Meeting Wide-Area Agricultural Data Acquisition And Control Challenges Through Zigbee Wireless Network Technology

2013 ◽  
Author(s):  
Martin A. Hebel
2013 ◽  
Vol 347-350 ◽  
pp. 520-524
Author(s):  
Xiao Zhi Zhang

This article is based on the experimental device of ShangHai Bizideal Information Technology Company, mainly introduce the method of building WiFi wireless network in the laboratory environment, and data acquisition and control can be used by means of software after that.


2016 ◽  
pp. 86-90
Author(s):  
Gerald Caspers ◽  
Klaus Nammert ◽  
Holger Fersterra ◽  
Hartmut Hafemann

Fluidised-bed steam dryers have been in use for industrial-scale drying of pressed beet pulp for more than 20 years. This highly energy-efficient process can be considered to be state of the art in the industry. Scientific laboratory and pilot-plant testing have provided the basis for a detailed description of the principles of fluidisation and drying in superheated water vapour. Advances in production data acquisition, in particular regarding the options for the real-time presentation and evaluation of high-resolution operating data (Industry 4.0), have opened up new potentials for optimisation of the drying process in fluidised-bed steam dryers. By analysing and interpreting sequences of events, or simultaneous events, it is now possible to analyse process behaviour in great depth. This allows malfunctions to be avoided by improved design or, assisted by suitable measuring and control systems, to be detected at an early stage. Failures can then be prevented altogether by initiating automated countermeasures. On the basis of more recent insights gained from the analysis of faults and disruptions using modern operating data acquisition, BMA’s fluidised-bed steam dryer (WVT) has been subjected to fundamental technological and technical improvements, so it now meets today’s demands for efficiency and reliability. Modifications include the product inlet, the distribution plate and several other parts, in addition to the known and patented PPS (Plug Protection System; EP 2457649 B1), and the patented rotary weir (EP 2146167 B1).


Author(s):  
Meer Shadman Shafkat Tanjim ◽  
Ashrafun Nushra Oishi ◽  
Ali Azam Sojib ◽  
Md. Bashir Ahmmad ◽  
Md. Shaiful Islam ◽  
...  

Author(s):  
Rocco De Nicola ◽  
Michele Loreti

A new area of research, known as Global Computing, is by now well established. It aims at defining new models of computation based on code and data mobility over wide-area networks with highly dynamic topologies, and at providing infrastructures to support coordination and control of components originating from different, possibly untrusted, fault-prone, malicious or selfish sources. In this paper, we present our contribution to the field of Global Computing that is centred on Kernel Language for Agents Interaction and Mobility ( Klaim ). Klaim is an experimental language specifically designed to programme distributed systems consisting of several mobile components that interact through multiple distributed tuple spaces. We present some of the key notions of the language and discuss how its formal semantics can be exploited to reason about qualitative and quantitative aspects of the specified systems.


2012 ◽  
Vol 433-440 ◽  
pp. 7024-7028
Author(s):  
Hui Fu ◽  
Bin Jin ◽  
Lin Han ◽  
Zuo Tang Tao

With computer technology, communication technology and the rapid development of electronic technology, remote monitoring technology will be more widely used for data transmission requirements and more stringent. GPRS-based remote monitoring system, which is based in communications equipment, through the server to PC, as the remote control platform, embedded applications, network programming and other technology, the remote information display and control. Throughout the system, users can allow each terminal in the case of permission to accept the data on the changes and settings. Wireless network communication is important that the network transmission of data security and consistency, to solve this problem this thesis, performance of network communications software technology to achieve self-monitoring and self-recovery, while use of end to end encryption to encrypt data on the transmission , which can guarantee data reliability, completeness, real time and security.


Sign in / Sign up

Export Citation Format

Share Document