CN107332895A - The industrial data collection control system of BOUND communication plug-in unit after a kind of intelligence - Google Patents
The industrial data collection control system of BOUND communication plug-in unit after a kind of intelligence Download PDFInfo
- Publication number
- CN107332895A CN107332895A CN201710489537.2A CN201710489537A CN107332895A CN 107332895 A CN107332895 A CN 107332895A CN 201710489537 A CN201710489537 A CN 201710489537A CN 107332895 A CN107332895 A CN 107332895A
- Authority
- CN
- China
- Prior art keywords
- mrow
- msub
- data
- module
- mtd
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 title claims abstract description 58
- 238000013480 data collection Methods 0.000 title claims abstract description 26
- 238000001514 detection method Methods 0.000 claims abstract description 55
- 238000012544 monitoring process Methods 0.000 claims abstract description 4
- 238000000034 method Methods 0.000 claims description 46
- 230000008569 process Effects 0.000 claims description 21
- 238000013507 mapping Methods 0.000 claims description 20
- 239000011159 matrix material Substances 0.000 claims description 15
- 239000003570 air Substances 0.000 claims description 12
- 238000013139 quantization Methods 0.000 claims description 12
- 230000009467 reduction Effects 0.000 claims description 9
- 230000009466 transformation Effects 0.000 claims description 9
- 238000005070 sampling Methods 0.000 claims description 8
- PXFBZOLANLWPMH-UHFFFAOYSA-N 16-Epiaffinine Natural products C1C(C2=CC=CC=C2N2)=C2C(=O)CC2C(=CC)CN(C)C1C2CO PXFBZOLANLWPMH-UHFFFAOYSA-N 0.000 claims description 6
- 238000012790 confirmation Methods 0.000 claims description 6
- 239000000203 mixture Substances 0.000 claims description 6
- 238000005457 optimization Methods 0.000 claims description 6
- 230000002441 reversible effect Effects 0.000 claims description 6
- 238000005259 measurement Methods 0.000 claims description 5
- 108010076504 Protein Sorting Signals Proteins 0.000 claims description 3
- 239000012080 ambient air Substances 0.000 claims description 3
- 230000015572 biosynthetic process Effects 0.000 claims description 3
- 238000004364 calculation method Methods 0.000 claims description 3
- 238000006243 chemical reaction Methods 0.000 claims description 3
- 238000004140 cleaning Methods 0.000 claims description 3
- 230000006835 compression Effects 0.000 claims description 3
- 238000007906 compression Methods 0.000 claims description 3
- 230000005611 electricity Effects 0.000 claims description 3
- 238000001914 filtration Methods 0.000 claims description 3
- 230000004044 response Effects 0.000 claims description 3
- 230000009897 systematic effect Effects 0.000 claims description 3
- 238000013475 authorization Methods 0.000 claims 1
- 238000012545 processing Methods 0.000 abstract description 4
- 230000009286 beneficial effect Effects 0.000 abstract description 3
- 238000004458 analytical method Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 239000002131 composite material Substances 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000686 essence Substances 0.000 description 1
- 230000001939 inductive effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000009885 systemic effect Effects 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/418—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
- G05B19/4185—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM] characterised by the network communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/60—Network streaming of media packets
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/3026—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to polynomials generation, e.g. generation of irreducible polynomials
Landscapes
- Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Multimedia (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- General Health & Medical Sciences (AREA)
- Algebra (AREA)
- Health & Medical Sciences (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Manufacturing & Machinery (AREA)
- Quality & Reliability (AREA)
- Automation & Control Theory (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Data processing equipment technical field of the present invention, disclosing a kind of industrial data collection control system of BOUND communication plug-in unit after intelligence includes:Detection module, mobile terminal detection module, the data read module being connected with industry monitoring master station;Detection module includes power module, sensor assembly, microcontroller, display module, audio alarm circuit and alarm, and mobile terminal detection module includes the data in mobile phone sharing module for being used to wirelessly share cell phone customer end data being connected with described detection module;Data read module includes:Network data download module, cipher key store, operator database, the network data authentication module being connected respectively with the cipher key store, operator database and the network data download module etc..The quantity for the signal acquisition module that the present invention is provided can be assembled freely as needed, beneficial to the industrial data collection in industrial applications;Make the communication compatibility between master station and acquisition module strong.
Description
Technical field
The invention belongs to a kind of industrial number of BOUND communication plug-in unit after data processing equipment technical field, more particularly to intelligence
According to acquisition control system.
Background technology
A kind of prior art, system that communication plug-in unit is dynamically added to industrial data acquisition system, belongs to industrial automation.
Industrial data acquisition system is made up of sensor, instrument, computer communication interface and industrial computer;The output end of sensor connects
Instrument is connect, instrument is connected by computer communication interface with industrial computer.Using " rear binding " method, after software translating
Carry out corresponding communication plug-in unit in operation to call, communication software plug-in unit can be developed after the completion of systemic software development, be carried
The high dynamically adapting ability of system, has larger application reference value for industrial data collection;
, it is necessary to gather various sensor parameters, such as gas in the automatic measurement of accurate (micron order) component of machine product
Dynamic sensor, inductive displacement transducer, current type sensor etc..In conventional technique scheme, various sensor parameters are point
Do not gather not individually, transmit, cause three problems, one is while when needing some parameters, it is impossible to obtain in time;Two be configuration
It is sufficiently complex, serious waste cost;Three, application flexibility is poor, it is impossible to the product of compatible each producer on the market.
In summary, the problem of prior art is present be:Although some layouts to circuit of prior art are optimized,
But because sensor parameters can not be directly transferred to user terminal, thus timely and effectively sensor parameters can not be divided
Analysis, has a strong impact on automation collection and the measurement of industrial data.
The content of the invention
To solve the problem of prior art is present, it is an object of the invention to provide BOUND communication plug-in unit after a kind of intelligence
Industrial data collection control system.
The present invention is achieved in that a kind of industrial data collection control system of BOUND communication plug-in unit after intelligence, described
The industrial data collection control system of BOUND communication plug-in unit includes after intelligence:Detection module, mobile terminal detection module and industry
Monitor the data read module of master station's connection;
Described detection module includes power module, sensor assembly, microcontroller, display module, audio alarm circuit
And alarm, described microcontroller is connected with described air cleaning member, and the power module receives the electricity of outside input
Source voltage and respectively output services voltage are to microcontroller and sensor assembly, and the sensor assembly connects the microcontroller
Device, display module and the audio alarm circuit connects the microcontroller respectively, and the alarm connects audio alarm circuit,
Sensor assembly is used to detect ambient air quality and according to the corresponding detection signal of the air quality result of detection output to micro-
Controller, the microcontroller controls display module to show detected air quality according to the detection signal of sensor assembly
And when the air quality detected is poor audio alarm circuit and alarm can be controlled to be alarmed;
Described mobile terminal detection module with described detection module including being connected for wirelessly sharing cell phone customer
The data in mobile phone sharing module of end data;
Described data read module includes:
Network data download module, for being downloaded from carrier server by the Network authentication data and net after public key encryption
Network configuration data;
Cipher key store, for storing the private key matched with the public key of the carrier server;
Operator database, for storing Network authentication data and network configuration data;
The network number being connected respectively with the cipher key store, the operator database and the network data download module
According to authentication module, for obtain in the cipher key store with the private key corresponding to the public key, after the private key pair encryption
Network authentication data and network configuration data are decrypted, and the Network authentication data after decryption and network configuration data are carried out
Network authentication data and network configuration data are stored in shown operator database by certification, certification after;
Described data read module also includes:
The authentication module being connected with the operator database, for being reflected using the network in the operator database
Flexible strategy are according to completion authentication request;
The network selection module being connected with the operator database, for by set the Network authentication data and
Network configuration data;
The order being connected respectively with the network data download module, the authentication module and the network selection module
Explanation module, sends to corresponding functional module for explaining the order from the mobile terminal, and by the order after explanation
It is interior;The interface communication module being connected with the command interpretation module, for being communicated with the mobile terminal;
The industrial data collection control system of BOUND communication plug-in unit also includes intelligent management system after the intelligence;Described
Intelligent management system is connected with described data read module;And it is provided with mobile phone terminal APP data reception modules;
Sensor assembly includes several sensors, processor, communication module;Several described sensors pass through the mould that communicates
Block connects processor;The processor is connected by communication module with microcontroller;
In the private key that the public key of the key library storage and the carrier server matches, in addition to private key plus
Close, the encryption method includes:
Public key is generated:Public key is by finite field k, and the secondary multinomial composition of its addition and multiplication structure and n;
Private key is generated:Private key is by mapping the z of the r Line independent for F~randomly select1,…,zr∈k[x1,…,x2l], one
Individual point set P, two reversible affine transformation L1And L2And their inverse composition;
Ciphering process is given plaintext M '=(x1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '=
(z1′,…,zn′);
The process that centralizing mapping is reconfigured comprises the following steps:
First, selection r is a smaller integer, randomly chooses r Line independent equation
Map Z:k2l→krIt is identified below:
Z(x1,…,x2l)=(z1(x1,…,x2l),…,zr(x1,…,x2l)),
Secondly, the multinomial that 2l total degree is 2 is randomly selected
MappingIt is identified below:
Then, perturbed hard-chain F is defined*:k2l→k2lForWith being combined for Z:
Wherein f1 *,…,f2l *∈k[x1,…,x2l],
Finally, F is mapped with internal disturbance*The original centralizing mapping of disturbanceNew public key is mapped as:
The public key generation comprises the following steps:
Choose finite field k, and its addition and multiplication structure;
Choose 2l secondary multinomial groups:
f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
Described private key generation comprises the following steps:
Choose mappingI.e. two random number α1, α2;
Randomly select the z of r Line independent1,…,zr∈k[x1,…,xn];
It is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
Point set P is by 2l quadratic polynomial randomly selectingIt is determined that;
Choose two reversible affine transformation L1And L2And theirs is inverse;
Described ciphering process comprises the following steps:
Given message M '=(x1′,…,xn′);
Plaintext is encrypted with the public key of selection, the ciphertext after encryption is:
Z '=(z1′,…,zn'), wherein
The decrypting process of the network data authentication module is the inverse process of cipher key store encryption, and decryption key used is choosing
The private key taken;Described decrypting process comprises the following steps:
Obtaining ciphertext Z '=(z1′,…,z2l') after, calculate first:
Y '=L2 -1(Z ')=(y1′,…,y2l′);
For the every bit (μ, λ) in point set P, calculate:
Then Z (y are verified1″,…,y2l")=μ, if invalid, abandons this class value;Otherwise next step is carried out;
Finally calculate:
M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),
If only unique one group of (m1′,…,m2l'), then M ' just must be corresponding plaintext, if exceeded
One group of (m1′,…,m2l'), then verify the mode of equation to determine unique plaintext with Hash functions or increase.
Further, the sensor measurement model is as follows:
YA(tk-1)、YA(tk)、YA(tk+1) be respectively temperature sensor A to target in tk-1,tk,tk+1The local flute card at moment
Measuring value under your coordinate system, be respectively:
Wherein, Y'A(tk-1)、Y'A(tk)、Y'A(tk+1) it is respectively temperature sensor A in tk-1,tk,tk+1The local flute at moment
Actual position under karr coordinate system;CA(t) it is the transformation matrix of error;ξA(t) it is the systematic error of temperature sensor;
For system noise, it is assumed thatFor zero-mean, separate Gaussian stochastic variable, noise covariance
Matrix is respectively RA(k-1)、RA(k)、RA(k+1)。
Further, the data sharing method of data in mobile phone sharing module, is specifically included:
Request is shared in acquisition;
Share request according to described, call a streaming media service, and determine first data for being used to share;
Based on the streaming media service, first data are converted into stream medium data and generation one by Streaming Media
Agreement results in the address information of the stream medium data;
The address information is sent to controller;Wherein, the address information is used to make the detection module according to described
Address information obtains the stream medium data;
Based on the streaming media service, after the confirmation of the controller is received, exported to the detection module
The stream medium data.
Further, included according to first data for sharing request determination for sharing:
If from it is described share the fileinfo of any data file stored on the detection module is got in request,
It is the first data for sharing to determine any data file;
It is if in any data file handling procedure, receiving and sharing request, then currently processed any data file is true
It is set to the first data for sharing.
Further, before the stream medium data is exported to the detection module, further comprise:
Control information is sent to the detection module, the control information is used to make the detection module according to the control
Information determines to perform the stream medium data application program;
When in any data file handling procedure, receive it is described share request, according to it is described share ask determination to be used for
The first data shared, and first data are converted into stream medium data and generation one can be obtained by stream media protocol
Obtaining the address information of the stream medium data includes:
Currently processed any data file is defined as the first data for sharing;
The currently processed positional information of any data file is obtained, and will be untreated in any data file
It is partially converted to stream medium data and generation one results in the address information of the stream medium data by stream media protocol;
Any data file is converted into stream medium data and generation one institute is resulted in by stream media protocol
State the address information of stream medium data.
Further, request is shared in the acquisition includes:
If detecting the operation information that detection module performs setting operation, being shared according to operation information generation please
Ask;
The handling process that any data file is terminated after the confirmation of the detection module is received;
Share described in obtaining after request, using the data inputted in real time as the first data, Streaming Media is called based on described
The first data inputted in real time are converted into stream medium data by service.
Further, the industrial data collection control system of BOUND communication plug-in unit also includes signal acquisition mould after the intelligence
Block;The signal acquisition method of the signal acquisition module includes:
First, echo signal x (t) is acquired within the independent sampling period with awareness apparatus, and with A/D modes pair
Signal carries out digital quantization;Then, dimensionality reduction is carried out to the signal x (i) after quantization;Finally, the signal after dimensionality reduction is reconstructed;
Wherein t is sampling instant, and i is the signal sequence after quantifying.
Further, dimensionality reduction is carried out to the signal after quantization, is specifically that the signal after quantization is filtered by finite impulse response (FIR)
The difference equation of ripple deviceI=1 ..., M, wherein h (0) ..., h (L-1) are filter coefficient, design
Compressed sensing signal acquisition framework based on filtering, constructs following Teoplitz calculation matrix:
Then observeI=1 ..., M, wherein b1,…,bLRegard filter coefficient as;Submatrix ΦFT
Singular value be gram matrix G (ΦF, T) and=Φ 'FTΦFTThe arithmetic root of characteristic value, checking G (Φ F, T) all eigenvalue λs
i∈(1-δK,1+δK), i=1 ..., T, then ΦFRIP is met, and original signal is reconstructed by solving such as following formula optimization problem:
Original signal, that is, BP algorithm are reconstructed by linear programming method;
For actual compression signal, Φ is then changed in the collection of such as voice or picture signalFFor following form:
If signal, with openness, pass through and solved such as following formula optimization problem, accurate weight on conversion basic matrix Ψ
Structure goes out original signal:
Wherein Φ is uncorrelated to Ψ, and Ξ is referred to as CS matrixes.
The quantity for the signal acquisition module that the present invention is provided can be assembled freely as needed, beneficial in industrial applications
Industrial data collection;It is sequentially connected between acquisition module, the transmission that the data of collection can be made up of acquisition module
Analysis storage is carried out to master station, relative to acquisition module is separately provided, can effectively simplify configuration;The mould of acquisition module collection
Intend signal or data signal to send to communication module according to default communication protocol, communication module with the communication protocol of standard by its
Send to master station, the communication protocol of standard can be USB communication protocol, wireless communication protocol etc., make master station and acquisition module it
Between communication compatibility it is strong.
The encrypting and decrypting method of the present invention, implementation is simple, and safe, flexibility is strong.
The property of multivariable polynomial equation can be conveniently solved in finite field of the present invention, using the method for internal disturbance,
A kind of new centralizing mapping is constructed, so as to improve the security of multivariate public key cryptography encryption and decryption scheme, the program is not only
With higher efficiency, moreover it is possible to the attack of effective resistance lienarized equation, while can also resist order attack, differential attack and straight
Connect attack.
The data sampling and processing of the present invention, and the method such as data sharing, have fully ensured that control system real time data
It is accurate to obtain, it is ensured that the intellectuality used, it the composite can be widely applied to home intelligent equipment, communication apparatus, communication system
Field.
Brief description of the drawings
Fig. 1 is the industrial data collection control system signal of BOUND communication plug-in unit after intelligence provided in an embodiment of the present invention
Figure.
In figure:1st, detection module;2nd, mobile terminal detection module;3rd, industry monitoring master station;4th, data read module;5th, believe
Number acquisition module.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to embodiments, to the present invention
It is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to
Limit the present invention.
The application principle of the present invention is described in detail below in conjunction with the accompanying drawings.
As shown in figure 1, after intelligence provided in an embodiment of the present invention BOUND communication plug-in unit industrial data collection control system,
Including:Detection module 1, mobile terminal detection module 2, the data read module 4 being connected with industry monitoring master station 3;
Described detection module 1 includes power module, sensor assembly, microcontroller, display module, audio alarm circuit
And alarm, described microcontroller is connected with described air cleaning member, and the power module receives the electricity of outside input
Source voltage and respectively output services voltage are to microcontroller and sensor assembly, and the sensor assembly connects the microcontroller
Device, display module and the audio alarm circuit connects the microcontroller respectively, and the alarm connects audio alarm circuit,
Sensor assembly is used to detect ambient air quality and according to the corresponding detection signal of the air quality result of detection output to micro-
Controller, the microcontroller controls display module to show detected air quality according to the detection signal of sensor assembly
And when the air quality detected is poor audio alarm circuit and alarm can be controlled to be alarmed;
Described mobile terminal detection module 2 with described detection module including being connected for wirelessly sharing cell phone customer
The data in mobile phone sharing module of end data;
Described data read module 4 includes:
Network data download module, for being downloaded from carrier server by the Network authentication data and net after public key encryption
Network configuration data;
Cipher key store, for storing the private key matched with the public key of the carrier server;
Operator database, for storing Network authentication data and network configuration data;
The network number being connected respectively with the cipher key store, the operator database and the network data download module
According to authentication module, for obtain in the cipher key store with the private key corresponding to the public key, after the private key pair encryption
Network authentication data and network configuration data are decrypted, and the Network authentication data after decryption and network configuration data are carried out
Network authentication data and network configuration data are stored in shown operator database by certification, certification after;
Described data read module also includes:
The authentication module being connected with the operator database, for being reflected using the network in the operator database
Flexible strategy are according to completion authentication request;
The network selection module being connected with the operator database, for by set the Network authentication data and
Network configuration data;
The order being connected respectively with the network data download module, the authentication module and the network selection module
Explanation module, sends to corresponding functional module for explaining the order from the mobile terminal, and by the order after explanation
It is interior;The interface communication module being connected with the command interpretation module, for being communicated with the mobile terminal.
The industrial data collection control system of BOUND communication plug-in unit also includes intelligent management system after the intelligence;Described
Intelligent management system is connected with described data read module;And it is provided with mobile phone terminal APP data reception modules.
Sensor assembly includes several sensors, processor, communication module;Several described sensors pass through the mould that communicates
Block connects processor;The processor is connected by communication module with microcontroller.
In the private key that the public key of the key library storage and the carrier server matches, in addition to private key plus
Close, the encryption method includes:
Public key is generated:Public key is by finite field k, and the secondary multinomial composition of its addition and multiplication structure and n;
Private key is generated:Private key is by mapping the z of the r Line independent for F~randomly select1,…,zr∈k[x1,…,x2l], one
Individual point set P, two reversible affine transformation L1And L2And their inverse composition;
Ciphering process is given plaintext M '=(x1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '=
(z1′,…,zn′);
The process that centralizing mapping is reconfigured comprises the following steps:
First, selection r is a smaller integer, randomly chooses r Line independent equation
Map Z:k2l→krIt is identified below:
Z(x1,…,x2l)=(z1(x1,…,x2l),…,zr(x1,…,x2l)),
Secondly, the multinomial that 2l total degree is 2 is randomly selected
MappingIt is identified below:
Then, perturbed hard-chain F is defined*:k2l→k2lForWith being combined for Z:
Wherein f1 *,…,f2l *∈k[x1,…,x2l],
Finally, F is mapped with internal disturbance*The original centralizing mapping of disturbanceNew public key is mapped as:
The public key generation comprises the following steps:
Choose finite field k, and its addition and multiplication structure;
Choose 2l secondary multinomial groups:
f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
Described private key generation comprises the following steps:
Choose mappingI.e. two random number α1, α2;
Randomly select the z of r Line independent1,…,zr∈k[x1,…,xn];
It is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
Point set P is by 2l quadratic polynomial randomly selectingIt is determined that;
Choose two reversible affine transformation L1And L2And theirs is inverse;
Described ciphering process comprises the following steps:
Given message M '=(x1′,…,xn′);
Plaintext is encrypted with the public key of selection, the ciphertext after encryption is:
Z '=(z1′,…,zn'), wherein
The decrypting process of the network data authentication module is the inverse process of cipher key store encryption, and decryption key used is choosing
The private key taken;Described decrypting process comprises the following steps:
Obtaining ciphertext Z '=(z1′,…,z2l') after, calculate first:
Y '=L2 -1(Z ')=(y1′,…,y2l′);
For the every bit (μ, λ) in point set P, calculate:
Then Z (y are verified1″,…,y2l")=μ, if invalid, abandons this class value;Otherwise next step is carried out;
Finally calculate:
M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),
If only unique one group of (m1′,…,m2l'), then M ' just must be corresponding plaintext, if exceeded
One group of (m1′,…,m2l'), then verify the mode of equation to determine unique plaintext with Hash functions or increase.
The sensor measurement model is as follows:
YA(tk-1)、YA(tk)、YA(tk+1) be respectively temperature sensor A to target in tk-1,tk,tk+1The local flute card at moment
Measuring value under your coordinate system, be respectively:
Wherein, Y'A(tk-1)、Y'A(tk)、Y'A(tk+1) it is respectively temperature sensor A in tk-1,tk,tk+1The local flute at moment
Actual position under karr coordinate system;CA(t) it is the transformation matrix of error;ξA(t) it is the systematic error of temperature sensor;
For system noise, it is assumed thatFor zero-mean, separate Gaussian stochastic variable, noise covariance
Matrix is respectively RA(k-1)、RA(k)、RA(k+1)。
The data sharing method of data in mobile phone sharing module, is specifically included:
Request is shared in acquisition;
Share request according to described, call a streaming media service, and determine first data for being used to share;
Based on the streaming media service, first data are converted into stream medium data and generation one by Streaming Media
Agreement results in the address information of the stream medium data;
The address information is sent to controller;Wherein, the address information is used to make the detection module according to described
Address information obtains the stream medium data;
Based on the streaming media service, after the confirmation of the controller is received, exported to the detection module
The stream medium data.
Included according to first data for sharing request determination for sharing:
If from it is described share the fileinfo of any data file stored on the detection module is got in request,
It is the first data for sharing to determine any data file;
It is if in any data file handling procedure, receiving and sharing request, then currently processed any data file is true
It is set to the first data for sharing.
Before the stream medium data is exported to the detection module, further comprise:
Control information is sent to the detection module, the control information is used to make the detection module according to the control
Information determines to perform the stream medium data application program;
When in any data file handling procedure, receive it is described share request, according to it is described share ask determination to be used for
The first data shared, and first data are converted into stream medium data and generation one can be obtained by stream media protocol
Obtaining the address information of the stream medium data includes:
Currently processed any data file is defined as the first data for sharing;
The currently processed positional information of any data file is obtained, and will be untreated in any data file
It is partially converted to stream medium data and generation one results in the address information of the stream medium data by stream media protocol;
Any data file is converted into stream medium data and generation one institute is resulted in by stream media protocol
State the address information of stream medium data.
Request is shared in the acquisition to be included:
If detecting the operation information that detection module performs setting operation, being shared according to operation information generation please
Ask;
The handling process that any data file is terminated after the confirmation of the detection module is received;
Share described in obtaining after request, using the data inputted in real time as the first data, Streaming Media is called based on described
The first data inputted in real time are converted into stream medium data by service.
The industrial data collection control system of BOUND communication plug-in unit also includes signal acquisition module 5 after the intelligence;It is described
The signal acquisition method of signal acquisition module includes:
First, echo signal x (t) is acquired within the independent sampling period with awareness apparatus, and with A/D modes pair
Signal carries out digital quantization;Then, dimensionality reduction is carried out to the signal x (i) after quantization;Finally, the signal after dimensionality reduction is reconstructed;
Wherein t is sampling instant, and i is the signal sequence after quantifying.
Dimensionality reduction is carried out to the signal after quantization, is specifically the difference that finite impulse response filter is passed through to the signal after quantization
Divide equationI=1 ..., M, wherein h (0) ..., h (L-1) are filter coefficient, and design is based on filtering
Compressed sensing signal acquisition framework, construct following Teoplitz calculation matrix:
Then observeI=1 ..., M, wherein b1,…,bLRegard filter coefficient as;Submatrix ΦFT
Singular value be gram matrix G (ΦF, T) and=Φ 'FTΦFTThe arithmetic root of characteristic value, checking G (Φ F, T) all eigenvalue λs
i∈(1-δK,1+δK), i=1 ..., T, then ΦFRIP is met, and original signal is reconstructed by solving such as following formula optimization problem:
Original signal, that is, BP algorithm are reconstructed by linear programming method;
For actual compression signal, Φ is then changed in the collection of such as voice or picture signalFFor following form:
If signal, with openness, pass through and solved such as following formula optimization problem, accurate weight on conversion basic matrix Ψ
Structure goes out original signal:
Wherein Φ is uncorrelated to Ψ, and Ξ is referred to as CS matrixes.
The quantity for the signal acquisition module that the present invention is provided can be assembled freely as needed, beneficial in industrial applications
Industrial data collection;It is sequentially connected between acquisition module, the transmission that the data of collection can be made up of acquisition module
Analysis storage is carried out to master station, relative to acquisition module is separately provided, can effectively simplify configuration;The mould of acquisition module collection
Intend signal or data signal to send to communication module according to default communication protocol, communication module with the communication protocol of standard by its
Send to master station, the communication protocol of standard can be USB communication protocol, wireless communication protocol etc., make master station and acquisition module it
Between communication compatibility it is strong.
The encrypting and decrypting method of the present invention, implementation is simple, and safe, flexibility is strong.
The property of multivariable polynomial equation can be conveniently solved in finite field of the present invention, using the method for internal disturbance,
A kind of new centralizing mapping is constructed, so as to improve the security of multivariate public key cryptography encryption and decryption scheme, the program is not only
With higher efficiency, moreover it is possible to the attack of effective resistance lienarized equation, while can also resist order attack, differential attack and straight
Connect attack.
The data sampling and processing of the present invention, and the method such as data sharing, have fully ensured that control system real time data
It is accurate to obtain, it is ensured that the intellectuality used, it the composite can be widely applied to home intelligent equipment, communication apparatus, communication system
Field.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
Any modifications, equivalent substitutions and improvements made within refreshing and principle etc., should be included in the scope of the protection.
Claims (7)
1. the industrial data collection control system of BOUND communication plug-in unit after a kind of intelligence, it is characterised in that bound after the intelligence
The industrial data collection control system of communication plug-in unit includes:Detection module, mobile terminal detection module and industry monitoring master station connect
The data read module connect;
Described detection module includes power module, sensor assembly, microcontroller, display module, audio alarm circuit and report
Alert device, described microcontroller is connected with described air cleaning member, and the power module receives the power supply electricity of outside input
Press and distinguish output services voltage to microcontroller and sensor assembly, the sensor assembly connects the microcontroller, institute
State display module and audio alarm circuit connects the microcontroller respectively, the alarm connects audio alarm circuit, sensing
Device module is used to detect ambient air quality and according to the corresponding detection signal of the air quality result of detection output to microcontroller
Device, the microcontroller shows detected air quality according to the detection signal of sensor assembly control display module and can
Audio alarm circuit and alarm is controlled to be alarmed when the air quality detected is poor;
Described mobile terminal detection module with described detection module including being connected for wirelessly sharing cell-phone customer terminal number
According to data in mobile phone sharing module;
Described data read module includes:
Network data download module, is matched somebody with somebody for being downloaded from carrier server by the Network authentication data and network after public key encryption
Put data;
Cipher key store, for storing the private key matched with the public key of the carrier server;
Operator database, for storing Network authentication data and network configuration data;
The network data being connected respectively with the cipher key store, the operator database and the network data download module is recognized
Demonstrate,prove module, for obtain in the cipher key store with the private key corresponding to the public key, pass through the network after the private key pair encryption
Authorization data and network configuration data are decrypted, and the Network authentication data and network configuration data after decryption are recognized
Network authentication data and network configuration data are stored in shown operator database by card, certification after;
Described data read module also includes:
The authentication module being connected with the operator database, for using the network authentication number in the operator database
According to completion authentication request;
The network selection module being connected with the operator database, for by setting the Network authentication data and network
Configuration data;
The command interpretation being connected respectively with the network data download module, the authentication module and the network selection module
Module, sends to corresponding functional module for explaining the order from the mobile terminal, and by the order after explanation;With
The interface communication module that the command interpretation module is connected, for being communicated with the mobile terminal;
The industrial data collection control system of BOUND communication plug-in unit also includes intelligent management system after the intelligence;Described intelligence
Management system is connected with described data read module;And it is provided with mobile phone terminal APP data reception modules;
Sensor assembly includes several sensors, processor, communication module;Several described sensors are connected by communication module
Connect processor;The processor is connected by communication module with microcontroller;
In the private key that the public key of the key library storage and the carrier server matches, include the encryption of private key, institute
Stating encryption method includes:
Public key is generated:Public key is by finite field k, and the secondary multinomial composition of its addition and multiplication structure and n;
Private key is generated:Private key is by mapping the z of the r Line independent for F~randomly select1,…,zr∈k[x1,…,x2l], a point
Collect P, two reversible affine transformation L1And L2And their inverse composition;
Ciphering process is given plaintext M '=(x '1,…,x′n), it is encrypted with the public key of selection, formation ciphertext Z '=
(z′1,…,z′n);
The process that centralizing mapping is reconfigured comprises the following steps:
First, selection r is a smaller integer, randomly chooses r Line independent equation
<mfenced open = "" close = "">
<mtable>
<mtr>
<mtd>
<mrow>
<msub>
<mi>z</mi>
<mn>1</mn>
</msub>
<mrow>
<mo>(</mo>
<msub>
<mi>x</mi>
<mn>1</mn>
</msub>
<mo>,</mo>
<mo>...</mo>
<mo>,</mo>
<msub>
<mi>x</mi>
<mrow>
<mn>2</mn>
<mi>l</mi>
</mrow>
</msub>
<mo>)</mo>
</mrow>
<mo>=</mo>
<munderover>
<mi>&Sigma;</mi>
<mrow>
<mi>j</mi>
<mo>=</mo>
<mn>1</mn>
</mrow>
<mrow>
<mn>2</mn>
<mi>l</mi>
</mrow>
</munderover>
<msub>
<mi>&alpha;</mi>
<mrow>
<mi>j</mi>
<mn>1</mn>
</mrow>
</msub>
<msub>
<mi>x</mi>
<mi>j</mi>
</msub>
<mo>+</mo>
<msub>
<mi>&beta;</mi>
<mn>1</mn>
</msub>
</mrow>
</mtd>
</mtr>
<mtr>
<mtd>
<mtable>
<mtr>
<mtd>
<mo>.</mo>
</mtd>
</mtr>
<mtr>
<mtd>
<mo>.</mo>
</mtd>
</mtr>
<mtr>
<mtd>
<mo>.</mo>
</mtd>
</mtr>
</mtable>
</mtd>
</mtr>
<mtr>
<mtd>
<mrow>
<msub>
<mi>z</mi>
<mi>r</mi>
</msub>
<mrow>
<mo>(</mo>
<msub>
<mi>x</mi>
<mn>1</mn>
</msub>
<mo>,</mo>
<mo>...</mo>
<mo>,</mo>
<msub>
<mi>x</mi>
<mrow>
<mn>2</mn>
<mi>l</mi>
</mrow>
</msub>
<mo>)</mo>
</mrow>
<mo>=</mo>
<munderover>
<mi>&Sigma;</mi>
<mrow>
<mi>j</mi>
<mo>=</mo>
<mn>1</mn>
</mrow>
<mrow>
<mn>2</mn>
<mi>l</mi>
</mrow>
</munderover>
<msub>
<mi>&alpha;</mi>
<mrow>
<mi>j</mi>
<mi>r</mi>
</mrow>
</msub>
<msub>
<mi>x</mi>
<mi>j</mi>
</msub>
<mo>+</mo>
<msub>
<mi>&beta;</mi>
<mi>r</mi>
</msub>
</mrow>
</mtd>
</mtr>
</mtable>
</mfenced>
Map Z:k2l→krIt is identified below:
Z(x1,…,x2l)=(z1(x1,…,x2l),…,zr(x1,…,x2l)),
Secondly, the multinomial that 2l total degree is 2 is randomly selected
MappingIt is identified below:
Then, perturbed hard-chain F is defined*:k2l→k2lForWith being combined for Z:
Wherein f1 *,…,f2l *∈k[x1,…,x2l],
Finally, F is mapped with internal disturbance*The original centralizing mapping of disturbanceNew public key is mapped as:
The public key generation comprises the following steps:
Choose finite field k, and its addition and multiplication structure;
Choose 2l secondary multinomial groups:
f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
Described private key generation comprises the following steps:
Choose mappingI.e. two random number α1, α2;
Randomly select the z of r Line independent1,…,zr∈k[x1,…,xn];
It is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
<mrow>
<mi>P</mi>
<mo>=</mo>
<mo>{</mo>
<mrow>
<mo>(</mo>
<mi>&mu;</mi>
<mo>,</mo>
<mi>&lambda;</mi>
<mo>)</mo>
</mrow>
<mo>|</mo>
<mover>
<mi>F</mi>
<mo>^</mo>
</mover>
<mrow>
<mo>(</mo>
<mi>&mu;</mi>
<mo>)</mo>
</mrow>
<mo>=</mo>
<mi>&lambda;</mi>
<mo>}</mo>
<mo>,</mo>
</mrow>
Point set P is by 2l quadratic polynomial randomly selectingIt is determined that;
Choose two reversible affine transformation L1And L2And theirs is inverse;
Described ciphering process comprises the following steps:
Given message M '=(x '1,…,x′n);
Plaintext is encrypted with the public key of selection, the ciphertext after encryption is:
Z '=(z '1,…,z′n), wherein
The decrypting process of the network data authentication module is the inverse process of cipher key store encryption, and decryption key used is selection
Private key;Described decrypting process comprises the following steps:
Obtaining ciphertext Z '=(z '1,…,z2l') after, calculate first:
Y '=L2 -1(Z ')=(y '1,…,y2l′);
For the every bit (μ, λ) in point set P, calculate:
<mrow>
<mo>(</mo>
<mrow>
<msup>
<msub>
<mi>y</mi>
<mn>1</mn>
</msub>
<mrow>
<mo>&prime;</mo>
<mo>&prime;</mo>
</mrow>
</msup>
<mo>,</mo>
<mo>...</mo>
<mo>,</mo>
<msup>
<msub>
<mi>y</mi>
<mrow>
<mn>2</mn>
<mi>l</mi>
</mrow>
</msub>
<mrow>
<mo>&prime;</mo>
<mo>&prime;</mo>
</mrow>
</msup>
</mrow>
<mo>)</mo>
<mo>=</mo>
<msup>
<mover>
<mi>F</mi>
<mo>~</mo>
</mover>
<mrow>
<mo>-</mo>
<mn>1</mn>
</mrow>
</msup>
<mrow>
<mo>(</mo>
<mo>(</mo>
<mrow>
<msup>
<msub>
<mi>y</mi>
<mn>1</mn>
</msub>
<mo>&prime;</mo>
</msup>
<mo>,</mo>
<mo>...</mo>
<mo>,</mo>
<msup>
<msub>
<mi>y</mi>
<mrow>
<mn>2</mn>
<mi>l</mi>
</mrow>
</msub>
<mo>&prime;</mo>
</msup>
</mrow>
<mo>)</mo>
<mo>+</mo>
<mi>&lambda;</mi>
<mo>)</mo>
</mrow>
<mo>,</mo>
</mrow>
Then Z (y " are verified1,…,y2l")=μ, if invalid, abandons this class value;Otherwise next step is carried out;
Finally calculate:
M '=L1 -1(y″1,…,y2l")=(m '1,…,m2l'),
If only unique one group of (m '1,…,m2l'), then M ' just must be corresponding plaintext, if obtained more than one group
(m '1,…,m2l'), then verify the mode of equation to determine unique plaintext with Hash functions or increase.
2. the industrial data collection control system of BOUND communication plug-in unit after intelligence as claimed in claim 1, it is characterised in that institute
State sensor measurement model as follows:
YA(tk-1)、YA(tk)、YA(tk+1) be respectively temperature sensor A to target in tk-1,tk,tk+1The local Descartes at moment sits
Measuring value under mark system, be respectively:
<mrow>
<msub>
<mi>Y</mi>
<mi>A</mi>
</msub>
<mrow>
<mo>(</mo>
<msub>
<mi>t</mi>
<mrow>
<mi>k</mi>
<mo>-</mo>
<mn>1</mn>
</mrow>
</msub>
<mo>)</mo>
</mrow>
<mo>=</mo>
<msub>
<msup>
<mi>Y</mi>
<mo>&prime;</mo>
</msup>
<mi>A</mi>
</msub>
<mrow>
<mo>(</mo>
<msub>
<mi>t</mi>
<mrow>
<mi>k</mi>
<mo>-</mo>
<mn>1</mn>
</mrow>
</msub>
<mo>)</mo>
</mrow>
<mo>-</mo>
<msub>
<mi>C</mi>
<mi>A</mi>
</msub>
<mrow>
<mo>(</mo>
<msub>
<mi>t</mi>
<mrow>
<mi>k</mi>
<mo>-</mo>
<mn>1</mn>
</mrow>
</msub>
<mo>)</mo>
</mrow>
<msub>
<mi>&xi;</mi>
<mi>A</mi>
</msub>
<mrow>
<mo>(</mo>
<msub>
<mi>t</mi>
<mrow>
<mi>k</mi>
<mo>-</mo>
<mn>1</mn>
</mrow>
</msub>
<mo>)</mo>
</mrow>
<mo>+</mo>
<msub>
<mi>n</mi>
<mrow>
<msub>
<mi>Y</mi>
<mi>A</mi>
</msub>
<mrow>
<mo>(</mo>
<msub>
<mi>t</mi>
<mrow>
<mi>k</mi>
<mo>-</mo>
<mn>1</mn>
</mrow>
</msub>
<mo>)</mo>
</mrow>
</mrow>
</msub>
<mo>;</mo>
</mrow>
<mrow>
<msub>
<mi>Y</mi>
<mi>A</mi>
</msub>
<mrow>
<mo>(</mo>
<msub>
<mi>t</mi>
<mi>k</mi>
</msub>
<mo>)</mo>
</mrow>
<mo>=</mo>
<msub>
<msup>
<mi>Y</mi>
<mo>&prime;</mo>
</msup>
<mi>A</mi>
</msub>
<mrow>
<mo>(</mo>
<msub>
<mi>t</mi>
<mi>k</mi>
</msub>
<mo>)</mo>
</mrow>
<mo>-</mo>
<msub>
<mi>C</mi>
<mi>A</mi>
</msub>
<mrow>
<mo>(</mo>
<msub>
<mi>t</mi>
<mi>k</mi>
</msub>
<mo>)</mo>
</mrow>
<msub>
<mi>&xi;</mi>
<mi>A</mi>
</msub>
<mrow>
<mo>(</mo>
<msub>
<mi>t</mi>
<mi>k</mi>
</msub>
<mo>)</mo>
</mrow>
<mo>+</mo>
<msub>
<mi>n</mi>
<mrow>
<msub>
<mi>Y</mi>
<mi>A</mi>
</msub>
<mrow>
<mo>(</mo>
<msub>
<mi>t</mi>
<mi>k</mi>
</msub>
<mo>)</mo>
</mrow>
</mrow>
</msub>
<mo>;</mo>
</mrow>
<mrow>
<msub>
<mi>Y</mi>
<mi>A</mi>
</msub>
<mrow>
<mo>(</mo>
<msub>
<mi>t</mi>
<mrow>
<mi>k</mi>
<mo>+</mo>
<mn>1</mn>
</mrow>
</msub>
<mo>)</mo>
</mrow>
<mo>=</mo>
<msub>
<msup>
<mi>Y</mi>
<mo>&prime;</mo>
</msup>
<mi>A</mi>
</msub>
<mrow>
<mo>(</mo>
<msub>
<mi>t</mi>
<mrow>
<mi>k</mi>
<mo>+</mo>
<mn>1</mn>
</mrow>
</msub>
<mo>)</mo>
</mrow>
<mo>-</mo>
<msub>
<mi>C</mi>
<mi>A</mi>
</msub>
<mrow>
<mo>(</mo>
<msub>
<mi>t</mi>
<mrow>
<mi>k</mi>
<mo>+</mo>
<mn>1</mn>
</mrow>
</msub>
<mo>)</mo>
</mrow>
<msub>
<mi>&xi;</mi>
<mi>A</mi>
</msub>
<mrow>
<mo>(</mo>
<msub>
<mi>t</mi>
<mrow>
<mi>k</mi>
<mo>+</mo>
<mn>1</mn>
</mrow>
</msub>
<mo>)</mo>
</mrow>
<mo>+</mo>
<msub>
<mi>n</mi>
<mrow>
<msub>
<mi>Y</mi>
<mi>A</mi>
</msub>
<mrow>
<mo>(</mo>
<msub>
<mi>t</mi>
<mrow>
<mi>k</mi>
<mo>+</mo>
<mn>1</mn>
</mrow>
</msub>
<mo>)</mo>
</mrow>
</mrow>
</msub>
<mo>;</mo>
</mrow>
Wherein, Y'A(tk-1)、Y'A(tk)、Y'A(tk+1) it is respectively temperature sensor A in tk-1,tk,tk+1The local Descartes at moment
Actual position under coordinate system;CA(t) it is the transformation matrix of error;ξA(t) it is the systematic error of temperature sensor;To be
System noise, it is assumed thatFor zero-mean, separate Gaussian stochastic variable, noise covariance matrix
Respectively RA(k-1)、RA(k)、RA(k+1)。
3. the industrial data collection control system of BOUND communication plug-in unit after intelligence as claimed in claim 1, it is characterised in that hand
The data sharing method of machine data sharing module, is specifically included:
Request is shared in acquisition;
Share request according to described, call a streaming media service, and determine first data for being used to share;
Based on the streaming media service, first data are converted into stream medium data and generation one by stream media protocol
Result in the address information of the stream medium data;
The address information is sent to controller;Wherein, the address information is used to make the detection module according to the address
Stream medium data described in information acquisition;
Based on the streaming media service, after the confirmation of the controller is received, export described to the detection module
Stream medium data.
4. the industrial data collection control system of BOUND communication plug-in unit after intelligence as claimed in claim 3, it is characterised in that root
Include according to first data for sharing request determination for sharing:
If from it is described share the fileinfo of any data file stored on the detection module is got in request, it is determined that
Any data file is the first data for sharing;
If in any data file handling procedure, receiving and sharing request, then currently processed any data file is defined as
For the first data shared.
5. the industrial data collection control system of BOUND communication plug-in unit after intelligence as claimed in claim 3, it is characterised in that
Before exporting the stream medium data to the detection module, further comprise:
Control information is sent to the detection module, the control information is used to make the detection module according to the control information
It is determined that performing the stream medium data application program;
When in any data file handling procedure, receive it is described share request, share request according to described and determine for sharing
The first data, and first data are converted into stream medium data and generation one by stream media protocol results in institute
Stating the address information of stream medium data includes:
Currently processed any data file is defined as the first data for sharing;
Obtain the currently processed positional information of any data file, and by untreated part in any data file
Be converted to stream medium data and generation one results in the address information of the stream medium data by stream media protocol;
Any data file is converted into stream medium data and generation one stream is resulted in by stream media protocol
The address information of media data.
6. the industrial data collection control system of BOUND communication plug-in unit after intelligence as claimed in claim 3, it is characterised in that institute
Stating acquisition and sharing request includes:
If detecting the operation information that detection module performs setting operation, request is shared according to operation information generation;
The handling process that any data file is terminated after the confirmation of the detection module is received;
Share described in obtaining after request, using the data inputted in real time as the first data, streaming media service is called based on described
The first data inputted in real time are converted into stream medium data.
7. the industrial data collection control system of BOUND communication plug-in unit after intelligence as claimed in claim 1, it is characterised in that institute
Stating the industrial data collection control system of BOUND communication plug-in unit after intelligence also includes signal acquisition module;The signal acquisition module
Signal acquisition method include:
First, echo signal x (t) is acquired within the independent sampling period with awareness apparatus, and with A/D modes to signal
Carry out digital quantization;Then, dimensionality reduction is carried out to the signal x (i) after quantization;Finally, the signal after dimensionality reduction is reconstructed;Wherein
T is sampling instant, and i is the signal sequence after quantifying.
Dimensionality reduction is carried out to the signal after quantization, is specifically the difference side that finite impulse response filter is passed through to the signal after quantization
JourneyWherein h (0) ..., h (L-1) are filter coefficient, are designed based on filtering
Compressed sensing signal acquisition framework, constructs following Teoplitz calculation matrix:
Then observeWherein b1,…,bLRegard filter coefficient as;Submatrix ΦFT's
Singular value is gram matrix G (ΦF, T) and=Φ 'FTΦFTThe arithmetic root of characteristic value, checking G (Φ F, T) all eigenvalue λ i
∈(1-δK,1+δK), i=1 ..., T, then ΦFRIP is met, and original signal is reconstructed by solving such as following formula optimization problem:
<mfenced open = "" close = "">
<mtable>
<mtr>
<mtd>
<munder>
<mrow>
<mi>m</mi>
<mi>i</mi>
<mi>n</mi>
</mrow>
<mi>x</mi>
</munder>
</mtd>
<mtd>
<mrow>
<mo>|</mo>
<mo>|</mo>
<mi>x</mi>
<mo>|</mo>
<msub>
<mo>|</mo>
<mn>1</mn>
</msub>
</mrow>
</mtd>
<mtd>
<mrow>
<mi>s</mi>
<mo>.</mo>
<mi>t</mi>
<mo>.</mo>
</mrow>
</mtd>
<mtd>
<mrow>
<mi>y</mi>
<mo>=</mo>
<msub>
<mi>&Phi;</mi>
<mi>x</mi>
</msub>
</mrow>
</mtd>
</mtr>
</mtable>
</mfenced>
Original signal, that is, BP algorithm are reconstructed by linear programming method;
For actual compression signal, Φ is then changed in the collection of such as voice or picture signalFFor following form:
If signal has openness on conversion basic matrix Ψ, by solving such as following formula optimization problem, Accurate Reconstruction goes out
Original signal:
<mrow>
<mtable>
<mtr>
<mtd>
<munder>
<mi>min</mi>
<mi>&alpha;</mi>
</munder>
</mtd>
<mtd>
<mrow>
<mo>|</mo>
<mo>|</mo>
<mi>&alpha;</mi>
<mo>|</mo>
<msub>
<mo>|</mo>
<mn>1</mn>
</msub>
</mrow>
</mtd>
<mtd>
<mrow>
<mi>s</mi>
<mo>.</mo>
<mi>t</mi>
<mo>.</mo>
</mrow>
</mtd>
<mtd>
<mrow>
<mi>y</mi>
<mo>=</mo>
<msub>
<mi>&Phi;</mi>
<mi>x</mi>
</msub>
<mo>=</mo>
<mi>&Phi;</mi>
<mi>&Psi;</mi>
<mi>&alpha;</mi>
<mo>=</mo>
<mi>&Xi;</mi>
<mi>&alpha;</mi>
</mrow>
</mtd>
</mtr>
</mtable>
<mo>;</mo>
</mrow>
Wherein Φ is uncorrelated to Ψ, and Ξ is referred to as CS matrixes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710489537.2A CN107332895A (en) | 2017-06-24 | 2017-06-24 | The industrial data collection control system of BOUND communication plug-in unit after a kind of intelligence |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710489537.2A CN107332895A (en) | 2017-06-24 | 2017-06-24 | The industrial data collection control system of BOUND communication plug-in unit after a kind of intelligence |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107332895A true CN107332895A (en) | 2017-11-07 |
Family
ID=60194655
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710489537.2A Pending CN107332895A (en) | 2017-06-24 | 2017-06-24 | The industrial data collection control system of BOUND communication plug-in unit after a kind of intelligence |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107332895A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107819673A (en) * | 2017-11-24 | 2018-03-20 | 安徽省雨龙家具有限公司 | It is a kind of based on the intelligent home furnishing control method to communicate in time |
CN110362055A (en) * | 2019-08-05 | 2019-10-22 | 广东省智能制造研究所 | A kind of industrial data acquisition system that terminal is expansible and method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201616012U (en) * | 2010-04-03 | 2010-10-27 | 东方电子股份有限公司 | Main controller device used for high-voltage frequency converter modular design |
CN103034206A (en) * | 2012-12-14 | 2013-04-10 | 昆明理工大学 | Industrial data collection system adopting late binding communication plug-in unit |
CN103036573A (en) * | 2012-12-03 | 2013-04-10 | 南京工业大学 | compressed sensing signal acquisition method based on filtering |
CN103501227A (en) * | 2013-10-23 | 2014-01-08 | 西安电子科技大学 | Improved multi-variable public key cryptogram encryption and decryption scheme |
CN105381556A (en) * | 2015-11-19 | 2016-03-09 | 宁波祖创电子科技有限公司 | Intelligent wearable type air purifier |
CN106667273A (en) * | 2017-03-06 | 2017-05-17 | 王思琪 | Water dispenser with ultraviolet sterilization function |
-
2017
- 2017-06-24 CN CN201710489537.2A patent/CN107332895A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201616012U (en) * | 2010-04-03 | 2010-10-27 | 东方电子股份有限公司 | Main controller device used for high-voltage frequency converter modular design |
CN103036573A (en) * | 2012-12-03 | 2013-04-10 | 南京工业大学 | compressed sensing signal acquisition method based on filtering |
CN103034206A (en) * | 2012-12-14 | 2013-04-10 | 昆明理工大学 | Industrial data collection system adopting late binding communication plug-in unit |
CN103501227A (en) * | 2013-10-23 | 2014-01-08 | 西安电子科技大学 | Improved multi-variable public key cryptogram encryption and decryption scheme |
CN105381556A (en) * | 2015-11-19 | 2016-03-09 | 宁波祖创电子科技有限公司 | Intelligent wearable type air purifier |
CN106667273A (en) * | 2017-03-06 | 2017-05-17 | 王思琪 | Water dispenser with ultraviolet sterilization function |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107819673A (en) * | 2017-11-24 | 2018-03-20 | 安徽省雨龙家具有限公司 | It is a kind of based on the intelligent home furnishing control method to communicate in time |
CN110362055A (en) * | 2019-08-05 | 2019-10-22 | 广东省智能制造研究所 | A kind of industrial data acquisition system that terminal is expansible and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110460439A (en) | Information transferring method, device, client, server-side and storage medium | |
CN106534313B (en) | The frequency measuring method and system of facing cloud end data publication protection safety and privacy | |
JP5311459B2 (en) | Information collection system and external access device | |
CN101873587B (en) | Wireless communication device and method for realizing service security thereof | |
CN107770405A (en) | Image encryption method and device | |
CN106330856A (en) | Hearing device and method of hearing device communication | |
CN107666386B (en) | Data secure transmission method and device | |
CN107064428A (en) | A kind of room air monitor and alarm system | |
CN106888452A (en) | The wireless encryption transceiver and method of data are transmitted wirelessly from computer at least one field apparatus | |
CN115085923A (en) | Data processing-based applet data encryption method | |
CN104937382A (en) | Systems and methods for providing a cloud flowmeter | |
CN107332895A (en) | The industrial data collection control system of BOUND communication plug-in unit after a kind of intelligence | |
CN106301793A (en) | A kind of PLC certification and the method for secure communication | |
CN110213300A (en) | A kind of intelligence edge Internet of Things agent apparatus | |
CN113901412A (en) | Power quality disturbance detection method and device, electronic equipment and storage medium | |
CN106686006A (en) | Big data implementation control system based on Internet network security | |
CN115459919A (en) | Internet of things universal terminal security authentication system, method and device and Internet of things communication terminal | |
CN102394746B (en) | Data transmission method of weighing system based on digital sensor | |
CN116208632A (en) | Fire-fighting product tracing system and method based on blockchain, internet of things and IPFS | |
CN104735136A (en) | Novel mathematics learning system based on network | |
TWI707573B (en) | Apparatus for adding data to blockchain, data verification apparatus, and data verification method | |
CN110278077B (en) | Method, device, equipment and storage medium for acquiring data information of electric energy meter | |
CN109802948A (en) | Data processing equipment and transaction system | |
CN107547516A (en) | The encryption method at times and device of internet-of-things terminal data | |
CN116743341A (en) | Measurement data secure sharing method based on homomorphic encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171107 |