20 February 2006 Study on open equipment condition monitoring and fault diagnosis system based on internet
Author Affiliations +
Proceedings Volume 6041, ICMIT 2005: Information Systems and Signal Processing; 60410I (2006) https://doi.org/10.1117/12.664295
Event: ICMIT 2005: Merchatronics, MEMS, and Smart Materials, 2005, Chongqing, China
An open condition-monitoring system combined C/S (Client / Server) with B/S (Brower / Server) pattern was introduced. It consists of three parts of software: SE (Server-Terminal), ADE ( Analysis-Diagnosis-Terminal) and DAE ( Data-Acquisition-Terminal ). SE can monitor every connection request from ADE or DAE user and determinate whether ADE or DAE can be run on client's PC. As a result, the system security is improved in a sense. Additionally, the system hardware part comprises two kinds of terminal portable instruments: DASOC(data-acquisition system on chip based-on the Cygnal MCU) and DSAI(dynamic signal analysis instrument based on an embedded OS:XPE). DASOC and DSAI can realize data-acquisition, signal analysis and data-transmission based-on internet. The system structure mode has been applied to a certain power plant's enterprise information network in Tianjin. Results show that the system is successful.
© (2006) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Hui-Long He, Hui-Long He, Tai-Yong Wang, Tai-Yong Wang, Hui Deng, Hui Deng, Ju-Xiang Zeng, Ju-Xiang Zeng, Guo-Feng Wang, Guo-Feng Wang, Jun Rao, Jun Rao, } "Study on open equipment condition monitoring and fault diagnosis system based on internet", Proc. SPIE 6041, ICMIT 2005: Information Systems and Signal Processing, 60410I (20 February 2006); doi: 10.1117/12.664295; https://doi.org/10.1117/12.664295


Models of information security trend analysis
Proceedings of SPIE (August 14 2002)
Talk to me using voice server to enable business...
Proceedings of SPIE (December 29 2000)
Web usage data mining agent
Proceedings of SPIE (March 12 2002)
Analysis on the security of cloud computing
Proceedings of SPIE (February 04 2011)

Back to Top