[1]杨帆[],刘冰[],沈来信[][]. 基于Tree-Lib的徽州民居特征采集库[J].计算机技术与发展,2014,24(08):246-250.
 YANG Fan[],LIU Bing[],SHEN Lai-xin[][]. Feature Collecting Database of Huizhou Residences Based on Tree-Lib[J].,2014,24(08):246-250.
点击复制

 基于Tree-Lib的徽州民居特征采集库()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
24
期数:
2014年08期
页码:
246-250
栏目:
应用开发研究
出版日期:
2014-08-10

文章信息/Info

Title:
 Feature Collecting Database of Huizhou Residences Based on Tree-Lib
文章编号:
1673-629X(2014)08-0246-04
作者:
 杨帆[1]刘冰[2]沈来信[1][3]
1.黄山学院 机电与信息工程学院;2.中国电子科技集团公司第三十二研究所;3.同济大学 计算机科学与技术系
Author(s):
 YANG Fan[1]LIU Bing[2]SHEN Lai-xin[1][3]
关键词:
 无线传感器徽州民居Tree-Lib 可视化管理灾难恢复
Keywords:
 wireless sensorsHuizhou residencesTree-Libvisual managementdisaster recovery
分类号:
TP311
文献标志码:
A
摘要:
 使用多类型无线传感器对古民居灾损特征参数进行测量,使用核心树完成建筑特征、环境特征、生活特征、风俗习惯特征等参数的采集和融合过程。为实时监控异构数据库的结构与数据,提出基于树结构与数据库双向管理与维护架构Tree-Lib,实现树-库的双向生成、结构与数据的更新、异常处理与恢复,完成海量数据的快速定位与匹配。实践表明,Tree-Lib可以有效地实现树-库的实时监控与可视化管理,能及时完成采集数据的来源定位、异常查找与定位以及树与库的灾难恢复等。
Abstract:
 The disaster feature parameters of Huizhou residences have been measured by using multiple types wireless sensors,and the core tree is used to complete the data collecting and fusing process of characteristic parameters including architectural features,environment features,living features,habitual features and so on. To monitor structure and data of the heterogeneous database,propose the framework named Tree-Lib which implements the bi-management and maintenance based on tree structure and database. Tree-Lib can implement the bi-generation of tree and database,the updating of structure and data,exception handing and recovery,completing quick locating and matching of the massive data. Practice shows the Tree-Lib can effectively achieve real-time monitoring and visual management of the tree and database,timely completing the source locating,abnormal finding and positioning of the collecting data and disaster recovering of tree and database.

相似文献/References:

[1]杨永雷 朱军.无线传感器网络中异步成簇算法的研究[J].计算机技术与发展,2010,(02):145.
 YANG Yong-lei,ZHU Jun.Research on Asynchronous Clustering Algorithm in Wireless Sensor Network[J].,2010,(08):145.
[2]刘春涛 陆建德 王月平.一个新型分布式无线传感器分层路由协议[J].计算机技术与发展,2010,(04):35.
 LIU Chun-tao,LU Jian-de,WANG Yue-ping.A New Distributed WSN Cluster- Based Routing Protocol[J].,2010,(08):35.
[3]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(08):1.
[4]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(08):5.
[5]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(08):13.
[6]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(08):21.
[7]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(08):25.
[8]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(08):29.
[9]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(08):34.
[10]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(08):38.
[11]鲁蔚锋,尚春雷. 一种基于攻击概率的分布式传感网密钥管理方案[J].计算机技术与发展,2016,26(09):129.
 LU Wei-feng,SHANG Chun-lei. A Key-management Scheme with Node Compromise Probability in Wireless Sensor Network[J].,2016,26(08):129.
[12]张昱[],曹伟[],邵世祥[]. 低功耗无线传感网节点的混合监听休眠方法[J].计算机技术与发展,2016,26(10):196.
 ZHANG Yu[],CAO Wei[],SHAO Shi-xiang[]. A Hybrid Monitor Sleep Method of Low-power Wireless Sensor Network Nodes[J].,2016,26(08):196.
[13]董峰,张秋霞. 一种恶意节点攻击的无线传感器网络入侵检测方法[J].计算机技术与发展,2017,27(02):86.
 DONG Feng,ZHANG Qiu-xia. An Intrusion Detection Method for Wireless Sensor Network of Malicious Node Attack[J].,2017,27(08):86.

更新日期/Last Update: 2015-03-31