2013 Chinese Automation Congress 2013
DOI: 10.1109/cac.2013.6775854
|View full text |Cite
|
Sign up to set email alerts
|

The boiler design of remote monitoring system based on the SCADA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…In the last twenty years, many research institutions have done research on the virtual maintenance training and developed a series of virtual maintenance training systems which vary in hardware structure, software structure, system functions and application field. Virtual maintenance training system is basically divided into three categories [2] , that is non-immersive virtual maintenance training system, immersive virtual maintenance training system [3] and other type virtual maintenance training system.…”
Section: The Study Of Current Development In the Virtual Maintenance ...mentioning
confidence: 99%
“…In the last twenty years, many research institutions have done research on the virtual maintenance training and developed a series of virtual maintenance training systems which vary in hardware structure, software structure, system functions and application field. Virtual maintenance training system is basically divided into three categories [2] , that is non-immersive virtual maintenance training system, immersive virtual maintenance training system [3] and other type virtual maintenance training system.…”
Section: The Study Of Current Development In the Virtual Maintenance ...mentioning
confidence: 99%
“…Network topology it had organized, dynamic changes since, distributed control, multiple network structure, node function limitations, limitations of wireless networks, poor security, large-scale, data redundancy and aggregation. Because of the impact of node energy, storage space, computing power, complex topology and other factors, WSN was vulnerable to be malicious attacked [1] . WSN did not rely on the possibility of a fixed infrastructure, so the existing traditional network security mechanisms could not be fully applied to it, although the use of passive preventive measures, such as encryption and authentication technology, network attacks can decrease to a certain extent, we also could not completely avoid being attacked, so security defense measures are indispensable.…”
mentioning
confidence: 99%