Research Article

A Security Wireless Monitoring and Automatic Protection System for CCEL

Figure 6

The flow chart of the security judgment method in CCEL.