter computing unit-400;Wireless router-500;Controller- 600;Mobile phone terminal-700;Spray equipment-800;Temperature sensor-900;Soil moisture detection device-1000;Room conditioning- 1100;Photographic head-1200.
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet the enforcement of the present invention Example, and for explaining the principle of the present invention together with description.
Detailed description of the invention
Below by specific embodiment and combine accompanying drawing the present invention is described in further detail.
Application scenarios 1:
The indoor irrigation system of a kind of long-range monitoring as shown in Figure 1, including cloud network 100, weather data storehouse 200, makees Thing data base 300, optimal parameter computing unit 400, wireless router 500, controller 600, mobile phone terminal 700, spray equipment 800, temperature sensor 900, soil moisture detection device 1000 and room conditioning 1100;Described temperature sensor 900 and the soil water Detector 1000 is divided to detect the moisture in indoor temperature and soil respectively, and will inspection by controller 600 and wireless router 500 The data measured are sent to cloud network 100 and process and store, and the data relevant with crop are stored in crop data storehouse;Institute State weather data storehouse 200 and automatically obtain meteorological observatory's weather forecast data at Web realease, optimal parameter computing unit 400 basis Crop data and weather forecast data calculate the Optimum Irrigation water yield, time and the room of every kind of crop according to the formula pre-entered Interior temperature, and result of calculation is sent to mobile phone terminal 700, user controls spray equipment 800 and indoor by controller 600 Air-conditioning 1100, thus control duty and indoor temperature.
The present invention utilizes cloud network to control irrigation system, and unit cost significantly declines, it is possible to achieve indoor irrigation remote Process control, detection, and the Optimum Irrigation parameter of crop can be calculated, it is convenient for people to be controlled.
Preferably, also including the photographic head 1200 being arranged on indoor, the image taken the photograph sends to mobile phone terminal 700.
Preferably, described controller 600 is single-chip microcomputer.
Preferably, as in figure 2 it is shown, also include secure visual system, for described cloud network is carried out visual peace Full monitoring, it includes that the information data being sequentially connected with excavates module 1, information pre-processing module 2, information storage module 3 and information Analyze and display module 4;
Described information data excavates module 1, former for obtaining by the way of capturing network packet in LAN Beginning information data, described original information data includes that between IP, sensitive information sends detection data, mail-detection daily record data and divides Three kinds of data types of cloth Denial of Service attack data;
Described information pre-processing module 2, for original information data carries out Data Dimensionality Reduction, identify and classify pretreatment;
Described information storage module 3, is used for pretreated information data storing to the corresponding position of cloud storage resource pool In putting;
Described information analysis and display module 4, for realizing the extraction of information, analyzing and show, it includes that mail comes and goes Relation analysis shows that submodule 41, daily record number of times distributional analysis show that between submodule 42, IP, information sends relation analysis displaying Module 43, sensitivity email relaying path analysis and displaying submodule 44 and distributed denial of service attack data analysis are sub with displaying Module 45, particularly as follows:
(1) submodule 41 is shown in mail contact relation analysis, for the mail-detection day of storage in cloud storage resource pool Will data carry out extracting, analyze, process, and show a certain specify the time period in the sensitive mail contact relation that detects;Described Mail contact relation analysis shows that submodule 41 enables users to interact with interface by the calendar on design optional date, uses Family can arbitrarily select the time period to be checked, the following operation of concrete execution:
The time period selected according to user, the data in cloud storage resource pool are chosen by system, after choosing data With the form of dictionary, data are stored, through data being analyzed process, according to the transmitting-receiving corresponding relation of sensitive mail Generate corresponding matrix data model;Subsequently, by the form of chord figure, the transmitting-receiving of mail sensitive in the selected time period is closed System carries out visual presentation, and each different mailboxes are distributed in circle around, show email address at circular outside profile, if Having the transmission relation of sensitive information between different mailboxes, just do ribbon lines between two mailboxes, lines are thick One side represents the sender of mail, and the thin side of lines represents the recipient of mail;
(2) submodule 42 is shown in the distributional analysis of daily record number of times, for entering according to time period and the daily record quantity that detects Row classification and statistics, and show by the form of dendrogram, particularly as follows:
(2-1) log data set W of reception is divided into n time subset, i.e. W={W1, W2 according to the time period ..., Wj ..., Wn};
(2-2) be manually set m daily record quantitative levels, by each time subset Wj divide m level subset, i.e. W1j, W2j ..., Wij ..., Wmj, wherein the span of m is [4,8];
(2-3) with log data set W as root, Wj is ground floor node, and Wij is second layer joint structure tree TW;
(2-5) calculating the value of each node in tree TW, wherein the value of leaf node is the value of this data element, non- The value of leaf node is equal to the value sum of all child nodes of its lower floor, and so far log data set W has been configured to a tree-shaped Data structure;
(2-6) dendrogram that the tree data structure of generation is mapped as on two dimensional surface;
(3) between IP, information sends relation analysis displaying submodule 43, for being pointed to cloud storage resource pool relevant position Between IP sensitive information send detection data carry out extracting, analyze, statistical disposition, by visual presentation form and interface alternation exhibition Sensitive information between IP different in showing certain period of time sends incidence relation;Between described IP, information sends relation analysis displaying Submodule 43 uses the time period to select mechanism and scatterplot layout exhibition method, uses joint form presentation-entity, and lines represent real With size of node, contact between body, represents that between IP, information sends the degree of strength of incidence relation, according to click thing Part selectively carries out level displaying;Mouse-over there will be the details of correspondent entity, described detailed letter on node Breath includes that ID, discovery time, click entity will select all IP related with selected node, and only display should Sub-network figure, the most also shows its corresponding relation sending information with the form of word;It is provided with search mechanisms, user simultaneously The IP related information that a certain IP selects to want to check can be inputted;
(4) sensitive email relaying path analysis and displaying submodule 44, for by analyzing and processing statistics mail-detection day Detection data in will data and email relaying relation, show the road that a certain specific mail is forwarded between different mailboxes Footpath, particularly as follows:
First, user inputs the key word contained by mail header to be searched for or mail header, system in search box According to key word, mail header all of in mail record data is carried out fuzzy matching retrieval, if not retrieving defeated with user Enter the mail matched, then send information reminding user and re-enter;If being successfully retrieved relative recording, result just will be retrieved Showing user with the form of Table content, be that the title of each mail adds Click event simultaneously, user clicks on target postal The title of part, backstage again carries out retrieval coupling, finds the forwarding record of this mail according to mail selected by user to mail record, And the article receiving and sending people every time forwarded is carried out statistic record with the form of dictionary, the data required for structure visual presentation;? After, show that the forward-path of mail is presented to user and provides interactive function with the form of a stacking dendrogram, if certain postal Case is afterbody recipient, then the summit of tree diagram is hollow display, if this email relaying is also given additionally by this mailbox One or several mailboxes, then the tree diagram node representing this mailbox is set to solid;
(5) distributed denial of service attack data analysis with show submodule 45, be used for extracting, analyze and show distributed Denial of Service attack data, particularly as follows:
1) distributed denial of service attack data analysis and displaying submodule 45 are from the relevant position of cloud storage resource pool Extracting distributed denial of service attack data, use Hash table to store, in Hash table, keyword uses character string forms, word Symbol string forms by source IP, port numbers and according to the time label three selected by the time interval of user's setting, appoints in these three Anticipating when a newly-built element occurs different and newly-built element will be inserted in Hash table, each element is in the future graphical Being all a node in expression, the relation representing and being connected between main frame, the value that in Hash table, keyword is corresponding represents this time Connect the data total amount in communication activity;
2) calculate the coordinate figure of all nodes, and then the point with coordinate information is drawn, and according to different demands Carry out time interval, the adjustment of unit radius parameter that figure shows, the principle followed when wherein drawing is: host node and in Line between heart node represents the size of amount of communication data in time interval, maps according to certain coefficient, and communicate number Representing according to amount different colours, the expression amount of communication data that color is red is bigger;Host node is made up of some concentric circulars, face The contrast intensity of color represents the port number related in this connection.
In the present embodiment, utilize visual technology, be directed in network security detecting system in the network captured quick Sense information type and transmission situation etc. carry out visual displaying, enter network security detection data from five different angles Row is analyzed and shows, accurate, comprehensive and facilitate management personnel to make corresponding to judge and decision-making;The distributed refusal clothes arranged Business is attacked data analysis and shows that submodule 45 can carry out various dimensions to distributed denial of service attack pattern and show, and according to The adjustment of the different unit radius parameters that demand carries out time interval, figure shows, improves the performance that user is mutual.
Preferably, described information pre-processing module 2 includes Data Dimensionality Reduction unit 21, data identification unit 22 and data classification Unit 23, particularly as follows:
(1) Data Dimensionality Reduction unit 21, for use the PCA of improvement eliminate between original information data superfluous Remaining, reduce the dimension of original information data, the PCA of described improvement is:
1) N bar original information data to be analyzed is mentioned, as matrix X=[x1,x2,…,xN], wherein xiBe i-th former Beginning information data;
2) meansigma methods of N bar original information data is solved:
x ‾ = 1 N Σ i = 1 N x i
3) the covariance matrix A of N bar original information data is solved:
A = 1 N Σ i = 1 N ( x i - x ‾ ) ( x i - x ‾ ) T
4) according to the eigenvalue problem calculating main component element of covariance matrix A:
iiδi
Wherein μi, δiIt is respectively eigenvalue and the characteristic of correspondence vector of A;
5) according to given precision ρ, by numerical computation method, front M eigenvalue of maximum is solved:
Σ i = 1 M μ i / Σ i = 1 N μ i ≥ ρ
Wherein, the span of M isTake m=4,
6) front M eigenvalue of maximum and characteristic of correspondence vector, order are taken
Φ=[δ12,…,δM], Γ=diag (μ12,…,μM)
Then there is A Φ=Φ Γ;
7) the new matrix Y=Φ of low-dimensional vector composition is calculatedTX;
(2) data identification unit 22, for the original information data after reducing dimension is identified detection, remove not phase The information data closed, obtains relevant information data;
(3) data sorting unit 23, for classifying according to data type to relevant information data.
Wherein, described data identification unit 22 includes being identified distributed denial of service attack data, particularly as follows:
1) the K bar original information data matrix after dimensionality reduction is set as Y '=ΦTX ', wherein X '=[x1,x2,…,xK], xj∈ X ', selection Db3 small echo is as analysis wavelet, and selects maximum decomposition scale, uses decomposition algorithm to carry out wavelet decomposition Y ' and obtains To matrix of wavelet coefficients, when j≤out to out, from matrix of wavelet coefficients, extract high frequency coefficient, calculate the variance of little coefficient After Ψ, and according to [j, log2Ψ] fitting a straight line tries to achieve slope k, thus solves the self similar parameter Hurst value of network traffics H:
H=(k-1)/2
2) the Hurst changing value Δ H=H the most in the same time tried to achieve by analysist-Ht-1, set threshold T, if Δ H > T, it is determined that distributed denial of service attack occurs, preserves corresponding original information data;If Δ H≤T, it is determined that distributed refusal takes Business is attacked and is not sent, and removes corresponding original information data.
Wherein, the transmitting-receiving corresponding relation of described mail is obtained by the TCP closure obtaining mail, first passes through parsing The network packet obtained, obtains including source IP address, purpose IP address, source port, destination interface, the information of serial number, and With four-tuple 1: source IP address, source port, purpose IP address, destination interface and four-tuple 2: purpose IP address, destination interface, source IP address, source port, indicate the both direction that TCP connects respectively, then by the application layer data of network packet according to sequence In the journal file that number sequentially write is corresponding with TCP closure.
Wherein, described Table content includes mail ID, mail header, mail time, mail originator and Email attachment Number.
In the present embodiment, information pre-processing module 2 arranges Data Dimensionality Reduction unit 21, data identification unit 22 and data Taxon 23, carries out dimensionality reduction, identifies and classification process, thus realize storing different types of data original information data In the diverse location of cloud storage resource pool, beneficially information analysis and the display module 4 extraction to corresponding data, improve further The speed of service of system;The present embodiment value m=4,The speed of service of system improves 2%.
Application scenarios 2:
The indoor irrigation system of a kind of long-range monitoring as shown in Figure 1, including cloud network 100, weather data storehouse 200, makees Thing data base 300, optimal parameter computing unit 400, wireless router 500, controller 600, mobile phone terminal 700, spray equipment 800, temperature sensor 900, soil moisture detection device 1000 and room conditioning 1100;Described temperature sensor 900 and the soil water Detector 1000 is divided to detect the moisture in indoor temperature and soil respectively, and will inspection by controller 600 and wireless router 500 The data measured are sent to cloud network 100 and process and store, and the data relevant with crop are stored in crop data storehouse;Institute State weather data storehouse 200 and automatically obtain meteorological observatory's weather forecast data at Web realease, optimal parameter computing unit 400 basis Crop data and weather forecast data calculate the Optimum Irrigation water yield, time and the room of every kind of crop according to the formula pre-entered Interior temperature, and result of calculation is sent to mobile phone terminal 700, user controls spray equipment 800 and indoor by controller 600 Air-conditioning 1100, thus control duty and indoor temperature.
The present invention utilizes cloud network to control irrigation system, and unit cost significantly declines, it is possible to achieve indoor irrigation remote Process control, detection, and the Optimum Irrigation parameter of crop can be calculated, it is convenient for people to be controlled.
Preferably, also including the photographic head 1200 being arranged on indoor, the image taken the photograph sends to mobile phone terminal 700.
Preferably, described controller 600 is single-chip microcomputer.
Preferably, as in figure 2 it is shown, also include secure visual system, for described cloud network is carried out visual peace Full monitoring, it includes that the information data being sequentially connected with excavates module 1, information pre-processing module 2, information storage module 3 and information Analyze and display module 4;
Described information data excavates module 1, former for obtaining by the way of capturing network packet in LAN Beginning information data, described original information data includes that between IP, sensitive information sends detection data, mail-detection daily record data and divides Three kinds of data types of cloth Denial of Service attack data;
Described information pre-processing module 2, for original information data carries out Data Dimensionality Reduction, identify and classify pretreatment;
Described information storage module 3, is used for pretreated information data storing to the corresponding position of cloud storage resource pool In putting;
Described information analysis and display module 4, for realizing the extraction of information, analyzing and show, it includes that mail comes and goes Relation analysis shows that submodule 41, daily record number of times distributional analysis show that between submodule 42, IP, information sends relation analysis displaying Module 43, sensitivity email relaying path analysis and displaying submodule 44 and distributed denial of service attack data analysis are sub with displaying Module 45, particularly as follows:
(1) submodule 41 is shown in mail contact relation analysis, for the mail-detection day of storage in cloud storage resource pool Will data carry out extracting, analyze, process, and show a certain specify the time period in the sensitive mail contact relation that detects;Described Mail contact relation analysis shows that submodule 41 enables users to interact with interface by the calendar on design optional date, uses Family can arbitrarily select the time period to be checked, the following operation of concrete execution:
The time period selected according to user, the data in cloud storage resource pool are chosen by system, after choosing data With the form of dictionary, data are stored, through data being analyzed process, according to the transmitting-receiving corresponding relation of sensitive mail Generate corresponding matrix data model;Subsequently, by the form of chord figure, the transmitting-receiving of mail sensitive in the selected time period is closed System carries out visual presentation, and each different mailboxes are distributed in circle around, show email address at circular outside profile, if Having the transmission relation of sensitive information between different mailboxes, just do ribbon lines between two mailboxes, lines are thick One side represents the sender of mail, and the thin side of lines represents the recipient of mail;
(2) submodule 42 is shown in the distributional analysis of daily record number of times, for entering according to time period and the daily record quantity that detects Row classification and statistics, and show by the form of dendrogram, particularly as follows:
(2-1) log data set W of reception is divided into n time subset, i.e. W={W1, W2 according to the time period ..., Wj ..., Wn};
(2-2) be manually set m daily record quantitative levels, by each time subset Wj divide m level subset, i.e. W1j, W2j ..., Wij ..., Wmj, wherein the span of m is [4,8];
(2-3) with log data set W as root, Wj is ground floor node, and Wij is second layer joint structure tree TW;
(2-5) calculating the value of each node in tree TW, wherein the value of leaf node is the value of this data element, non- The value of leaf node is equal to the value sum of all child nodes of its lower floor, and so far log data set W has been configured to a tree-shaped Data structure;
(2-6) dendrogram that the tree data structure of generation is mapped as on two dimensional surface;
(3) between IP, information sends relation analysis displaying submodule 43, for being pointed to cloud storage resource pool relevant position Between IP sensitive information send detection data carry out extracting, analyze, statistical disposition, by visual presentation form and interface alternation exhibition Sensitive information between IP different in showing certain period of time sends incidence relation;Between described IP, information sends relation analysis displaying Submodule 43 uses the time period to select mechanism and scatterplot layout exhibition method, uses joint form presentation-entity, and lines represent real With size of node, contact between body, represents that between IP, information sends the degree of strength of incidence relation, according to click thing Part selectively carries out level displaying;Mouse-over there will be the details of correspondent entity, described detailed letter on node Breath includes that ID, discovery time, click entity will select all IP related with selected node, and only display should Sub-network figure, the most also shows its corresponding relation sending information with the form of word;It is provided with search mechanisms, user simultaneously The IP related information that a certain IP selects to want to check can be inputted;
(4) sensitive email relaying path analysis and displaying submodule 44, for by analyzing and processing statistics mail-detection day Detection data in will data and email relaying relation, show the road that a certain specific mail is forwarded between different mailboxes Footpath, particularly as follows:
First, user inputs the key word contained by mail header to be searched for or mail header, system in search box According to key word, mail header all of in mail record data is carried out fuzzy matching retrieval, if not retrieving defeated with user Enter the mail matched, then send information reminding user and re-enter;If being successfully retrieved relative recording, result just will be retrieved Showing user with the form of Table content, be that the title of each mail adds Click event simultaneously, user clicks on target postal The title of part, backstage again carries out retrieval coupling, finds the forwarding record of this mail according to mail selected by user to mail record, And the article receiving and sending people every time forwarded is carried out statistic record with the form of dictionary, the data required for structure visual presentation;? After, show that the forward-path of mail is presented to user and provides interactive function with the form of a stacking dendrogram, if certain postal Case is afterbody recipient, then the summit of tree diagram is hollow display, if this email relaying is also given additionally by this mailbox One or several mailboxes, then the tree diagram node representing this mailbox is set to solid;
(5) distributed denial of service attack data analysis with show submodule 45, be used for extracting, analyze and show distributed Denial of Service attack data, particularly as follows:
1) distributed denial of service attack data analysis and displaying submodule 45 are from the relevant position of cloud storage resource pool Extracting distributed denial of service attack data, use Hash table to store, in Hash table, keyword uses character string forms, word Symbol string forms by source IP, port numbers and according to the time label three selected by the time interval of user's setting, appoints in these three Anticipating when a newly-built element occurs different and newly-built element will be inserted in Hash table, each element is in the future graphical Being all a node in expression, the relation representing and being connected between main frame, the value that in Hash table, keyword is corresponding represents this time Connect the data total amount in communication activity;
2) calculate the coordinate figure of all nodes, and then the point with coordinate information is drawn, and according to different demands Carry out time interval, the adjustment of unit radius parameter that figure shows, the principle followed when wherein drawing is: host node and in Line between heart node represents the size of amount of communication data in time interval, maps according to certain coefficient, and communicate number Representing according to amount different colours, the expression amount of communication data that color is red is bigger;Host node is made up of some concentric circulars, face The contrast intensity of color represents the port number related in this connection.
In the present embodiment, utilize visual technology, be directed in network security detecting system in the network captured quick Sense information type and transmission situation etc. carry out visual displaying, enter network security detection data from five different angles Row is analyzed and shows, accurate, comprehensive and facilitate management personnel to make corresponding to judge and decision-making;The distributed refusal clothes arranged Business is attacked data analysis and shows that submodule 45 can carry out various dimensions to distributed denial of service attack pattern and show, and according to The adjustment of the different unit radius parameters that demand carries out time interval, figure shows, improves the performance that user is mutual.
Preferably, described information pre-processing module 2 includes Data Dimensionality Reduction unit 21, data identification unit 22 and data classification Unit 23, particularly as follows:
(1) Data Dimensionality Reduction unit 21, for use the PCA of improvement eliminate between original information data superfluous Remaining, reduce the dimension of original information data, the PCA of described improvement is:
1) N bar original information data to be analyzed is mentioned, as matrix X=[x1,x2,…,xN], wherein xiBe i-th former Beginning information data;
2) meansigma methods of N bar original information data is solved:
x ‾ = 1 N Σ i = 1 N x i
3) the covariance matrix A of N bar original information data is solved:
A = 1 N Σ i = 1 N ( x i - x ‾ ) ( x i - x ‾ ) T
4) according to the eigenvalue problem calculating main component element of covariance matrix A:
iiδi
Wherein μi, δiIt is respectively eigenvalue and the characteristic of correspondence vector of A;
5) according to given precision ρ, by numerical computation method, front M eigenvalue of maximum is solved:
Σ i = 1 M μ i / Σ i = 1 N μ i ≥ ρ
Wherein, the span of M isTake m=5,
6) front M eigenvalue of maximum and characteristic of correspondence vector, order are taken
Φ=[δ12,…,δM], Γ=diag (μ12,…,μM)
Then there is A Φ=Φ Γ;
7) the new matrix Y=Φ of low-dimensional vector composition is calculatedTX;
(2) data identification unit 22, for the original information data after reducing dimension is identified detection, remove not phase The information data closed, obtains relevant information data;
(3) data sorting unit 23, for classifying according to data type to relevant information data.
Wherein, described data identification unit 22 includes being identified distributed denial of service attack data, particularly as follows:
1) the K bar original information data matrix after dimensionality reduction is set as Y '=ΦTX ', wherein X '=[x1,x2,…,xK], xj∈ X ', selection Db3 small echo is as analysis wavelet, and selects maximum decomposition scale, uses decomposition algorithm to carry out wavelet decomposition Y ' and obtains To matrix of wavelet coefficients, when j≤out to out, from matrix of wavelet coefficients, extract high frequency coefficient, calculate the variance of little coefficient After Ψ, and according to [j, log2Ψ] fitting a straight line tries to achieve slope k, thus solves the self similar parameter Hurst value of network traffics H:
H=(k-1)/2
2) the Hurst changing value Δ H=H the most in the same time tried to achieve by analysist-Ht-1, set threshold T, if Δ H > T, it is determined that distributed denial of service attack occurs, preserves corresponding original information data;If Δ H≤T, it is determined that distributed refusal takes Business is attacked and is not sent, and removes corresponding original information data.
Wherein, the transmitting-receiving corresponding relation of described mail is obtained by the TCP closure obtaining mail, first passes through parsing The network packet obtained, obtains including source IP address, purpose IP address, source port, destination interface, the information of serial number, and With four-tuple 1: source IP address, source port, purpose IP address, destination interface and four-tuple 2: purpose IP address, destination interface, source IP address, source port, indicate the both direction that TCP connects respectively, then by the application layer data of network packet according to sequence In the journal file that number sequentially write is corresponding with TCP closure.
Wherein, described Table content includes mail ID, mail header, mail time, mail originator and Email attachment Number.
In the present embodiment, information pre-processing module 2 arranges Data Dimensionality Reduction unit 21, data identification unit 22 and data Taxon 23, carries out dimensionality reduction, identifies and classification process, thus realize storing different types of data original information data In the diverse location of cloud storage resource pool, beneficially information analysis and the display module 4 extraction to corresponding data, improve further The speed of service of system;The present embodiment value m=5,The speed of service of system improves 1.8%.
Application scenarios 3:
The indoor irrigation system of a kind of long-range monitoring as shown in Figure 1, including cloud network 100, weather data storehouse 200, makees Thing data base 300, optimal parameter computing unit 400, wireless router 500, controller 600, mobile phone terminal 700, spray equipment 800, temperature sensor 900, soil moisture detection device 1000 and room conditioning 1100;Described temperature sensor 900 and the soil water Detector 1000 is divided to detect the moisture in indoor temperature and soil respectively, and will inspection by controller 600 and wireless router 500 The data measured are sent to cloud network 100 and process and store, and the data relevant with crop are stored in crop data storehouse;Institute State weather data storehouse 200 and automatically obtain meteorological observatory's weather forecast data at Web realease, optimal parameter computing unit 400 basis Crop data and weather forecast data calculate the Optimum Irrigation water yield, time and the room of every kind of crop according to the formula pre-entered Interior temperature, and result of calculation is sent to mobile phone terminal 700, user controls spray equipment 800 and indoor by controller 600 Air-conditioning 1100, thus control duty and indoor temperature.
The present invention utilizes cloud network to control irrigation system, and unit cost significantly declines, it is possible to achieve indoor irrigation remote Process control, detection, and the Optimum Irrigation parameter of crop can be calculated, it is convenient for people to be controlled.
Preferably, also including the photographic head 1200 being arranged on indoor, the image taken the photograph sends to mobile phone terminal 700.
Preferably, described controller 600 is single-chip microcomputer.
Preferably, as in figure 2 it is shown, also include secure visual system, for described cloud network is carried out visual peace Full monitoring, it includes that the information data being sequentially connected with excavates module 1, information pre-processing module 2, information storage module 3 and information Analyze and display module 4;
Described information data excavates module 1, former for obtaining by the way of capturing network packet in LAN Beginning information data, described original information data includes that between IP, sensitive information sends detection data, mail-detection daily record data and divides Three kinds of data types of cloth Denial of Service attack data;
Described information pre-processing module 2, for original information data carries out Data Dimensionality Reduction, identify and classify pretreatment;
Described information storage module 3, is used for pretreated information data storing to the corresponding position of cloud storage resource pool In putting;
Described information analysis and display module 4, for realizing the extraction of information, analyzing and show, it includes that mail comes and goes Relation analysis shows that submodule 41, daily record number of times distributional analysis show that between submodule 42, IP, information sends relation analysis displaying Module 43, sensitivity email relaying path analysis and displaying submodule 44 and distributed denial of service attack data analysis are sub with displaying Module 45, particularly as follows:
(1) submodule 41 is shown in mail contact relation analysis, for the mail-detection day of storage in cloud storage resource pool Will data carry out extracting, analyze, process, and show a certain specify the time period in the sensitive mail contact relation that detects;Described Mail contact relation analysis shows that submodule 41 enables users to interact with interface by the calendar on design optional date, uses Family can arbitrarily select the time period to be checked, the following operation of concrete execution:
The time period selected according to user, the data in cloud storage resource pool are chosen by system, after choosing data With the form of dictionary, data are stored, through data being analyzed process, according to the transmitting-receiving corresponding relation of sensitive mail Generate corresponding matrix data model;Subsequently, by the form of chord figure, the transmitting-receiving of mail sensitive in the selected time period is closed System carries out visual presentation, and each different mailboxes are distributed in circle around, show email address at circular outside profile, if Having the transmission relation of sensitive information between different mailboxes, just do ribbon lines between two mailboxes, lines are thick One side represents the sender of mail, and the thin side of lines represents the recipient of mail;
(2) submodule 42 is shown in the distributional analysis of daily record number of times, for entering according to time period and the daily record quantity that detects Row classification and statistics, and show by the form of dendrogram, particularly as follows:
(2-1) log data set W of reception is divided into n time subset, i.e. W={W1, W2 according to the time period ..., Wj ..., Wn};
(2-2) be manually set m daily record quantitative levels, by each time subset Wj divide m level subset, i.e. W1j, W2j ..., Wij ..., Wmj, wherein the span of m is [4,8];
(2-3) with log data set W as root, Wj is ground floor node, and Wij is second layer joint structure tree TW;
(2-5) calculating the value of each node in tree TW, wherein the value of leaf node is the value of this data element, non- The value of leaf node is equal to the value sum of all child nodes of its lower floor, and so far log data set W has been configured to a tree-shaped Data structure;
(2-6) dendrogram that the tree data structure of generation is mapped as on two dimensional surface;
(3) between IP, information sends relation analysis displaying submodule 43, for being pointed to cloud storage resource pool relevant position Between IP sensitive information send detection data carry out extracting, analyze, statistical disposition, by visual presentation form and interface alternation exhibition Sensitive information between IP different in showing certain period of time sends incidence relation;Between described IP, information sends relation analysis displaying Submodule 43 uses the time period to select mechanism and scatterplot layout exhibition method, uses joint form presentation-entity, and lines represent real With size of node, contact between body, represents that between IP, information sends the degree of strength of incidence relation, according to click thing Part selectively carries out level displaying;Mouse-over there will be the details of correspondent entity, described detailed letter on node Breath includes that ID, discovery time, click entity will select all IP related with selected node, and only display should Sub-network figure, the most also shows its corresponding relation sending information with the form of word;It is provided with search mechanisms, user simultaneously The IP related information that a certain IP selects to want to check can be inputted;
(4) sensitive email relaying path analysis and displaying submodule 44, for by analyzing and processing statistics mail-detection day Detection data in will data and email relaying relation, show the road that a certain specific mail is forwarded between different mailboxes Footpath, particularly as follows:
First, user inputs the key word contained by mail header to be searched for or mail header, system in search box According to key word, mail header all of in mail record data is carried out fuzzy matching retrieval, if not retrieving defeated with user Enter the mail matched, then send information reminding user and re-enter;If being successfully retrieved relative recording, result just will be retrieved Showing user with the form of Table content, be that the title of each mail adds Click event simultaneously, user clicks on target postal The title of part, backstage again carries out retrieval coupling, finds the forwarding record of this mail according to mail selected by user to mail record, And the article receiving and sending people every time forwarded is carried out statistic record with the form of dictionary, the data required for structure visual presentation;? After, show that the forward-path of mail is presented to user and provides interactive function with the form of a stacking dendrogram, if certain postal Case is afterbody recipient, then the summit of tree diagram is hollow display, if this email relaying is also given additionally by this mailbox One or several mailboxes, then the tree diagram node representing this mailbox is set to solid;
(5) distributed denial of service attack data analysis with show submodule 45, be used for extracting, analyze and show distributed Denial of Service attack data, particularly as follows:
1) distributed denial of service attack data analysis and displaying submodule 45 are from the relevant position of cloud storage resource pool Extracting distributed denial of service attack data, use Hash table to store, in Hash table, keyword uses character string forms, word Symbol string forms by source IP, port numbers and according to the time label three selected by the time interval of user's setting, appoints in these three Anticipating when a newly-built element occurs different and newly-built element will be inserted in Hash table, each element is in the future graphical Being all a node in expression, the relation representing and being connected between main frame, the value that in Hash table, keyword is corresponding represents this time Connect the data total amount in communication activity;
2) calculate the coordinate figure of all nodes, and then the point with coordinate information is drawn, and according to different demands Carry out time interval, the adjustment of unit radius parameter that figure shows, the principle followed when wherein drawing is: host node and in Line between heart node represents the size of amount of communication data in time interval, maps according to certain coefficient, and communicate number Representing according to amount different colours, the expression amount of communication data that color is red is bigger;Host node is made up of some concentric circulars, face The contrast intensity of color represents the port number related in this connection.
In the present embodiment, utilize visual technology, be directed in network security detecting system in the network captured quick Sense information type and transmission situation etc. carry out visual displaying, enter network security detection data from five different angles Row is analyzed and shows, accurate, comprehensive and facilitate management personnel to make corresponding to judge and decision-making;The distributed refusal clothes arranged Business is attacked data analysis and shows that submodule 45 can carry out various dimensions to distributed denial of service attack pattern and show, and according to The adjustment of the different unit radius parameters that demand carries out time interval, figure shows, improves the performance that user is mutual.
Preferably, described information pre-processing module 2 includes Data Dimensionality Reduction unit 21, data identification unit 22 and data classification Unit 23, particularly as follows:
(1) Data Dimensionality Reduction unit 21, for use the PCA of improvement eliminate between original information data superfluous Remaining, reduce the dimension of original information data, the PCA of described improvement is:
1) N bar original information data to be analyzed is mentioned, as matrix X=[x1,x2,…,xN], wherein xiBe i-th former Beginning information data;
2) meansigma methods of N bar original information data is solved:
x ‾ = 1 N Σ i = 1 N x i
3) the covariance matrix A of N bar original information data is solved:
A = 1 N Σ i = 1 N ( x i - x ‾ ) ( x i - x ‾ ) T
4) according to the eigenvalue problem calculating main component element of covariance matrix A:
iiδi
Wherein μi, δiIt is respectively eigenvalue and the characteristic of correspondence vector of A;
5) according to given precision ρ, by numerical computation method, front M eigenvalue of maximum is solved:
Σ i = 1 M μ i / Σ i = 1 N μ i ≥ ρ
Wherein, the span of M isTake m=6,
6) front M eigenvalue of maximum and characteristic of correspondence vector, order are taken
Φ=[δ12,…,δM], Γ=diag (μ12,…,μM)
Then there is A Φ=Φ Γ;
7) the new matrix Y=Φ of low-dimensional vector composition is calculatedTX;
(2) data identification unit 22, for the original information data after reducing dimension is identified detection, remove not phase The information data closed, obtains relevant information data;
(3) data sorting unit 23, for classifying according to data type to relevant information data.
Wherein, described data identification unit 22 includes being identified distributed denial of service attack data, particularly as follows:
1) the K bar original information data matrix after dimensionality reduction is set as Y '=ΦTX ', wherein X '=[x1,x2,…,xK], xj∈ X ', selection Db3 small echo is as analysis wavelet, and selects maximum decomposition scale, uses decomposition algorithm to carry out wavelet decomposition Y ' and obtains To matrix of wavelet coefficients, when j≤out to out, from matrix of wavelet coefficients, extract high frequency coefficient, calculate the variance of little coefficient After Ψ, and according to [j, log2Ψ] fitting a straight line tries to achieve slope k, thus solves the self similar parameter Hurst value of network traffics H:
H=(k-1)/2
2) the Hurst changing value Δ H=H the most in the same time tried to achieve by analysist-Ht-1, set threshold T, if Δ H > T, it is determined that distributed denial of service attack occurs, preserves corresponding original information data;If Δ H≤T, it is determined that distributed refusal takes Business is attacked and is not sent, and removes corresponding original information data.
Wherein, the transmitting-receiving corresponding relation of described mail is obtained by the TCP closure obtaining mail, first passes through parsing The network packet obtained, obtains including source IP address, purpose IP address, source port, destination interface, the information of serial number, and With four-tuple 1: source IP address, source port, purpose IP address, destination interface and four-tuple 2: purpose IP address, destination interface, source IP address, source port, indicate the both direction that TCP connects respectively, then by the application layer data of network packet according to sequence In the journal file that number sequentially write is corresponding with TCP closure.
Wherein, described Table content includes mail ID, mail header, mail time, mail originator and Email attachment Number.
In the present embodiment, information pre-processing module 2 arranges Data Dimensionality Reduction unit 21, data identification unit 22 and data Taxon 23, carries out dimensionality reduction, identifies and classification process, thus realize storing different types of data original information data In the diverse location of cloud storage resource pool, beneficially information analysis and the display module 4 extraction to corresponding data, improve further The speed of service of system;The present embodiment value m=6,The speed of service of system improves 1.6%.
Application scenarios 4:
The indoor irrigation system of a kind of long-range monitoring as shown in Figure 1, including cloud network 100, weather data storehouse 200, makees Thing data base 300, optimal parameter computing unit 400, wireless router 500, controller 600, mobile phone terminal 700, spray equipment 800, temperature sensor 900, soil moisture detection device 1000 and room conditioning 1100;Described temperature sensor 900 and the soil water Detector 1000 is divided to detect the moisture in indoor temperature and soil respectively, and will inspection by controller 600 and wireless router 500 The data measured are sent to cloud network 100 and process and store, and the data relevant with crop are stored in crop data storehouse;Institute State weather data storehouse 200 and automatically obtain meteorological observatory's weather forecast data at Web realease, optimal parameter computing unit 400 basis Crop data and weather forecast data calculate the Optimum Irrigation water yield, time and the room of every kind of crop according to the formula pre-entered Interior temperature, and result of calculation is sent to mobile phone terminal 700, user controls spray equipment 800 and indoor by controller 600 Air-conditioning 1100, thus control duty and indoor temperature.
The present invention utilizes cloud network to control irrigation system, and unit cost significantly declines, it is possible to achieve indoor irrigation remote Process control, detection, and the Optimum Irrigation parameter of crop can be calculated, it is convenient for people to be controlled.
Preferably, also including the photographic head 1200 being arranged on indoor, the image taken the photograph sends to mobile phone terminal 700.
Preferably, described controller 600 is single-chip microcomputer.
Preferably, as in figure 2 it is shown, also include secure visual system, for described cloud network is carried out visual peace Full monitoring, it includes that the information data being sequentially connected with excavates module 1, information pre-processing module 2, information storage module 3 and information Analyze and display module 4;
Described information data excavates module 1, former for obtaining by the way of capturing network packet in LAN Beginning information data, described original information data includes that between IP, sensitive information sends detection data, mail-detection daily record data and divides Three kinds of data types of cloth Denial of Service attack data;
Described information pre-processing module 2, for original information data carries out Data Dimensionality Reduction, identify and classify pretreatment;
Described information storage module 3, is used for pretreated information data storing to the corresponding position of cloud storage resource pool In putting;
Described information analysis and display module 4, for realizing the extraction of information, analyzing and show, it includes that mail comes and goes Relation analysis shows that submodule 41, daily record number of times distributional analysis show that between submodule 42, IP, information sends relation analysis displaying Module 43, sensitivity email relaying path analysis and displaying submodule 44 and distributed denial of service attack data analysis are sub with displaying Module 45, particularly as follows:
(1) submodule 41 is shown in mail contact relation analysis, for the mail-detection day of storage in cloud storage resource pool Will data carry out extracting, analyze, process, and show a certain specify the time period in the sensitive mail contact relation that detects;Described Mail contact relation analysis shows that submodule 41 enables users to interact with interface by the calendar on design optional date, uses Family can arbitrarily select the time period to be checked, the following operation of concrete execution:
The time period selected according to user, the data in cloud storage resource pool are chosen by system, after choosing data With the form of dictionary, data are stored, through data being analyzed process, according to the transmitting-receiving corresponding relation of sensitive mail Generate corresponding matrix data model;Subsequently, by the form of chord figure, the transmitting-receiving of mail sensitive in the selected time period is closed System carries out visual presentation, and each different mailboxes are distributed in circle around, show email address at circular outside profile, if Having the transmission relation of sensitive information between different mailboxes, just do ribbon lines between two mailboxes, lines are thick One side represents the sender of mail, and the thin side of lines represents the recipient of mail;
(2) submodule 42 is shown in the distributional analysis of daily record number of times, for entering according to time period and the daily record quantity that detects Row classification and statistics, and show by the form of dendrogram, particularly as follows:
(2-1) log data set W of reception is divided into n time subset, i.e. W={W1, W2 according to the time period ..., Wj ..., Wn};
(2-2) be manually set m daily record quantitative levels, by each time subset Wj divide m level subset, i.e. W1j, W2j ..., Wij ..., Wmj, wherein the span of m is [4,8];
(2-3) with log data set W as root, Wj is ground floor node, and Wij is second layer joint structure tree TW;
(2-5) calculating the value of each node in tree TW, wherein the value of leaf node is the value of this data element, non- The value of leaf node is equal to the value sum of all child nodes of its lower floor, and so far log data set W has been configured to a tree-shaped Data structure;
(2-6) dendrogram that the tree data structure of generation is mapped as on two dimensional surface;
(3) between IP, information sends relation analysis displaying submodule 43, for being pointed to cloud storage resource pool relevant position Between IP sensitive information send detection data carry out extracting, analyze, statistical disposition, by visual presentation form and interface alternation exhibition Sensitive information between IP different in showing certain period of time sends incidence relation;Between described IP, information sends relation analysis displaying Submodule 43 uses the time period to select mechanism and scatterplot layout exhibition method, uses joint form presentation-entity, and lines represent real With size of node, contact between body, represents that between IP, information sends the degree of strength of incidence relation, according to click thing Part selectively carries out level displaying;Mouse-over there will be the details of correspondent entity, described detailed letter on node Breath includes that ID, discovery time, click entity will select all IP related with selected node, and only display should Sub-network figure, the most also shows its corresponding relation sending information with the form of word;It is provided with search mechanisms, user simultaneously The IP related information that a certain IP selects to want to check can be inputted;
(4) sensitive email relaying path analysis and displaying submodule 44, for by analyzing and processing statistics mail-detection day Detection data in will data and email relaying relation, show the road that a certain specific mail is forwarded between different mailboxes Footpath, particularly as follows:
First, user inputs the key word contained by mail header to be searched for or mail header, system in search box According to key word, mail header all of in mail record data is carried out fuzzy matching retrieval, if not retrieving defeated with user Enter the mail matched, then send information reminding user and re-enter;If being successfully retrieved relative recording, result just will be retrieved Showing user with the form of Table content, be that the title of each mail adds Click event simultaneously, user clicks on target postal The title of part, backstage again carries out retrieval coupling, finds the forwarding record of this mail according to mail selected by user to mail record, And the article receiving and sending people every time forwarded is carried out statistic record with the form of dictionary, the data required for structure visual presentation;? After, show that the forward-path of mail is presented to user and provides interactive function with the form of a stacking dendrogram, if certain postal Case is afterbody recipient, then the summit of tree diagram is hollow display, if this email relaying is also given additionally by this mailbox One or several mailboxes, then the tree diagram node representing this mailbox is set to solid;
(5) distributed denial of service attack data analysis with show submodule 45, be used for extracting, analyze and show distributed Denial of Service attack data, particularly as follows:
1) distributed denial of service attack data analysis and displaying submodule 45 are from the relevant position of cloud storage resource pool Extracting distributed denial of service attack data, use Hash table to store, in Hash table, keyword uses character string forms, word Symbol string forms by source IP, port numbers and according to the time label three selected by the time interval of user's setting, appoints in these three Anticipating when a newly-built element occurs different and newly-built element will be inserted in Hash table, each element is in the future graphical Being all a node in expression, the relation representing and being connected between main frame, the value that in Hash table, keyword is corresponding represents this time Connect the data total amount in communication activity;
2) calculate the coordinate figure of all nodes, and then the point with coordinate information is drawn, and according to different demands Carry out time interval, the adjustment of unit radius parameter that figure shows, the principle followed when wherein drawing is: host node and in Line between heart node represents the size of amount of communication data in time interval, maps according to certain coefficient, and communicate number Representing according to amount different colours, the expression amount of communication data that color is red is bigger;Host node is made up of some concentric circulars, face The contrast intensity of color represents the port number related in this connection.
In the present embodiment, utilize visual technology, be directed in network security detecting system in the network captured quick Sense information type and transmission situation etc. carry out visual displaying, enter network security detection data from five different angles Row is analyzed and shows, accurate, comprehensive and facilitate management personnel to make corresponding to judge and decision-making;The distributed refusal clothes arranged Business is attacked data analysis and shows that submodule 45 can carry out various dimensions to distributed denial of service attack pattern and show, and according to The adjustment of the different unit radius parameters that demand carries out time interval, figure shows, improves the performance that user is mutual.
Preferably, described information pre-processing module 2 includes Data Dimensionality Reduction unit 21, data identification unit 22 and data classification Unit 23, particularly as follows:
(1) Data Dimensionality Reduction unit 21, for use the PCA of improvement eliminate between original information data superfluous Remaining, reduce the dimension of original information data, the PCA of described improvement is:
1) N bar original information data to be analyzed is mentioned, as matrix X=[x1,x2,…,xN], wherein xiBe i-th former Beginning information data;
2) meansigma methods of N bar original information data is solved:
x ‾ = 1 N Σ i = 1 N x i
3) the covariance matrix A of N bar original information data is solved:
A = 1 N Σ i = 1 N ( x i - x ‾ ) ( x i - x ‾ ) T
4) according to the eigenvalue problem calculating main component element of covariance matrix A:
iiδi
Wherein μi, δiIt is respectively eigenvalue and the characteristic of correspondence vector of A;
5) according to given precision ρ, by numerical computation method, front M eigenvalue of maximum is solved:
Σ i = 1 M μ i / Σ i = 1 N μ i ≥ ρ
Wherein, the span of M isTake m=7,
6) front M eigenvalue of maximum and characteristic of correspondence vector, order are taken
Φ=[δ12,…,δM], Γ=diag (μ12,…,μM)
Then there is A Φ=Φ Γ;
7) the new matrix Y=Φ of low-dimensional vector composition is calculatedTX;
(2) data identification unit 22, for the original information data after reducing dimension is identified detection, remove not phase The information data closed, obtains relevant information data;
(3) data sorting unit 23, for classifying according to data type to relevant information data.
Wherein, described data identification unit 22 includes being identified distributed denial of service attack data, particularly as follows:
1) the K bar original information data matrix after dimensionality reduction is set as Y '=ΦTX ', wherein X '=[x1,x2,…,xK], xj∈ X ', selection Db3 small echo is as analysis wavelet, and selects maximum decomposition scale, uses decomposition algorithm to carry out wavelet decomposition Y ' and obtains To matrix of wavelet coefficients, when j≤out to out, from matrix of wavelet coefficients, extract high frequency coefficient, calculate the variance of little coefficient After Ψ, and according to [j, log2Ψ] fitting a straight line tries to achieve slope k, thus solves the self similar parameter Hurst value of network traffics H:
H=(k-1)/2
2) the Hurst changing value Δ H=H the most in the same time tried to achieve by analysist-Ht-1, set threshold T, if Δ H > T, it is determined that distributed denial of service attack occurs, preserves corresponding original information data;If Δ H≤T, it is determined that distributed refusal takes Business is attacked and is not sent, and removes corresponding original information data.
Wherein, the transmitting-receiving corresponding relation of described mail is obtained by the TCP closure obtaining mail, first passes through parsing The network packet obtained, obtains including source IP address, purpose IP address, source port, destination interface, the information of serial number, and With four-tuple 1: source IP address, source port, purpose IP address, destination interface and four-tuple 2: purpose IP address, destination interface, source IP address, source port, indicate the both direction that TCP connects respectively, then by the application layer data of network packet according to sequence In the journal file that number sequentially write is corresponding with TCP closure.
Wherein, described Table content includes mail ID, mail header, mail time, mail originator and Email attachment Number.
In the present embodiment, information pre-processing module 2 arranges Data Dimensionality Reduction unit 21, data identification unit 22 and data Taxon 23, carries out dimensionality reduction, identifies and classification process, thus realize storing different types of data original information data In the diverse location of cloud storage resource pool, beneficially information analysis and the display module 4 extraction to corresponding data, improve further The speed of service of system;The present embodiment value m=7,The speed of service of system improves 1.5%.
Application scenarios 5:
The indoor irrigation system of a kind of long-range monitoring as shown in Figure 1, including cloud network 100, weather data storehouse 200, makees Thing data base 300, optimal parameter computing unit 400, wireless router 500, controller 600, mobile phone terminal 700, spray equipment 800, temperature sensor 900, soil moisture detection device 1000 and room conditioning 1100;Described temperature sensor 900 and the soil water Detector 1000 is divided to detect the moisture in indoor temperature and soil respectively, and will inspection by controller 600 and wireless router 500 The data measured are sent to cloud network 100 and process and store, and the data relevant with crop are stored in crop data storehouse;Institute State weather data storehouse 200 and automatically obtain meteorological observatory's weather forecast data at Web realease, optimal parameter computing unit 400 basis Crop data and weather forecast data calculate the Optimum Irrigation water yield, time and the room of every kind of crop according to the formula pre-entered Interior temperature, and result of calculation is sent to mobile phone terminal 700, user controls spray equipment 800 and indoor by controller 600 Air-conditioning 1100, thus control duty and indoor temperature.
The present invention utilizes cloud network to control irrigation system, and unit cost significantly declines, it is possible to achieve indoor irrigation remote Process control, detection, and the Optimum Irrigation parameter of crop can be calculated, it is convenient for people to be controlled.
Preferably, also including the photographic head 1200 being arranged on indoor, the image taken the photograph sends to mobile phone terminal 700.
Preferably, described controller 600 is single-chip microcomputer.
Preferably, as in figure 2 it is shown, also include secure visual system, for described cloud network is carried out visual peace Full monitoring, it includes that the information data being sequentially connected with excavates module 1, information pre-processing module 2, information storage module 3 and information Analyze and display module 4;
Described information data excavates module 1, former for obtaining by the way of capturing network packet in LAN Beginning information data, described original information data includes that between IP, sensitive information sends detection data, mail-detection daily record data and divides Three kinds of data types of cloth Denial of Service attack data;
Described information pre-processing module 2, for original information data carries out Data Dimensionality Reduction, identify and classify pretreatment;
Described information storage module 3, is used for pretreated information data storing to the corresponding position of cloud storage resource pool In putting;
Described information analysis and display module 4, for realizing the extraction of information, analyzing and show, it includes that mail comes and goes Relation analysis shows that submodule 41, daily record number of times distributional analysis show that between submodule 42, IP, information sends relation analysis displaying Module 43, sensitivity email relaying path analysis and displaying submodule 44 and distributed denial of service attack data analysis are sub with displaying Module 45, particularly as follows:
(1) submodule 41 is shown in mail contact relation analysis, for the mail-detection day of storage in cloud storage resource pool Will data carry out extracting, analyze, process, and show a certain specify the time period in the sensitive mail contact relation that detects;Described Mail contact relation analysis shows that submodule 41 enables users to interact with interface by the calendar on design optional date, uses Family can arbitrarily select the time period to be checked, the following operation of concrete execution:
The time period selected according to user, the data in cloud storage resource pool are chosen by system, after choosing data With the form of dictionary, data are stored, through data being analyzed process, according to the transmitting-receiving corresponding relation of sensitive mail Generate corresponding matrix data model;Subsequently, by the form of chord figure, the transmitting-receiving of mail sensitive in the selected time period is closed System carries out visual presentation, and each different mailboxes are distributed in circle around, show email address at circular outside profile, if Having the transmission relation of sensitive information between different mailboxes, just do ribbon lines between two mailboxes, lines are thick One side represents the sender of mail, and the thin side of lines represents the recipient of mail;
(2) submodule 42 is shown in the distributional analysis of daily record number of times, for entering according to time period and the daily record quantity that detects Row classification and statistics, and show by the form of dendrogram, particularly as follows:
(2-1) log data set W of reception is divided into n time subset, i.e. W={W1, W2 according to the time period ..., Wj ..., Wn};
(2-2) be manually set m daily record quantitative levels, by each time subset Wj divide m level subset, i.e. W1j, W2j ..., Wij ..., Wmj, wherein the span of m is [4,8];
(2-3) with log data set W as root, Wj is ground floor node, and Wij is second layer joint structure tree TW;
(2-5) calculating the value of each node in tree TW, wherein the value of leaf node is the value of this data element, non- The value of leaf node is equal to the value sum of all child nodes of its lower floor, and so far log data set W has been configured to a tree-shaped Data structure;
(2-6) dendrogram that the tree data structure of generation is mapped as on two dimensional surface;
(3) between IP, information sends relation analysis displaying submodule 43, for being pointed to cloud storage resource pool relevant position Between IP sensitive information send detection data carry out extracting, analyze, statistical disposition, by visual presentation form and interface alternation exhibition Sensitive information between IP different in showing certain period of time sends incidence relation;Between described IP, information sends relation analysis displaying Submodule 43 uses the time period to select mechanism and scatterplot layout exhibition method, uses joint form presentation-entity, and lines represent real With size of node, contact between body, represents that between IP, information sends the degree of strength of incidence relation, according to click thing Part selectively carries out level displaying;Mouse-over there will be the details of correspondent entity, described detailed letter on node Breath includes that ID, discovery time, click entity will select all IP related with selected node, and only display should Sub-network figure, the most also shows its corresponding relation sending information with the form of word;It is provided with search mechanisms, user simultaneously The IP related information that a certain IP selects to want to check can be inputted;
(4) sensitive email relaying path analysis and displaying submodule 44, for by analyzing and processing statistics mail-detection day Detection data in will data and email relaying relation, show the road that a certain specific mail is forwarded between different mailboxes Footpath, particularly as follows:
First, user inputs the key word contained by mail header to be searched for or mail header, system in search box According to key word, mail header all of in mail record data is carried out fuzzy matching retrieval, if not retrieving defeated with user Enter the mail matched, then send information reminding user and re-enter;If being successfully retrieved relative recording, result just will be retrieved Showing user with the form of Table content, be that the title of each mail adds Click event simultaneously, user clicks on target postal The title of part, backstage again carries out retrieval coupling, finds the forwarding record of this mail according to mail selected by user to mail record, And the article receiving and sending people every time forwarded is carried out statistic record with the form of dictionary, the data required for structure visual presentation;? After, show that the forward-path of mail is presented to user and provides interactive function with the form of a stacking dendrogram, if certain postal Case is afterbody recipient, then the summit of tree diagram is hollow display, if this email relaying is also given additionally by this mailbox One or several mailboxes, then the tree diagram node representing this mailbox is set to solid;
(5) distributed denial of service attack data analysis with show submodule 45, be used for extracting, analyze and show distributed Denial of Service attack data, particularly as follows:
1) distributed denial of service attack data analysis and displaying submodule 45 are from the relevant position of cloud storage resource pool Extracting distributed denial of service attack data, use Hash table to store, in Hash table, keyword uses character string forms, word Symbol string forms by source IP, port numbers and according to the time label three selected by the time interval of user's setting, appoints in these three Anticipating when a newly-built element occurs different and newly-built element will be inserted in Hash table, each element is in the future graphical Being all a node in expression, the relation representing and being connected between main frame, the value that in Hash table, keyword is corresponding represents this time Connect the data total amount in communication activity;
2) calculate the coordinate figure of all nodes, and then the point with coordinate information is drawn, and according to different demands Carry out time interval, the adjustment of unit radius parameter that figure shows, the principle followed when wherein drawing is: host node and in Line between heart node represents the size of amount of communication data in time interval, maps according to certain coefficient, and communicate number Representing according to amount different colours, the expression amount of communication data that color is red is bigger;Host node is made up of some concentric circulars, face The contrast intensity of color represents the port number related in this connection.
In the present embodiment, utilize visual technology, be directed in network security detecting system in the network captured quick Sense information type and transmission situation etc. carry out visual displaying, enter network security detection data from five different angles Row is analyzed and shows, accurate, comprehensive and facilitate management personnel to make corresponding to judge and decision-making;The distributed refusal clothes arranged Business is attacked data analysis and shows that submodule 45 can carry out various dimensions to distributed denial of service attack pattern and show, and according to The adjustment of the different unit radius parameters that demand carries out time interval, figure shows, improves the performance that user is mutual.
Preferably, described information pre-processing module 2 includes Data Dimensionality Reduction unit 21, data identification unit 22 and data classification Unit 23, particularly as follows:
(1) Data Dimensionality Reduction unit 21, for use the PCA of improvement eliminate between original information data superfluous Remaining, reduce the dimension of original information data, the PCA of described improvement is:
1) N bar original information data to be analyzed is mentioned, as matrix X=[x1,x2,…,xN], wherein xiBe i-th former Beginning information data;
2) meansigma methods of N bar original information data is solved:
x ‾ = 1 N Σ i = 1 N x i
3) the covariance matrix A of N bar original information data is solved:
A = 1 N Σ i = 1 N ( x i - x ‾ ) ( x i - x ‾ ) T
4) according to the eigenvalue problem calculating main component element of covariance matrix A:
iiδi
Wherein μi, δiIt is respectively eigenvalue and the characteristic of correspondence vector of A;
5) according to given precision ρ, by numerical computation method, front M eigenvalue of maximum is solved:
Σ i = 1 M μ i / Σ i = 1 N μ i ≥ ρ
Wherein, the span of M isTake m=8,
6) front M eigenvalue of maximum and characteristic of correspondence vector, order are taken
Φ=[δ12,…,δM], Γ=diag (μ12,…,μM)
Then there is A Φ=Φ Γ;
7) the new matrix Y=Φ of low-dimensional vector composition is calculatedTX;
(2) data identification unit 22, for the original information data after reducing dimension is identified detection, remove not phase The information data closed, obtains relevant information data;
(3) data sorting unit 23, for classifying according to data type to relevant information data.
Wherein, described data identification unit 22 includes being identified distributed denial of service attack data, particularly as follows:
1) the K bar original information data matrix after dimensionality reduction is set as Y '=ΦTX ', wherein X '=[x1,x2,…,xK], xj∈ X ', selection Db3 small echo is as analysis wavelet, and selects maximum decomposition scale, uses decomposition algorithm to carry out wavelet decomposition Y ' and obtains To matrix of wavelet coefficients, when j≤out to out, from matrix of wavelet coefficients, extract high frequency coefficient, calculate the variance of little coefficient After Ψ, and according to [j, log2Ψ] fitting a straight line tries to achieve slope k, thus solves the self similar parameter Hurst value of network traffics H:
H=(k-1)/2
2) the Hurst changing value Δ H=H the most in the same time tried to achieve by analysist-Ht-1, set threshold T, if Δ H > T, it is determined that distributed denial of service attack occurs, preserves corresponding original information data;If Δ H≤T, it is determined that distributed refusal takes Business is attacked and is not sent, and removes corresponding original information data.
Wherein, the transmitting-receiving corresponding relation of described mail is obtained by the TCP closure obtaining mail, first passes through parsing The network packet obtained, obtains including source IP address, purpose IP address, source port, destination interface, the information of serial number, and With four-tuple 1: source IP address, source port, purpose IP address, destination interface and four-tuple 2: purpose IP address, destination interface, source IP address, source port, indicate the both direction that TCP connects respectively, then by the application layer data of network packet according to sequence In the journal file that number sequentially write is corresponding with TCP closure.
Wherein, described Table content includes mail ID, mail header, mail time, mail originator and Email attachment Number.
In the present embodiment, information pre-processing module 2 arranges Data Dimensionality Reduction unit 21, data identification unit 22 and data Taxon 23, carries out dimensionality reduction, identifies and classification process, thus realize storing different types of data original information data In the diverse location of cloud storage resource pool, beneficially information analysis and the display module 4 extraction to corresponding data, improve further The speed of service of system;The present embodiment value m=8,The speed of service of system improves 1.4%.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for the skill of this area For art personnel, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, that is made any repaiies Change, equivalent, improvement etc., should be included within the scope of the present invention.

Claims (3)

1. an indoor irrigation system for long-range monitoring, is characterized in that, including cloud network, weather data storehouse, crop data storehouse, Good parameter calculation unit, wireless router, controller, mobile phone terminal, spray equipment, temperature sensor, soil moisture detection device And room conditioning;Described temperature sensor and soil moisture detection device detect the moisture in indoor temperature and soil respectively, and lead to Cross controller and wireless router the data detected are sent to cloud network to process and store, the data relevant with crop It is stored in crop data storehouse;Described weather data storehouse obtains meteorological observatory's weather forecast data at Web realease automatically, most preferably Parameter calculation unit calculates the optimal of every kind of crop according to crop data and weather forecast data according to the formula pre-entered Duty, time and indoor temperature, and result of calculation is sent to mobile phone terminal, user controls spray dress by controller Put and room conditioning, thus control duty and indoor temperature.
The indoor irrigation system of a kind of long-range monitoring the most according to claim 1, is characterized in that, also include being arranged on indoor Photographic head, for the image that photograph is sent to mobile phone terminal.
The indoor irrigation system of a kind of long-range monitoring the most according to claim 2, is characterized in that, described controller is monolithic Machine.
CN201610556376.XA 2016-07-14 2016-07-14 A kind of indoor irrigation system of long-range monitoring Withdrawn CN106210066A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610556376.XA CN106210066A (en) 2016-07-14 2016-07-14 A kind of indoor irrigation system of long-range monitoring

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610556376.XA CN106210066A (en) 2016-07-14 2016-07-14 A kind of indoor irrigation system of long-range monitoring

Publications (1)

Publication Number Publication Date
CN106210066A true CN106210066A (en) 2016-12-07

Family

ID=57475342

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610556376.XA Withdrawn CN106210066A (en) 2016-07-14 2016-07-14 A kind of indoor irrigation system of long-range monitoring

Country Status (1)

Country Link
CN (1) CN106210066A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111316896A (en) * 2020-04-17 2020-06-23 天津蓝迪科农业科技有限公司 Irrigation control system of cultivation technique that becomes more meticulous
CN111537686A (en) * 2020-04-26 2020-08-14 蛟龙(厦门)科技有限公司 Intelligence water conservancy construction environmental monitoring system
CN117178862A (en) * 2023-11-08 2023-12-08 四川嘉陵江桐子壕航电开发有限公司 Garden watering information acquisition and monitoring method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111316896A (en) * 2020-04-17 2020-06-23 天津蓝迪科农业科技有限公司 Irrigation control system of cultivation technique that becomes more meticulous
CN111537686A (en) * 2020-04-26 2020-08-14 蛟龙(厦门)科技有限公司 Intelligence water conservancy construction environmental monitoring system
CN117178862A (en) * 2023-11-08 2023-12-08 四川嘉陵江桐子壕航电开发有限公司 Garden watering information acquisition and monitoring method
CN117178862B (en) * 2023-11-08 2024-02-02 四川嘉陵江桐子壕航电开发有限公司 Garden watering information acquisition and monitoring method

Similar Documents

Publication Publication Date Title
CN106131017B (en) Cloud computing information security visualization system based on trust computing
Zhao et al. Classifying airborne LiDAR point clouds via deep features learned by a multi-scale convolutional neural network
Zhang et al. A fuzzy classification of sub-urban land cover from remotely sensed imagery
Secord et al. Tree detection in urban regions using aerial lidar and image data
CN104335564B (en) For identify and analyze user personal scene system and method
CN110428522A (en) A kind of intelligent safety and defence system of wisdom new city
CN107341813B (en) SAR image segmentation method based on Structure learning and sketch characteristic inference network
CN105718971B (en) A kind of multiple target passive type indoor activity recognition methods based on RFID
CN111008337B (en) Deep attention rumor identification method and device based on ternary characteristics
CN106210066A (en) A kind of indoor irrigation system of long-range monitoring
CN102956023A (en) Bayes classification-based method for fusing traditional meteorological data with perception data
Czaplewski Accuracy assessment of maps of forest condition: Statistical design and methodological considerations
Fynn et al. Forest fragmentation analysis from multiple imaging formats
CN109951499A (en) A kind of method for detecting abnormality based on network structure feature
CN107220676A (en) A kind of smart city planning system
CN110995643A (en) Abnormal user identification method based on mail data analysis
CN106124699B (en) A kind of intelligent air quality Real-Time Evaluation device and its evaluation method
CN116599720A (en) Malicious DoH flow detection method and system based on GraphSAGE
CN106131197A (en) A kind of multifunctional intellectual cell management system
CN106080510A (en) A kind of automotive theft proof system based on cloud network
CN106204846A (en) A kind of high security intelligent door lock system
Fischer Spatial analysis in geography
CN106204985A (en) A kind of intelligentized Furniture system based on cloud security
CN106200578A (en) A kind of high security storage room control system
CN112686180A (en) Method for calculating number of personnel in closed space

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C04 Withdrawal of patent application after publication (patent law 2001)
WW01 Invention patent application withdrawn after publication

Application publication date: 20161207