CN110535926B - Laboratory remote monitoring system - Google Patents

Laboratory remote monitoring system Download PDF

Info

Publication number
CN110535926B
CN110535926B CN201910770464.3A CN201910770464A CN110535926B CN 110535926 B CN110535926 B CN 110535926B CN 201910770464 A CN201910770464 A CN 201910770464A CN 110535926 B CN110535926 B CN 110535926B
Authority
CN
China
Prior art keywords
resistor
value
channel
input
operational amplifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910770464.3A
Other languages
Chinese (zh)
Other versions
CN110535926A (en
Inventor
邢希学
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dynaflow Experiment Technology Co ltd
Original Assignee
Beijing Dynaflow Experiment Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dynaflow Experiment Technology Co ltd filed Critical Beijing Dynaflow Experiment Technology Co ltd
Priority to CN201910770464.3A priority Critical patent/CN110535926B/en
Publication of CN110535926A publication Critical patent/CN110535926A/en
Application granted granted Critical
Publication of CN110535926B publication Critical patent/CN110535926B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02HEMERGENCY PROTECTIVE CIRCUIT ARRANGEMENTS
    • H02H9/00Emergency protective circuit arrangements for limiting excess current or voltage without disconnection
    • H02H9/04Emergency protective circuit arrangements for limiting excess current or voltage without disconnection responsive to excess voltage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/02Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP]
    • H04L67/025Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP] for remote control or remote monitoring of the application

Abstract

The invention relates to the technical field of remote monitoring, in particular to a laboratory remote monitoring system; the laboratory monitoring system transmits the monitored information to the remote end through the communication system, and the remote end transmits the received monitoring information to the web server through the web embedded node system, so that the online information sharing remote whole-network control is realized; the communication system comprises a communication optimization algorithm and a communication security algorithm; the web embedded node system performs registration service of the web server through scheduling operation; the invention is provided for the remote user by the web server, the remote user uses the web browser to download the web server page to observe the real-time operation condition of the equipment, modifies the variables, completes the monitoring task of the field equipment in the laboratory, and carries out the optimization algorithm and the encryption algorithm in the communication process to increase the safety and the communication efficiency of the communication process, thereby having strong creativity.

Description

Laboratory remote monitoring system
Technical Field
The invention relates to the technical field of remote monitoring, in particular to a laboratory remote monitoring system.
Background
The remote monitoring can be divided into two parts of monitoring and controlling literally, wherein the monitoring means that information is obtained through a network as a main part: the term "control" refers to a method for operating a remote computer through a network, and includes operations such as restarting and shutting down the remote computer, and daily setting of the remote computer.
In particular, in the aspect of industrial control, developers gradually introduce network technology into industrial control equipment, and meanwhile, Web technology is very popular with users and has been widely accepted and applied, and is based on a TCP/IP network communication protocol. The embedded Web server system drives the network interface chip by the controller, thereby carrying out information transmission and equipment control of TCP/IP and further carrying out remote control on related equipment. The WEB server designed and developed can access traditional serial communication equipment and the like into a network for network communication, can convert serial data information into network data information for TCP/IP information transmission, can process the transmitted data information and the like, ensures that errors do not occur in the data transmission process, converts the data format in such a way, and can send the parameter information of the traditional serial communication equipment such as 485 and 232 into the network for transmission, so that industrial equipment based on serial communication can be continuously utilized, premature elimination is not needed, and the utilization rate and the control efficiency of the industrial equipment can be further improved.
Laboratory safety is always a key concern of schools, especially with the occurrence of some laboratory safety accidents in recent years, the laboratory needs to be monitored comprehensively, however, various data of the laboratory are difficult to transmit in real time, the whole network sharing remote monitoring cannot be realized, and monitoring data are not encrypted and have huge risks.
Disclosure of Invention
Aiming at the defects of the prior art, the invention discloses a laboratory remote monitoring system which is used for solving the problems that various data in a laboratory are difficult to transmit in real time, the whole network sharing remote monitoring cannot be realized, and the monitoring data are not encrypted and have huge risks.
The invention is realized by the following technical scheme:
a laboratory remote monitoring system is characterized by comprising a laboratory monitoring system, a web embedded node system and a communication system, wherein the laboratory monitoring system transmits monitored information to a remote end through the communication system, and the remote end transmits the received monitored information to a web server through the web embedded node system, so that online information sharing remote whole-network control is realized; the communication system comprises a communication optimization algorithm and a communication security algorithm; the web embedded node system performs registration service of the web server through scheduling operation.
Preferably, the web server comprises the following operations:
s1: the source code is written by using C + + language and has portability;
s2: utilizing CPU resources;
s3: optimizing the SQL algorithm;
s4: providing a TCP/IP and ODBC database connection mode;
s5: the data information is effectively stored.
Preferably, the web embedded node system defines each monitored bottom layer state as a network variable permitted by an HTML language, generates a web page by using the variables, provides the web page to a remote user by the web server, and the remote user downloads the page of the web server by using a web browser to observe the real-time operation condition of the equipment, modifies the variables and completes the monitoring task of the laboratory field equipment.
Preferably, in the communication security algorithm, in order to improve the security of communication, a dynamic position mask value is constructed for each bit of each channel, when constructing the dynamic position mask value, the number of tracks in the communication process is first obtained, then, a channel mask is constructed for each channel, and when constructing the channel mask, a channel mapping function is constructed for each channel;
wherein i is a channel number, and td (i) is a channel mapping function constructed for the ith channel;
obtaining a location mask value for each location of each channel:
wherein, Wi,jThe position mask value of the jth bit of the ith channel is the position mask value, and s is the introduced channel coefficient.
Preferably, in the communication security algorithm, for data to be transmitted in each channel, first obtaining a code value of an ASCII code corresponding to the transmitted data, then converting the code value of the ASCII code into a binary value, and then performing data conversion on the binary value;
SZi,j=1-Si,j
wherein, SZi,jIs a pair of Si,jValue after data conversion, Si,jA binary value corresponding to the jth bit of the ith channel, i being 1, 2, 3 … … P, j being 1, 2, 3 … … K, where P is the total number of channels in the transmitted data, and K is each channelTotal number of bits of binary values of a track;
determining a transmission value for each bit of each channel;
mi,j=Wi,j*SZi,j
wherein m isi,jIs the transmitted value of the jth bit of the ith channel.
Will transmit the value mi,jDividing into a region according to each t bits, and then calculating a conversion value of each region:
wherein, F (m)k) For the conversion value calculated for the k region, mk,dIs the d-th value of the k-th region, p (m)k) Is the probability of a value other than 0 occurring among the transmission values in the k-th region;
when data is transmitted, the conversion value and the transmission value are transmitted simultaneously, and the transmission value is checked by using the conversion value, so that the accuracy of the transmission value is ensured.
Preferably, in the communication security algorithm, the mask operation replies to the plaintext, and based on the received information G, the information G is used as an initial value, and a known decryption algorithm is used to perform decryption, so as to obtain the following plaintext:
wherein, mei,jIs the value of the jth bit of the ith decrypted channel, Gi,jThe value of the jth bit of the ith channel of the received information is obtained, the decrypted information is the ASCII code corresponding to the plaintext information, and the ASCII code is converted into corresponding information which is then the plaintext information.
Preferably, in the communication security algorithm, the communication data is given to a Chebyshev mapping, wherein x is a track number of the communication data, and x e I [ -1,1] is satisfied]I is an integer; the real track values defining the communication data are: τ (x) cos (μcos-1(x))
|x|=0,B1(x),B2(x)…Bi(x);Bi(x)∈{0,1}
Its ith bit Bi(x) Can be expressed as:
wherein Θ isi(x) Is a threshold function defined as:
can be derived fromThe fixed and unchangeable relation between the symbol sequence interrupting the information to be transmitted and the mapping sub-intervals is covered by the mask of the communication encryption algorithm.
Preferably, in the communication security algorithm, the information σ to be transmitted isnExpressed as a binary sequence siThe method concretely comprises the following steps:
application ofFor the sequence siDo a mask, i.e. mask miIs composed of
Wherein B isiA sequence of only one bit.
Preferably, the masked sequence of characters { m } is divided into sequences of length t:
each sequence wjAnd (3) carrying out transformation:
where n is 0, t,2t,3 t.
Preferably, in the communication security algorithm, the masking operation replies to the plaintext as follows according to the received information xjX is to bejAs an initial value, a known key is used for carrying out decryption by using an iterative piecewise linear function to obtain the following plaintext:
where n is a natural number and I is a secret key.
Preferably, in the communication optimization algorithm, a data transfer rate C is definedjIs composed of
Wherein l belongs to U, U represents a user set needing a certain data packet j, and k is a selected transmitting end; gklFor channel gain, the transmission power is pdAnd pcInterference is Inf, N0Is Gaussian white noise spectral density, and B is channel loan.
Preferably, according to NeighjAnd the set of U selects the optimal relay node, and the obtained transmission rate is as follows:
where l ∈ Neighj∪ U is a set of neighbor nodes that can provide packet j to the target node.
Preferably, the laboratory monitoring system comprises a monitoring circuit,
the monitoring circuit includes: a first resistor R1, a second resistor R2, a third resistor R3, a fourth resistor R4, a fifth resistor R5, a sixth resistor R6, a seventh resistor R7, an eighth resistor R8, a ninth resistor R9, a tenth resistor R10, an eleventh resistor R11, a twelfth resistor R12, a thirteenth resistor R13, a first capacitor C1, a second capacitor C2, an NPN transistor Q, a first diode L1, a second diode L2, a third diode L1, a first operational amplifier a1, a second operational amplifier a2, a third operational amplifier A3, a fourth operational amplifier a4, a power supply VCC, a ground GND, and a reference power supply V0;
the power supply VCC is respectively connected with the anode of the second diode L2, the anode of the first diode L1, the input end of the fourth resistor R4 and the input end of the seventh resistor R7, the cathode of the second diode L2 is connected with the input end of the second resistor R2, and the output end of the second resistor R2 is connected with the input ends of the first capacitor C1 and the thirteenth resistor R13;
the negative electrode of the first diode L1 is connected with the input end of the first resistor R1 and the positive input end of the first operational amplifier A1, the negative input end of the first operational amplifier A1 is grounded, the output end of the first resistor and the output end of the first operational amplifier A1 are connected with the input ends of the third resistor R3 and the second capacitor C2, the output ends of the third resistor R3 and the second capacitor C2 are connected with the positive input end of the second operational amplifier A2 and the input end of the sixth resistor R6, and the negative input end of the second operational amplifier A2 is grounded;
the output end of the fourth resistor R4 is connected with the inverting input end of the third operational amplifier A3, the positive input end of the third operational amplifier A3 is connected with the input end of the fifth resistor R5, the output ends of the fifth resistor and the third operational amplifier A3 are connected with the collector of the NPN transistor Q, the output end of the seventh resistor R7 is connected with the input end of the eighth resistor R8 and the positive input end of the fourth operational amplifier a4, and the output end of the eighth resistor R8 is connected with the base of the NPN transistor Q;
the reference power supply V0 is connected with the input end of a ninth resistor R9, the output end of the ninth resistor R9 is connected with the input ends of a tenth resistor R10, a twelfth resistor R12 and the reverse input end of a fourth operational amplifier A4, the output end of a twelfth resistor R12 is connected with the anode of a third diode L3, and the output end of the fourth operational amplifier A4 and the cathode of a third diode L3 are connected with the input end of an eleventh resistor R11;
an output end of the first capacitor C1, an output end of the thirteenth resistor R13, an output end of the second operational amplifier a2, an emitter of the NPN transistor Q, an output end of the eleventh resistor R11, and an output end of the tenth resistor R10 are connected to the ground GND, respectively.
The invention has the beneficial effects that:
the invention is provided for the remote user by the web server, the remote user uses the web browser to download the web server page to observe the real-time operation condition of the equipment, modifies the variables, completes the monitoring task of the field equipment in the laboratory, and carries out the optimization algorithm and the encryption algorithm in the communication process to increase the safety and the communication efficiency of the communication process, thereby having strong creativity.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is an overall flow block diagram of the present invention;
FIG. 2 is a schematic diagram of the operation of the web server of the present invention;
FIG. 3 is a graph comparing transmission rates according to an embodiment of the present invention;
fig. 4 is a circuit diagram of a monitoring circuit of a laboratory monitoring system according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
A laboratory remote monitoring system as shown in fig. 1 includes a laboratory monitoring system, a web embedded node system and a communication system, where the laboratory monitoring system transmits monitored information to a remote end through the communication system, and the remote end transmits received monitoring information to a web server through the web embedded node system, so as to implement online information sharing remote full-network control; the communication system comprises a communication optimization algorithm and a communication security algorithm; the web embedded node system performs registration service of the web server through scheduling operation.
The web server includes the following operations:
s1: the source code is written by using C + + language and has portability;
s2: utilizing CPU resources;
s3: optimizing the SQL algorithm;
s4: providing a TCP/IP and ODBC database connection mode;
s5: the data information is effectively stored.
The web embedded node system defines each monitored bottom layer state into HTML language permitted network variables, uses the variables to generate web pages, the web pages are provided to remote users by the web server, and the remote users use a web browser to download the web pages of the web server to observe the real-time operation condition of the equipment, modify the variables and complete the monitoring task of the laboratory field equipment.
The web server (see fig. 2 for the principle) of the embodiment realizes the whole-network communication and control, and completes the monitoring task of the laboratory field device.
Example 2
The embodiment discloses that in the communication security algorithm, communication data is given to Chebyshev mapping tau (x) ═ cos (c)μcos-1(x))
Wherein x is an orbit numerical value of communication data, x belongs to I [ -1,1], and I is an integer; the real track values defining the communication data are:
|x|=0,B1(x),B2(x)…Bi(x);Bi(x)∈{0,1}
its ith bit Bi(x) Can be expressed as:
wherein Θ isi(x) Is a threshold function defined as:
can be derived fromThe fixed and unchangeable relation between the symbol sequence interrupting the information to be transmitted and the mapping sub-intervals is covered by the mask of the communication encryption algorithm.
In the communication security algorithm, information sigma to be transmittednExpressed as a binary sequence siThe method concretely comprises the following steps:
application ofFor the sequence siDo a mask, i.e. mask miIs composed of
Wherein B isiA sequence of only one bit.
Dividing the masked character sequence { m } into sequences of length t:
each sequence wjAnd (3) carrying out transformation:
where n is 0, t,2t,3 t.
In the communication security algorithm, the mask operation replies to the plaintext asjX is to bejAs an initial value, a known key is used for carrying out decryption by using an iterative piecewise linear function to obtain the following plaintext:
where n is a natural number and I is a secret key.
The algorithm of the embodiment effectively overcomes the defect that the speed is slow when most of systems are used for encryption, and has the following characteristics:
1. the software and hardware are simple to realize;
2. the encryption and decryption are symmetrical, and the same system is used;
3. the speed is high; (iv) relatively high safety.
Example 3
In this embodiment, in the communication optimization algorithm, a data transfer rate C is definedjIs composed of
Wherein l belongs to U, U represents a user set needing a certain data packet j, and k is a selected transmitting end; gklFor channel gain, the transmission power is pdAnd pcInterference is Inf, N0Is Gaussian white noise spectral density, and B is channel loan.
According to NeighjAnd the set of U selects the optimal relay node, and the obtained transmission rate is as follows:
where l ∈ Neighj∪ U is a set of neighbor nodes that can provide packet j to the target node.
In the embodiment, a transmission rate CDF curve corresponding to different algorithms is shown in FIG. 3, wherein the cooperative algorithm based on relay forwarding is obviously superior to the D2D multicast algorithm transmission, the method has approximate system throughput with the D2D multicast algorithm adopting the relay traversal strategy, and the throughput of the method and the D2D multicast algorithm is much higher than that of a scheme of cellular transmission and D2D direct multicast, which shows that the performance of the D2D multicast network based on relay forwarding is obviously superior to that of the D2D multicast.
The invention is provided for the remote user by the web server, the remote user uses the web browser to download the web server page to observe the real-time operation condition of the equipment, modifies the variables, completes the monitoring task of the field equipment in the laboratory, and carries out the optimization algorithm and the encryption algorithm in the communication process to increase the safety and the communication efficiency of the communication process, thereby having strong creativity.
Example 4
In the communication security algorithm, in order to improve the communication security, a dynamic position mask value is constructed for each bit of each channel, the number of tracks in the communication process is firstly obtained when the dynamic position mask value is constructed, then a channel mask is constructed for each channel, and a channel mapping function is constructed for each channel when the channel mask is constructed;
wherein i is a channel number, and td (i) is a channel mapping function constructed for the ith channel;
obtaining a location mask value for each location of each channel:
wherein, Wi,jThe position mask value of the jth bit of the ith channel is the position mask value, and s is the introduced channel coefficient.
In the communication security algorithm, for data to be transmitted in each channel, firstly, obtaining a code value of an ASCII code corresponding to the transmitted data, then converting the code value of the ASCII code into a binary value, and then performing data conversion on the binary value;
SZi,j=1-Si,j
wherein, SZi,jIs a pair of Si,jValue after data conversion, Si,jA binary value corresponding to the jth bit of the ith channel, i being 1, 2, 3 … … P, j being 1, 2, 3 … … K, where P is the total number of channels in the transmitted data, and K is the total number of bits of the binary value of each channel;
determining a transmission value for each bit of each channel;
mi,j=Wi,j*SZi,j
wherein m isi,jIs the transmitted value of the jth bit of the ith channel.
Will transmit the value mi,jDividing into a region according to each t bits, and then calculating a conversion value of each region:
wherein, F (m)k) For the conversion value calculated for the k region, mk,dIs the d-th value of the k-th region, p (m)k) Is the probability of a value other than 0 occurring among the transmission values in the k-th region;
when data is transmitted, the conversion value and the transmission value are transmitted simultaneously, and the transmission value is checked by using the conversion value, so that the accuracy of the transmission value is ensured.
The communication data can be quickly encrypted by utilizing the technology, a private key does not need to be additionally generated in the encryption process, decryption can be carried out by utilizing the same decryption algorithm, meanwhile, in the encryption process, the mask code of each position of each channel is different, so that the encryption value of each position in the encryption process is different, the encryption safety is improved, meanwhile, for the encrypted transmission value, in order to avoid errors such as packet loss or conversion and the like in the transmission process, a conversion value is generated for the data to be transmitted, the conversion value is obtained by calculating the transmission data, so that the conversion code of the received value can be calculated after the transmission value is received, whether the conversion value is consistent with the transmitted conversion value is determined, and whether a problem occurs in the data transmission process can be obtained.
Example 5
In the communication security algorithm, the mask operation replies a plaintext as follows, according to the received information G, the G is used as an initial value, and a known decryption algorithm is used for decryption to obtain the following plaintext:
wherein, mei,jIs the value of the jth bit of the ith decrypted channel, Gi,jThe value of the jth bit of the ith channel of the received information is obtained, the decrypted information is the ASCII code corresponding to the plaintext information, and the ASCII code is converted into corresponding information which is then the plaintext information.
Has the advantages that:
by using the technology, the transmitted information can be decrypted through the channel corresponding to the information and the bit position of the information to obtain a plaintext, an additional secret key is not needed, so that the transmission data volume is reduced, and meanwhile, due to the fact that no secret key is transmitted, even after the information is intercepted, the information cannot be decrypted by the secret key under the condition that a decryption rule is not known, so that the information security is higher.
An embodiment of the present invention provides a laboratory remote monitoring system, which includes a monitoring circuit, as shown in fig. 4,
the monitoring circuit includes: a first resistor R1, a second resistor R2, a third resistor R3, a fourth resistor R4, a fifth resistor R5, a sixth resistor R6, a seventh resistor R7, an eighth resistor R8, a ninth resistor R9, a tenth resistor R10, an eleventh resistor R11, a twelfth resistor R12, a thirteenth resistor R13, a first capacitor C1, a second capacitor C2, an NPN transistor Q, a first diode L1, a second diode L2, a third diode L1, a first operational amplifier a1, a second operational amplifier a2, a third operational amplifier A3, a fourth operational amplifier a4, a power supply VCC, a ground GND, and a reference power supply V0;
the power supply VCC is respectively connected with the anode of the second diode L2, the anode of the first diode L1, the input end of the fourth resistor R4 and the input end of the seventh resistor R7, the cathode of the second diode L2 is connected with the input end of the second resistor R2, and the output end of the second resistor R2 is connected with the input ends of the first capacitor C1 and the thirteenth resistor R13;
the negative electrode of the first diode L1 is connected with the input end of the first resistor R1 and the positive input end of the first operational amplifier A1, the negative input end of the first operational amplifier A1 is grounded, the output end of the first resistor and the output end of the first operational amplifier A1 are connected with the input ends of the third resistor R3 and the second capacitor C2, the output ends of the third resistor R3 and the second capacitor C2 are connected with the positive input end of the second operational amplifier A2 and the input end of the sixth resistor R6, and the negative input end of the second operational amplifier A2 is grounded;
the output end of the fourth resistor R4 is connected with the inverting input end of the third operational amplifier A3, the positive input end of the third operational amplifier A3 is connected with the input end of the fifth resistor R5, the output ends of the fifth resistor and the third operational amplifier A3 are connected with the collector of the NPN transistor Q, the output end of the seventh resistor R7 is connected with the input end of the eighth resistor R8 and the positive input end of the fourth operational amplifier a4, and the output end of the eighth resistor R8 is connected with the base of the NPN transistor Q;
the reference power supply V0 is connected with the input end of a ninth resistor R9, the output end of the ninth resistor R9 is connected with the input ends of a tenth resistor R10, a twelfth resistor R12 and the reverse input end of a fourth operational amplifier A4, the output end of a twelfth resistor R12 is connected with the anode of a third diode L3, and the output end of the fourth operational amplifier A4 and the cathode of a third diode L3 are connected with the input end of an eleventh resistor R11;
an output end of the first capacitor C1, an output end of the thirteenth resistor R13, an output end of the second operational amplifier a2, an emitter of the NPN transistor Q, an output end of the eleventh resistor R11, and an output end of the tenth resistor R10 are connected to the ground GND, respectively.
The beneficial effects of the above technical scheme are: the third operational amplifier A3 and the fourth operational amplifier a4 can compare the power supply voltage with the reference voltage, the NPN transistor Q can be provided to filter out abnormal signals in the monitoring circuit, so that the voltages of the third operational amplifier A3 and the fourth operational amplifier a4 are turned on to play a role in protection, and the second diode L2, the second resistor R2, the first capacitor C1 and the thirteenth resistor R13, the first operational amplifier a1 and the second operational amplifier serve as a voltage holding circuit to hold the voltage stably.
Through the monitoring circuit that this embodiment provided, can realize when the supply voltage VCC fluctuates, also when supply voltage VCC exceedes preset voltage range, through the comparison of third operational amplifier A3, fourth operational amplifier A4 for monitoring circuit output low level, thereby can effectively avoid the voltage of each laboratory paraphernalia too high, with the normal stable work of ensureing laboratory paraphernalia. In addition, the monitoring circuit can have good defense effect against higher and lower voltage fluctuation of the power supply voltage VCC and in the environment with worse power supply environment.
The above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (7)

1. A laboratory remote monitoring system is characterized by comprising a laboratory monitoring system, a web embedded node system and a communication system, wherein the laboratory monitoring system transmits monitored information to a remote end through the communication system, and the remote end transmits the received monitored information to a web server through the web embedded node system, so that online information sharing remote whole-network control is realized; the communication system comprises a communication optimization algorithm and a communication security algorithm; the web embedded node system performs registration service of the web server through scheduling operation; wherein the content of the first and second substances,
in the communication security algorithm, in order to improve the communication security, a dynamic position mask value is constructed for each bit of each channel, the number of the channels in the communication process is firstly obtained when the dynamic position mask value is constructed, then a channel mask is constructed for each channel, and a channel mapping function is constructed for each channel when the channel mask is constructed;
wherein i is a channel number, and td (i) is a channel mapping function constructed for the ith channel;
obtaining a location mask value for each location of each channel:
wherein, Wi,jThe position mask value of the jth bit of the ith channel is the position mask value, and s is the introduced channel coefficient.
2. Laboratory remote monitoring system according to claim 1, characterized in that the web server comprises the following operations:
s1: the source code is written by using C + + language and has portability;
s2: utilizing CPU resources;
s3: optimizing the SQL algorithm;
s4: providing a TCP/IP and ODBC database connection mode;
s5: the data information is effectively stored.
3. The laboratory remote monitoring system according to claim 1, wherein said web embedded node system defines the monitored underlying states as HTML-enabled network variables, generates web pages using these variables, and provides the web pages to the remote user, who uses a web browser to download the web pages from the web server to view the real-time operation of the device, and modifies these variables to accomplish the monitoring task for the laboratory field device.
4. The laboratory remote monitoring system according to claim 1, wherein in the communication security algorithm, for the data to be transmitted in each channel, first a code value of an ASCII code corresponding to the transmitted data is obtained, then the code value of the ASCII code is converted into a binary value, and then the binary value is subjected to data conversion;
SZi,j=1-Si,j
wherein, SZi,jIs a pair of Si,jValue after data conversion, Si,jA binary value corresponding to the jth bit of the ith channel, i being 1, 2, 3 … … P, j being 1, 2, 3 … … K, where P is the total number of channels in the transmitted data, and K is the total number of bits of the binary value of each channel;
determining a transmission value for each bit of each channel;
mi,j=Wi,j*SZi,j
wherein m isi,jIs the transmitted value of the jth bit of the ith channel.
5. Laboratory remote monitoring system according to claim 4, characterized in that the value m is transmittedi,jDividing into a region according to each t bits, and then calculating a conversion value of each region:
wherein, F (m)k) For the conversion value calculated for the k region, mk,dIs the d-th value of the k-th region, p (m)k) Is the probability of a value other than 0 occurring among the transmission values in the k-th region;
when data is transmitted, the conversion value and the transmission value are transmitted simultaneously, and the transmission value is checked by using the conversion value, so that the accuracy of the transmission value is ensured.
6. The laboratory remote monitoring system according to claim 1, wherein in the communication security algorithm, the masking operation replies with a plaintext, and based on the received information G, the plaintext is decrypted by using a known decryption algorithm with G as an initial value, so as to obtain the following plaintext:
wherein, mei,jIs the value of the jth bit of the ith decrypted channel, Gi,jThe value of the jth bit of the ith channel of the received information is obtained, the decrypted information is the ASCII code corresponding to the plaintext information, and the ASCII code is converted into corresponding information which is then the plaintext information.
7. The laboratory remote monitoring system according to claim 1, wherein said laboratory monitoring system comprises a monitoring circuit,
the monitoring circuit includes: a first resistor R1, a second resistor R2, a third resistor R3, a fourth resistor R4, a fifth resistor R5, a sixth resistor R6, a seventh resistor R7, an eighth resistor R8, a ninth resistor R9, a tenth resistor R10, an eleventh resistor R11, a twelfth resistor R12, a thirteenth resistor R13, a first capacitor C1, a second capacitor C2, an NPN transistor Q, a first diode L1, a second diode L2, a third diode L1, a first operational amplifier a1, a second operational amplifier a2, a third operational amplifier A3, a fourth operational amplifier a4, a power supply VCC, a ground GND, and a reference power supply V0;
the power supply VCC is respectively connected with the anode of the second diode L2, the anode of the first diode L1, the input end of the fourth resistor R4 and the input end of the seventh resistor R7, the cathode of the second diode L2 is connected with the input end of the second resistor R2, and the output end of the second resistor R2 is connected with the input ends of the first capacitor C1 and the thirteenth resistor R13;
the negative electrode of the first diode L1 is connected with the input end of the first resistor R1 and the positive input end of the first operational amplifier A1, the negative input end of the first operational amplifier A1 is grounded, the output end of the first resistor and the output end of the first operational amplifier A1 are connected with the input ends of the third resistor R3 and the second capacitor C2, the output ends of the third resistor R3 and the second capacitor C2 are connected with the positive input end of the second operational amplifier A2 and the input end of the sixth resistor R6, and the negative input end of the second operational amplifier A2 is grounded;
the output end of the fourth resistor R4 is connected with the inverting input end of the third operational amplifier A3, the positive input end of the third operational amplifier A3 is connected with the input end of the fifth resistor R5, the output ends of the fifth resistor and the third operational amplifier A3 are connected with the collector of the NPN transistor Q, the output end of the seventh resistor R7 is connected with the input end of the eighth resistor R8 and the positive input end of the fourth operational amplifier a4, and the output end of the eighth resistor R8 is connected with the base of the NPN transistor Q;
the reference power supply V0 is connected with the input end of a ninth resistor R9, the output end of the ninth resistor R9 is connected with the input ends of a tenth resistor R10, a twelfth resistor R12 and the reverse input end of a fourth operational amplifier A4, the output end of a twelfth resistor R12 is connected with the anode of a third diode L3, and the output end of the fourth operational amplifier A4 and the cathode of a third diode L3 are connected with the input end of an eleventh resistor R11;
an output end of the first capacitor C1, an output end of the thirteenth resistor R13, an output end of the second operational amplifier a2, an emitter of the NPN transistor Q, an output end of the eleventh resistor R11, and an output end of the tenth resistor R10 are connected to the ground GND, respectively.
CN201910770464.3A 2019-08-20 2019-08-20 Laboratory remote monitoring system Active CN110535926B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910770464.3A CN110535926B (en) 2019-08-20 2019-08-20 Laboratory remote monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910770464.3A CN110535926B (en) 2019-08-20 2019-08-20 Laboratory remote monitoring system

Publications (2)

Publication Number Publication Date
CN110535926A CN110535926A (en) 2019-12-03
CN110535926B true CN110535926B (en) 2020-05-22

Family

ID=68663937

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910770464.3A Active CN110535926B (en) 2019-08-20 2019-08-20 Laboratory remote monitoring system

Country Status (1)

Country Link
CN (1) CN110535926B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8248252B2 (en) * 2008-11-21 2012-08-21 Schechter Tech, Llc Remote monitoring system
CN102722165A (en) * 2012-06-27 2012-10-10 上海海事大学 Reliability test remote monitoring system
CN102722108A (en) * 2012-06-19 2012-10-10 南京理工大学常熟研究院有限公司 Remote laboratory simulating control system
US8935743B2 (en) * 2011-01-27 2015-01-13 Sap Se Web service security cockpit
CN204314652U (en) * 2014-11-24 2015-05-06 广东科学技术职业学院 Long-distance intelligent laboratory equipment control system
CN104767805A (en) * 2015-03-30 2015-07-08 河海大学 Urban fire disaster monitoring system based on the Internet of Things architecture and WebGIS
CN106331082A (en) * 2016-08-19 2017-01-11 北京戴纳实验科技有限公司 Remote monitoring system of Internet of things for laboratory
CN106506600A (en) * 2016-10-12 2017-03-15 中国葛洲坝集团电力有限责任公司 A kind of building photovoltaic plant monitor supervision platform based on B/S frameworks

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI375931B (en) * 2008-04-03 2012-11-01 Univ Nat Taiwan Distant ecosystem monitoring system back-end control server device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8248252B2 (en) * 2008-11-21 2012-08-21 Schechter Tech, Llc Remote monitoring system
US8935743B2 (en) * 2011-01-27 2015-01-13 Sap Se Web service security cockpit
CN102722108A (en) * 2012-06-19 2012-10-10 南京理工大学常熟研究院有限公司 Remote laboratory simulating control system
CN102722165A (en) * 2012-06-27 2012-10-10 上海海事大学 Reliability test remote monitoring system
CN204314652U (en) * 2014-11-24 2015-05-06 广东科学技术职业学院 Long-distance intelligent laboratory equipment control system
CN104767805A (en) * 2015-03-30 2015-07-08 河海大学 Urban fire disaster monitoring system based on the Internet of Things architecture and WebGIS
CN106331082A (en) * 2016-08-19 2017-01-11 北京戴纳实验科技有限公司 Remote monitoring system of Internet of things for laboratory
CN106506600A (en) * 2016-10-12 2017-03-15 中国葛洲坝集团电力有限责任公司 A kind of building photovoltaic plant monitor supervision platform based on B/S frameworks

Also Published As

Publication number Publication date
CN110535926A (en) 2019-12-03

Similar Documents

Publication Publication Date Title
Shen et al. Cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection
Wang et al. On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags
Wang et al. Trajectory privacy preservation based on a fog structure for cloud location services
Zhang et al. Robust fuzzy-model-based filtering for nonlinear cyber-physical systems with multiple stochastic incomplete measurements
Bianchi et al. Convergence of a multi-agent projected stochastic gradient algorithm for non-convex optimization
Médard et al. Network coding: Fundamentals and applications
Ball A unified approach to the distribution of total size and total area under the trajectory of infectives in epidemic models
JP4668567B2 (en) System and method for client-based web crawling
US7127068B2 (en) Geographical comparison system and method
Dubin et al. I know what you saw last minute—encrypted http adaptive video streaming title classification
US7171679B2 (en) Generating and maintaining encrypted passwords
US6757742B1 (en) Computer-based system for validating hash-based table lookup schemes in a network switch
Sun et al. New results on global stabilization for time‐delay nonlinear systems with low‐order and high‐order growth conditions
US8750285B2 (en) Efficient classification of network packets
Ramaswamy et al. PacketBench: A tool for workload characterization of network processing
Ma et al. A novel compressive sensing method based on SVD sparse random measurement matrix in wireless sensor network
Ruta et al. Enabling the Semantic Web of Things: framework and architecture
US7140041B2 (en) Detecting dissemination of malicious programs
Qu et al. Privacy of things: Emerging challenges and opportunities in wireless internet of things
Middya et al. Compressive sensing in wireless sensor networks–a survey
Kumar et al. Exact common information
Feldman et al. On the capacity of secure network coding
US7389529B1 (en) Method and apparatus for generating and using nested encapsulation data
Tyagi et al. When is a function securely computable?
Novak et al. Near-pri: Private, proximity based location sharing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant