Research on Anti-collision Algorithm Optimization of RFID Tag Based on Binary Search

Size: px
Start display at page:

Download "Research on Anti-collision Algorithm Optimization of RFID Tag Based on Binary Search"

Transcription

1 Research on Anti-collision Algorithm Optimization of RFID Tag Based on Binary Search Jinyan Liu, Quanyuan Feng School of Information Science and Technology, Southwest Jiaotong University, Chengdu , China Abstract This paper explores the optimization path of anti-collision algorithm for RFID system based on binary search. The structure and working principle of the RFID system are firstly analyzed, and then the binary anti-collision algorithms are explored, pertinent to tag collision in the RFID system. Based on the exploration of the operation principle of the basic binary search algorithm, the dynamic binary search algorithm and the bit-locking backward binary search algorithm, it can be learnt that the basic binary search algorithm has the disadvantages of data redundancy and relatively large number of queries and that the latter two can effectively make up the deficiencies of the basic binary search method. Finally, the jumping binary search algorithm is proposed based on the summarization and analysis of the two search algorithms with its realization process discussed and its related characteristics compared and analyzed. Keywords: Binary search, Rfid, Tag Anti-Collision, Radio frequency. 1. RESEARCH STATUS OF RFID TECHNOLOGY 1.1 The application status of RFID technology Radio frequency identification technology (RFID technology) originated in the research field of military radar of the British Air Force in the 1940s. In the 1960s, the theory of RFID technology has rapidly developed and gradually adjusted to the application fields. Britain, the United States, Japan and Switzerland are at the worldleading level in research and application of RFID technology, especially in aspects of chip technology development and electronic label technology. China s RFID technology research starts relatively late but develops rapidly, and the RFID technology has been gradually applied to various fields of society, attracting great concern of the economic market. The application of RFID technology in payment for bus and city subway by swiping cell phone greatly facilitates the traveling of the citizens. And in Shanghai World Expo, people can enter the Expo Park and buy food by swiping cell phone. RFID technology plays an important role in user identification, asset management and goods tracking, contributing to its great application value in the fields of economy, military, medicine, logistics transportation, objects storage and management. (Figure 1) For paper book management in libraries, the RFID technology can be applied to accurately locate every book so that the misplaced books can be immediately discovered and the reasonable location can be accurately determined. (Figure 2) RFID technology can be used to automatically scan the goods in the shipping cart and quickly generate the bill on the cell phone of the consumers for them to confirm and settle. Figure 1. RFID warehouse logistics management system technology 15

2 1.2 Research status of anti-collision algorithm Figure 2. Intelligent library RFID technology plays an increasingly important role in the various fields of society and in people's daily life, and the promotion of its market value in turn contributes to the development of the research on RFID technology. The key direction of RFID technology research is anti-collision algorithm, and the crucial issue of RFID technology research is to solve the long-standing communication collision problem in the application of RFID technology and thus to ensure the integrity and correctness of communication data. The communication collision problems in the applications of RFID technology are mainly caused by the simultaneous multi-label and multi-reader occupation of the communication channels and the complex external interference factors. The multi-access mode is the major way to realize the anti-collision algorithm of RFID technology both at home and abroad, which includes SDMA (space division multiple access), TDMA (time division multiple access) and CDMA (code division multiple access). The current common RFID anti-collision algorithm is based on the TDMA binary tree anti-collision algorithm and its improved algorithm. 2. SYSTEM STRUCTURE OF RFID The RFID system mainly consists of electronic tags, computer communication networks and readers, and the structure of the RFID system differs according to the specific application fields. The electronic tags, computer communication networks and readers are the core components of the RFID system, which play an indispensable core role in any RFID system architecture. By optimizing the coordination relationship of the three, the RFID system can operate more efficiently. 2.1 The classification and structure functions of electronic tags The RFID tag with a specific electronic code is the carrier of data in the system. The association of the electronic tag with the identified object determines the unique and specific identity of the latter, enabling the identified object to be systematically managed. The electronic tags store data through the chip and realize data transmission though wireless antenna. The information reception and feedback function enables electronic tags to be applied in more areas. Electronic tags can be divided into active tags and passive tags, among which the former with power supply can play an active role and exert a powerful application effect in a particular environment and the latter without built-in power supply is unable to transmit data actively. Though incapable of active data transmission, the passive tag has more extensive scopes of application because of its flexibility. The electronic tags can also be divided into high-frequency electronic tags, low-frequency electronic tags and microwave electronic tags according to the operating frequency, among which the microwave electronic tags are the widely-used type of electronic tags. The passive electronic tags will present four varying states during the operation of the RFID system, i.e. the ready state, selected state, off-power state and passive state. (Figure 3) The electronic tags have the following functional characteristics: First, the electronic tags carry information in the RFID system. Both the active electronic tags and the passive electronic tags must be equipped with the function of information storage. The storage of the specific information of objects forms the electronic tags with independent and unique information characteristic, which enables the objects to be equipped with specific identity characteristics. 16

3 Second, the article information contained in the electronic tags is of great application significance, which requires that the electronic tags should not only store the article information safely and completely but also modify or delete the information if necessary. Third, the chip as a key part of the electronic tag is responsible for the acceptance and decoding of signals and decoding of information as well as encoding on the return signals. 2.2 The structure and function of readers Figure 3. Electronic label status switching Readers are mainly responsible for the two-way data transmission with the electronic tags in the RFID system, and the management, storage, control and other instructions can be transmitted to the reader through the computer communication equipment. In the operating process of the RFID system, the readers can realize the read-in and read-out of the electronic tag data through the data transmission with the tags. The RFID system realizes effective operation due to the data transmission and identification functions of readers. The different operating frequency of the readers determines their different effective recognition distances. The reader is mainly composed of the RF interface, the antenna and the logic control unit. The RF unit of the reader is the transmitting terminal of energy, emitting energy of different frequencies during its operation and carrying out logic modulation on the received signals. The logic unit of the reader mainly functions to read and write the data information and to establish data connections with the application system. The main features of the reader are: First, there are two separate signal channels inside the reader. One is the channel for signal transmission from the transmitter to the electronic tags, and the other is the data channel for receiving the electronic tag data information. The non-interference signal transmission of the two channels enables information exchange to be achieved between the reader and the electronic tags. Second, the reader can receive the instructions sent from the computer end, according to the data contents of which certain operations will be conducted. In this process, the reader can also operate on the electronic tags through the instructions of the computer end. Third, the antenna of the reader can not only convert electromagnetic waves into a specific current signal but also transform the electric current into electromagnetic waves which will be transmitted to the passive electronic tags. The passive electronic tags can only be recognized in the RFID system by accepting signals from the reader antenna. Fourth, the control module of the reader is a key part to realize the information interaction between the electronic tag and the reader, and it can also decode the data information. The reader in the RFID system mainly functions to identify and transmit data and signals, which process must be completed by the control module. The core task of the control module is to control the information interaction between the electronic tag and the reader, thus realizing the anti-collision algorithm of the reader. 17

4 3. THE BINARY SEARCH-BASED ALGORITHMS The binary tree algorithm is deterministic. The core of the anti-collision principle of binary tree algorithm is to divide the collided tags into two subsets of 1 and 0. If tag collision occurs during the query of the subset 0, the tag will be further divided into two subsets of 01 and 00, on which the query will be re-conducted. Whenever collision occurs during the query, the set will be divided for further query. When the subset 0 is recognized without any collision, the query will be conducted on the subset 1 until all the tags are recognized without collision. (Figure 4) 3.1 Binary search algorithm Figure 4.Binary tree collision avoidance algorithm model The binary search algorithm compensates for the low channel utilization of the ALOHA algorithm. Binary search algorithm has significant superiority, mainly manifested by the non-necessity for the tag to memorize the previous queries, which greatly reduces the operation links and enhances the operational efficiency. The binary search algorithm only reads and queries a bit prefix; when the query command is the same as the tag serial number, the tag will respond accordingly and send the serial number for comparison with the query demand. During the comparison, the response of a tag indicates the result of correct recognition; in case of the response of several tags, the reader will determine the location of the collision, according to which the query demand will be changed. The reader will recognize all tags during the continuous correction of the query demand. The specific algorithm can be divided into three steps: First, the reader will send query commands based on the data bits, all of which area sequences of 1. Provided that the data bit is and that the reader sends the query command of , the query command will lead to the reaction of the tag receiving the command, which feeds back the serial number to the reader through the information channel. Second, read and compare the REQUEST with the serial number on the tag and examine whether there exists collision bit (Figure 5). Since the serial numbers of tags are variant, a unique tag will be recognized if there is no collision; otherwise, there will be collision of multiple tags, in which case the reader will correct the REQUEST to obtain a new one according to the collision bit by maintaining bits from the highest order to the highest collision bit as 0 and setting the bits from the highest collision bit to the lowest order to be 1. Figure 5. Manchester detects the collision bits 18

5 Figure 6. Binary search process Third, re-send REQUEST and execute the second step until the tag is correctly recognized. It enters the passive state after the reader reads its data. The algorithm again performs the search from the first step until all the tags are identified. The algorithm flow is shown in Figure Dynamic binary search algorithm Binary search algorithm possesses high computational efficiency in practical application. But in cases of long serial number during the binary search recognition process, there will be numerous repeated bits between the electronic tags and the reader, greatly increasing the search time and the possibility of errors in the operation. The dynamic binary search algorithm as the improved version of binary search algorithm not only inherits its superiority but also has it optimized in light of its deficiencies, contributing to the higher success rate and more accurate operation of the anti-collision of RFID tags. The search process of the dynamic binary search algorithm is the same to that of the binary search algorithm except for the difference in the execution of the second step, where only the data from the highest collision bit to the highest order are sent every time the query REQUEST is sent out from the reader. A new REQUEST is obtained without sending the bits 1 from the highest collision bit to the final bit during the non-dynamic search. The tag is not required to send the high-order similar to the query command of the reader. (Table 1) Table 1 Dynamic binary search recognition table First search Second search Third search REQUEST Tag A Tag B Tag C Collision bit decoding results 1x1x001x 1x001x Identification tag No No B After three times of searches with the dynamic binary search algorithm, the tag B is correctly recognized by the reader. Compared with the basic binary search algorithm, the dynamic binary search algorithm is significantly improved in the efficiency of operation. Under the premise of equal number of searches, the dynamic binary search algorithm can effectively reduce the output of the reader query command, especially the transmission of 19

6 the tag serial number. Through the simplification of these operations, the dynamic binary search algorithm can greatly shorten the operation time, thus effectively improving its operating efficiency. 3.3 Bit-locking backward dynamic binary search algorithm The data redundancy generated in the search of binary algorithm is the key factor influencing its efficiency. The dynamic binary search algorithm can improve the data redundancy caused by the search process without reducing the number of reader searches, thus enhancing the overall operation efficiency. When a tag is correctly identified, the reader resends the search command to query all the remaining tags, which means the query returns to the root node of the binary tree. This backward binary algorithm can not only effectively improve the data redundancy but also reduce the searches due to the return to the binary tree root. As can be seen in table 2, the backward binary search retains the upper-storey node with the method of grouping during its implementation. It inherits the three steps of the binary search algorithm in terms of operation links, through which B can be accurately recognized. The query REQUEST is reset by taking another subset according to the highest collision bit of group 0 in the table for query of unread tags in the group, i.e. the REQUEST can be used to recognize the tag A in group 0. When the tags in group 0 are fully recognized, the query demand of the reader returns to the root node to recognize the tag C in group 1 by resending The binary search method requires 6 searches, which indicates that the recognition of n tags requires 2n (log n +1) searches; while the bit-locking backward binary search method only requires 5 searches for 1 tag and (2n-1) searches for recognition of n tags. When the number of tags is larger, the reduction of search times is more evident, as shown in table 3, which can be obtained by calculation and figure 7. Table 2 Lock back binary search table First search Lock grouping Second search Third search REQUEST and 1 groups Tag A Tag B Tag C The 0 group Collision bit decoding results 1 x 1 x x x001x Identification tag NO The 1 group NO B Table 3 Binary algorithm and backward binary algorithm query times Tag count Method 1query method Method 2query method Figure 7. Binary search method and lock back search search times 20

7 3.4 Jumping dynamic binary search algorithm The dynamic binary search algorithm can improve the efficiency of the operation by reducing the data redundancy during the actual operation, and the bit-locking backward binary search algorithm can enhance the operation efficiency by reducing the number of queries, both of which compensate and improve the deficiencies of the binary search algorithm from different perspectives based on the guarantee of the rationality of the basic operation. The jumping dynamic binary search algorithm can extract and integrate the advantages of the first two excellent binary search algorithms, thus enabling it to become the most advanced algorithm in the RFID tag anti-collision algorithms. It maximizes the operation efficiency under the insurance of operation rationality and reduces the data bits of the reader query command and the tag serial number to be sent on the basis of the execution of the bit-locking backward method. The recognition process of the jumping dynamic search is shown in table 4. Table 4 Jump dynamic search recognition First search Lock grouping Second search Third search REQUEST and 1 groups Tag A Tag B Tag C The 0 group Collision bit decoding results 1 x 1 x x 1x001x Identification tag NO The 1 group NO B The three searches in Figure 10 are circularly conducted according to the basic three steps of dynamic binary search. Upon the completion of the first search, the bit-locking grouping is carried out to mark the upper-layer nodes. The tag B is returned to group 0 after being recognized for the implementation of the next two steps. The fourth step: the reader query command is 1011 and returns to group 0; the tag A is correctly recognized by sending the last four bits 0010 apart from the query demand, after which it is commanded to sleep. The fifth step: reset the query demand to be , and the tag C in group 1 is recognized. The jumping dynamic binary search algorithm requires fewer searches on average than the basic binary search and the bit-locking backward binary search and less data transmission than dynamic search method, and it possesses the overall performance much higher than that of the basic binary search algorithm, the dynamic binary search algorithm and the bitlocking backward binary search algorithm, integrating the advantages of the former three algorithms. 4. CONCLUSION Through the research on the binary search algorithm, it is found that the basic binary search algorithm is characterized by accuracy and especially larger effectiveness in avoiding RFID tag collision compared with ALOHA algorithm. However, the basic binary search algorithm will produce data redundancy in the detection process, and the overall operation efficiency is also influenced because of the relatively large number of queries. In light of the deficiencies of the basic binary search method, the dynamic binary search method is proposed to optimize the problem of data redundancy, and the bit-locking backward binary search method is put forward to solve the problem of large number of queries. The two algorithms both improve the basic binary search algorithm to a certain extent, enhancing the operation efficiency while guaranteeing the operation accuracy. The dynamic binary search algorithm is the most advanced one at present, which inherits the advantages of the dynamic binary algorithm and the bit-locking backward binary search algorithm, solving the problem of data redundancy and greatly reducing the queries of the reader by integrating the advantages of the former two algorithms. They can play a role in the jumping binary search algorithm, and thus greatly optimize the RFID tag anti-collision algorithm, promoting the extensive application and development of RFID technology in social fields. ACKNOWLEDGMENTS This work is supported by the National Natural Science Foundation of China under Grant

8 REFERENCES Fan W.J., Zhang S.S., Tian X. (2012). Research on Anti-collision Algorithm of RFID based on backward binary search, Computer Applications and Software, 05, Gao J.H, Zheng X.Y. (2012). RFID. Binary search anti-collision algorithm, Computer Measurement and Control, 10, He X.T., Zheng W.F. (2011). RFID. Binary collision suppression algorithm based on two points superposition, Journal of South China Normal University (NATURAL SCIENCE EDITION), 03, Li Z.J., Zhou J., Qiao J., Wu W.J. (2013). Research and optimization of adaptive fractal coding RFID anticollision algorithm, Journal of Communications, 09, Mo L. (2010). Research on RFID bit shielded binary search anti-collision algorithm, Journal of Hebei University of Science and Technology, 05, Wang L., Jin J., Zhang J. (2011). Jumping binary tree search anti-collision algorithm and its analysis, Microelectronics and Computer, 07, Wu J.X., Huang S.Y., Li C.Y., Ho H. (2009). Improved RFID binary search anti-collision algorithm, Computer Engineering and Applications, 05, , 235. Xia Z.G., He Y.G., Hou Zhou state. (2010). Computer engineering and application of anti-collision algorithm, A Binary Tree Detection Label, Vol. 20, pp Yan X.L., Chen Q.K., Hao J.T. (2013). A new anti-collision algorithm of microcomputer system based on dynamic binary, 09, Zhang W.X., Aung Z.M., Yin X.Z. (2012). An improved backward binary search RFID multi tag anticollision algorithm, Journal of HeFei University of Technology (NATURAL SCIENCE EDITION), 07, ,

An Improved DFSA Anti-collision Algorithm Based on the RFID-based Internet of Vehicles

An Improved DFSA Anti-collision Algorithm Based on the RFID-based Internet of Vehicles 2016 2 nd International Conference on Energy, Materials and Manufacturing Engineering (EMME 2016) ISBN: 978-1-60595-441-7 An Improved DFSA Anti-collision Algorithm Based on the RFID-based Internet of Vehicles

More information

RFID systems: anti-collision protocols and applications. Naeem Khademi Cyber-Physical Systems,

RFID systems: anti-collision protocols and applications. Naeem Khademi Cyber-Physical Systems, RFID systems: anti-collision protocols and applications Naeem Khademi Cyber-Physical Systems, 12.11.2010 RFID Systems Radio-frequency identification (RFID) is a technology that uses communication via electromagnetic

More information

Research on Design and Application of Computer Database Quality Evaluation Model

Research on Design and Application of Computer Database Quality Evaluation Model Research on Design and Application of Computer Database Quality Evaluation Model Abstract Hong Li, Hui Ge Shihezi Radio and TV University, Shihezi 832000, China Computer data quality evaluation is the

More information

The Design of Supermarket Electronic Shopping Guide System Based on ZigBee Communication

The Design of Supermarket Electronic Shopping Guide System Based on ZigBee Communication The Design of Supermarket Electronic Shopping Guide System Based on ZigBee Communication Yujie Zhang, Liang Han, and Yuanyuan Zhang College of Electrical and Information Engineering, Shaanxi University

More information

Remote Monitoring System of Ship Running State under Wireless Network

Remote Monitoring System of Ship Running State under Wireless Network Journal of Shipping and Ocean Engineering 7 (2017) 181-185 doi 10.17265/2159-5879/2017.05.001 D DAVID PUBLISHING Remote Monitoring System of Ship Running State under Wireless Network LI Ning Department

More information

Internet of Things (IoT)

Internet of Things (IoT) Internet of Things (IoT) Yan Zhang Professor, University of Oslo, Norway April 7, 2017 1 Outline Internet of Things (IoT) Key Technologies RFID Mobile Cloud Computing Things A real/physical or digital/virtual

More information

RETRACTED ARTICLE. Web-Based Data Mining in System Design and Implementation. Open Access. Jianhu Gong 1* and Jianzhi Gong 2

RETRACTED ARTICLE. Web-Based Data Mining in System Design and Implementation. Open Access. Jianhu Gong 1* and Jianzhi Gong 2 Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 1907-1911 1907 Web-Based Data Mining in System Design and Implementation Open Access Jianhu

More information

CHAPTER 3 ANTI-COLLISION PROTOCOLS IN RFID BASED HUMAN TRACKING SYSTEMS (A BRIEF OVERVIEW)

CHAPTER 3 ANTI-COLLISION PROTOCOLS IN RFID BASED HUMAN TRACKING SYSTEMS (A BRIEF OVERVIEW) 33 CHAPTER 3 ANTI-COLLISION PROTOCOLS IN RFID BASED HUMAN TRACKING SYSTEMS (A BRIEF OVERVIEW) In a RFID based communication system the reader activates a set of tags, and the tags respond back. As outlined

More information

Analysis and Simulation of RFID Anti-collision Algorithms

Analysis and Simulation of RFID Anti-collision Algorithms Analysis and Simulation of RFID Anti-collision Algorithms Tao Cheng, Li Jin School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing 44, P.R.China E-mail: chtao@bjtu.edu.cn

More information

Reader collisions take place when several neighbor readers try to interrogate the same tag at the same time, such that the neighbor readers interfere

Reader collisions take place when several neighbor readers try to interrogate the same tag at the same time, such that the neighbor readers interfere An Anti-Collision protocol of RFID Based on Divide and Conquer Algorithm Chen-Chung Liu, 1 and Yin-Tsung Chan 2 Department of Electronic Engineering National Chin-Yi University of Technology 1 ccl@ncut.edu.tw,

More information

Research and Application of E-Commerce Recommendation System Based on Association Rules Algorithm

Research and Application of E-Commerce Recommendation System Based on Association Rules Algorithm Research and Application of E-Commerce Recommendation System Based on Association Rules Algorithm Qingting Zhu 1*, Haifeng Lu 2 and Xinliang Xu 3 1 School of Computer Science and Software Engineering,

More information

Research on the Security Authentication Mode of MF1 S50 Electronic Tag

Research on the Security Authentication Mode of MF1 S50 Electronic Tag ORIGINAL ARTICLE Research on the Security Authentication Mode of MF1 S50 Electronic Tag Xiao Zhiliang Foshan Polytechinc., Foshan, Guangdong, China, 528137 Abstract: This paper expatiates the security

More information

Design of Coal Mine Power Supply Monitoring System

Design of Coal Mine Power Supply Monitoring System 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016) Design of Coal Mine Power Supply Monitoring System Lei Shi 1, Guo Jin 2 and Jun Xu 3 1 2 Department of electronic

More information

Internet of Things (IoT)

Internet of Things (IoT) Internet of Things (IoT) INF5050 February 19, 2016 1 Outline Internet of Things (IoT) Key Technologies RFID Mobile Cloud Computing Things A real/physical or digital/virtual entity that exists and moves

More information

Research on Approach of Equipment Status and Operation Information Acquisition Based on Equipment Control Bus

Research on Approach of Equipment Status and Operation Information Acquisition Based on Equipment Control Bus Research on Approach of Equipment Status and Operation Information Acquisition Based on Equipment Control Bus Xu Li a, *, Chen Meng, Huixia Jiang, Cheng Wang Army Engineering University, Shijiazhuang 050003,

More information

A Data Classification Algorithm of Internet of Things Based on Neural Network

A Data Classification Algorithm of Internet of Things Based on Neural Network A Data Classification Algorithm of Internet of Things Based on Neural Network https://doi.org/10.3991/ijoe.v13i09.7587 Zhenjun Li Hunan Radio and TV University, Hunan, China 278060389@qq.com Abstract To

More information

Design and Implementation of Dual-Mode Wireless Video Monitoring System

Design and Implementation of Dual-Mode Wireless Video Monitoring System Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Design and Implementation of Dual-Mode Wireless Video Monitoring System BAO Song-Jian, YANG Shou-Liang ChongQing University

More information

A Wireless Internet of Things Architecture Based on Mobile Internet

A Wireless Internet of Things Architecture Based on Mobile Internet A Wireless Internet of Things Architecture Based on Mobile Internet https://doi.org/10.3991/ijoe.v13i10.7745 Bing Zhou Jiaozuo University, Jiaozuo, China zbcn81@126.com Abstract In order to develop a valid

More information

Keywords: Motion Capture System, Virtual Interaction, Wireless Sensor Network, Motion Builder

Keywords: Motion Capture System, Virtual Interaction, Wireless Sensor Network, Motion Builder Advances in Engineering Research (AER), volume 107 2nd International Conference on Materials Engineering and Information Technology Applications (MEITA 2016) Study of Virtual Interaction System based on

More information

Intelligent Computer Room Management Platform Based on RF Card

Intelligent Computer Room Management Platform Based on RF Card 2017 2 nd International Conference on Artificial Intelligence and Engineering Applications (AIEA 2017) ISBN: 978-1-60595-485-1 Intelligent Computer Room Management Platform Based on RF Card LI ZHANG and

More information

QT-CBP: A New RFID Tag Anti-collision Algorithm Using Collision Bit Positioning*

QT-CBP: A New RFID Tag Anti-collision Algorithm Using Collision Bit Positioning* : A New RFID Tag Anti-collision Algorithm Using Collision Bit Positioning* Hyunji Lee and Jongdeok Kim Dept. of Computer Science and Engineering, Pusan National University eastleap@pusan.ac.kr, kimjd@pusan.ac.kr

More information

International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015)

International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015) International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015) ARINC - 429 airborne communications transceiver system based on FPGA implementation Liu Hao 1,Gu Cao 2,MA

More information

The research of key technologies in the fifth-generation mobile communication system Su Lina1, a, Chen Wen2,b, Chen Ping3,c, Lu Yanqian4,d

The research of key technologies in the fifth-generation mobile communication system Su Lina1, a, Chen Wen2,b, Chen Ping3,c, Lu Yanqian4,d International Industrial Informatics and Computer Engineering Conference (IIICEC 2015) The research of key technologies in the fifth-generation mobile communication system Su Lina1, a, Chen Wen2,b, Chen

More information

The Study and Implementation of Text-to-Speech System for Agricultural Information

The Study and Implementation of Text-to-Speech System for Agricultural Information The Study and Implementation of Text-to-Speech System for Agricultural Information Huoguo Zheng 1,2,*, Haiyan Hu 1,2, Shihong Liu 1,2, and Hong Meng 1,2 1 Agricultural Information Institute, Chinese Academy

More information

An Efficient Tag Identification Algorithm Based on Improved Collision Detection

An Efficient Tag Identification Algorithm Based on Improved Collision Detection An Efficient Tag Identification Algorithm Based on Improved Collision Detection Ya-Ning Yan 1 and Jian Xiong 2 1. ZTE Telecommunications College, Xi an Peihua University, Xi an 710065, China 2. School

More information

Research on Hybrid Network Technologies of Power Line Carrier and Wireless MAC Layer Hao ZHANG 1, Jun-yu LIU 2, Yi-ying ZHANG 3 and Kun LIANG 3,*

Research on Hybrid Network Technologies of Power Line Carrier and Wireless MAC Layer Hao ZHANG 1, Jun-yu LIU 2, Yi-ying ZHANG 3 and Kun LIANG 3,* 2017 International Conference on Computer, Electronics and Communication Engineering (CECE 2017) ISBN: 978-1-60595-476-9 Research on Hybrid Network Technologies of Power Line Carrier and Wireless MAC Layer

More information

An Overview of Optical Label Switching Technology

An Overview of Optical Label Switching Technology Physics Procedia 22 (2011) 392 396 2011 International Conference on Physics Science and Technology (ICPST 2011) An Overview of Optical Label Switching Technology Fugen Su a,hongli Jin b,fulu Jin c a* a

More information

Study of Smart Home System based on Zigbee Wireless Sensor System. Jie Huang 1

Study of Smart Home System based on Zigbee Wireless Sensor System. Jie Huang 1 2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016) Study of Smart Home System based on Zigbee Wireless Sensor System Jie Huang 1 1 College of Mechanical and Electronic

More information

Design of Campus one-finger Service System Based on Fingerprint Identification

Design of Campus one-finger Service System Based on Fingerprint Identification Design of Campus one-finger Service System Based on Fingerprint Identification Shouxi Zhu Aviation Information Technology R&D Center Binzhou University Binzhou, China Wenlai Ma Flying College of Binzhou

More information

The Analysis and Research of IPTV Set-top Box System. Fangyan Bai 1, Qi Sun 2

The Analysis and Research of IPTV Set-top Box System. Fangyan Bai 1, Qi Sun 2 Applied Mechanics and Materials Online: 2012-12-13 ISSN: 1662-7482, Vols. 256-259, pp 2898-2901 doi:10.4028/www.scientific.net/amm.256-259.2898 2013 Trans Tech Publications, Switzerland The Analysis and

More information

Research on Two - Way Interactive Communication and Information System Design Analysis Dong Xu1, a

Research on Two - Way Interactive Communication and Information System Design Analysis Dong Xu1, a 5th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2017) Research on Two - Way Interactive Communication and Information System Design Analysis Dong Xu1,

More information

Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority

Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority To cite this article:

More information

Research of tooling test signal collection and analysis Guozhuang Liang 1, a, Xuan Chen 1,b,Yufeng Yao 2,c

Research of tooling test signal collection and analysis Guozhuang Liang 1, a, Xuan Chen 1,b,Yufeng Yao 2,c 5th International Conference on Information Engineering for Mechanics and Materials (ICIMM 2015) Research of tooling test collection and analysis Guozhuang Liang 1, a, Xuan Chen 1,b,Yufeng Yao 2,c 1 School

More information

Agriculture Wireless Temperature and Humidity Sensor Network Based on ZigBee Technology

Agriculture Wireless Temperature and Humidity Sensor Network Based on ZigBee Technology Agriculture Wireless Temperature and Humidity Sensor Network Based on ZigBee Technology Xi Wang 1 and Hui Gao 2 1 Heilongjiang Bayi Agricultural Reclamation University, Daqing 163319, China 2 Lanzhou Jiaotong

More information

Design And Implementation Of USART IP Soft Core Based On DMA Mode

Design And Implementation Of USART IP Soft Core Based On DMA Mode Design And Implementation Of USART IP Soft Core Based On DMA Mode Peddaraju Allam 1 1 M.Tech Student, Dept of ECE, Geethanjali College of Engineering & Technology, Hyderabad, A.P, India. Abstract A Universal

More information

2017 International Conference on Economics, Management Engineering and Marketing (EMEM 2017) ISBN:

2017 International Conference on Economics, Management Engineering and Marketing (EMEM 2017) ISBN: 2017 International Conference on Economics, Management Engineering and Marketing (EMEM 2017) ISBN: 978-1-60595-502-5 Design of Attendance Check System Based on Ethernet Technology and Fingerprint Recognition

More information

THE STUDY AND IMPLEMENTATION OF TEXT-TO-SPEECH SYSTEM FOR AGRICULTURAL INFORMATION

THE STUDY AND IMPLEMENTATION OF TEXT-TO-SPEECH SYSTEM FOR AGRICULTURAL INFORMATION THE STUDY AND IMPLEMENTATION OF TEXT-TO-SPEECH SYSTEM FOR AGRICULTURAL INFORMATION Huoguo Zheng,2,* 1, Haiyan Hu 1, 2,Shihong Liu 1, 2, Hong Meng 1, 2 1 Agricultural Information Institute, Chinese Academy

More information

A Tentative Study on Ward Monitoring System based on Zigbee Technology Jifeng Liang

A Tentative Study on Ward Monitoring System based on Zigbee Technology Jifeng Liang 7th International Conference on Education, Management, Computer and Medicine (EMCM 2016) A Tentative Study on Ward Monitoring System based on Zigbee Technology Jifeng Liang Xi an Fanyi University, Xi an

More information

A Training Simulator for PD Detection Personnel

A Training Simulator for PD Detection Personnel Journal of Power and Energy Engineering, 2014, 2, 573-578 Published Online April 2014 in SciRes. http://www.scirp.org/journal/jpee http://dx.doi.org/10.4236/jpee.2014.24077 A Training Simulator for PD

More information

The Design of CAN Bus Communication System Based on MCP2515 and S3C2440 Jinmei Liu, Junhong Wang, Donghui Sun

The Design of CAN Bus Communication System Based on MCP2515 and S3C2440 Jinmei Liu, Junhong Wang, Donghui Sun Advanced Materials Research Online: 2014-05-21 ISSN: 1662-8985, Vol. 933, pp 516-520 doi:10.4028/www.scientific.net/amr.933.516 2014 Trans Tech Publications, Switzerland The Design of CAN Bus Communication

More information

Applied mechanics and applied technology in fuel injection pump bench. Rotational speed measurement system design based on CPLD

Applied mechanics and applied technology in fuel injection pump bench. Rotational speed measurement system design based on CPLD Advanced Materials Research Online: 2014-03-24 ISSN: 1662-8985, Vol. 910, pp 316-319 doi:10.4028/www.scientific.net/amr.910.316 2014 Trans Tech Publications, Switzerland Applied mechanics and applied technology

More information

Agricultural Collection System Based on Zigbee

Agricultural Collection System Based on Zigbee 301 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Editors: Peiyu Ren, Yancang Li, Huiping Song Copyright 2015, AIDIC Servizi S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The

More information

Analysis on the technology improvement of the library network information retrieval efficiency

Analysis on the technology improvement of the library network information retrieval efficiency Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(6):2198-2202 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Analysis on the technology improvement of the

More information

Research into a Wireless Smart Parking System

Research into a Wireless Smart Parking System 241 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Editors: Peiyu Ren, Yancang Li, Huiping Song Copyright 2015, AIDIC Servizi S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The

More information

Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm

Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm Huiqi Zhao 1,2,3, Yinglong Wang 2,3*, Minglei Shu 2,3 1 Department of Information

More information

Application of Redundant Backup Technology in Network Security

Application of Redundant Backup Technology in Network Security 2018 2nd International Conference on Systems, Computing, and Applications (SYSTCA 2018) Application of Redundant Backup Technology in Network Security Shuwen Deng1, Siping Hu*, 1, Dianhua Wang1, Limin

More information

The Design of Electronic Color Screen Based on Proteus Visual Designer Ting-Yu HOU 1,a, Hao LIU 2,b,*

The Design of Electronic Color Screen Based on Proteus Visual Designer Ting-Yu HOU 1,a, Hao LIU 2,b,* 2016 Joint International Conference on Service Science, Management and Engineering (SSME 2016) and International Conference on Information Science and Technology (IST 2016) ISBN: 978-1-60595-379-3 The

More information

Temperature Control System of Cold Storage

Temperature Control System of Cold Storage International Conference on Electromechanical Control Technology and Transportation (ICECTT 2015) Temperature Control System of Cold Storage Ting Lu 1 and Zeliang Liu 2 School of Electronic Engineering,

More information

A Rapid Development Method of Virtual Assembly Experiments Based on 3D Game Engine Wenfeng Hu 1, a, Xin Zhang 2,b

A Rapid Development Method of Virtual Assembly Experiments Based on 3D Game Engine Wenfeng Hu 1, a, Xin Zhang 2,b A Rapid Development Method of Virtual Assembly Experiments Based on 3D Game Engine Wenfeng Hu 1, a, Xin Zhang 2,b 1 School of Computer Science, Communication University of China, Beijing, China 2 School

More information

An Active RFID Tag for Outdoor Billboard Management

An Active RFID Tag for Outdoor Billboard Management 2017 2nd International Conference on Communications, Information Management and Network Security (CIMNS 2017) ISBN: 978-1-60595-498-1 An Active RFID Tag for Outdoor Billboard Management Hui JIANG 1,2,

More information

Comparative Evaluation of Probabilistic and Deterministic Tag Anti-collision Protocols for RFID Networks

Comparative Evaluation of Probabilistic and Deterministic Tag Anti-collision Protocols for RFID Networks Comparative Evaluation of Probabilistic and Deterministic Tag Anti-collision Protocols for RFID Networks Jihoon Choi and Wonjun Lee Division of Computer and Communication Engineering College of Information

More information

NEAR FIELD COMMUNICATION - THE FUTURE TECHNOLOGY FOR AN INTERACTIVE WORLD

NEAR FIELD COMMUNICATION - THE FUTURE TECHNOLOGY FOR AN INTERACTIVE WORLD Int. J. Engg. Res. & Sci. & Tech. 2013 Jignesh Patel and Badal Kothari, 2013 Research Paper ISSN 2319-5991 www.ijerst.com Vol. 2, No. 2, May 2013 2013 IJERST. All Rights Reserved NEAR FIELD COMMUNICATION

More information

Application of Theory and Technology of Wireless Sensor Network System for Soil Environmental Monitoring

Application of Theory and Technology of Wireless Sensor Network System for Soil Environmental Monitoring Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com Application of Theory and Technology of Wireless Sensor Network System for Soil Environmental Monitoring 1,2,3 Xu Xi, 3 Xiaoyao Xie, 4 Zhang

More information

The Improved Embedded Zerotree Wavelet Coding (EZW) Algorithm

The Improved Embedded Zerotree Wavelet Coding (EZW) Algorithm 01 International Conference on Image, Vision and Computing (ICIVC 01) IPCSI vol. 50 (01) (01) IACSI Press, Singapore DOI: 10.7763/IPCSI.01.V50.56 he Improved Embedded Zerotree Wavelet Coding () Algorithm

More information

Serial Communication Based on LabVIEW for the Development of an ECG Monitor

Serial Communication Based on LabVIEW for the Development of an ECG Monitor Advanced Materials Research Online: 2013-08-16 ISSN: 1662-8985, Vols. 734-737, pp 3003-3006 doi:10.4028/www.scientific.net/amr.734-737.3003 2013 Trans Tech Publications, Switzerland Serial Communication

More information

Research on Building Baseline of IT Risk Control and Its Application in IT Risks Management

Research on Building Baseline of IT Risk Control and Its Application in IT Risks Management Management Science and Engineering Vol. 8, No. 3, 2014, pp. 11-16 DOI: 10.3968/5520 ISSN 1913-0341 [Print] ISSN 1913-035X [Online] www.cscanada.net www.cscanada.org Research on Building Baseline of IT

More information

ANN-Based Modeling for Load and Main Steam Pressure Characteristics of a 600MW Supercritical Power Generating Unit

ANN-Based Modeling for Load and Main Steam Pressure Characteristics of a 600MW Supercritical Power Generating Unit ANN-Based Modeling for Load and Main Steam Pressure Characteristics of a 600MW Supercritical Power Generating Unit Liangyu Ma, Zhiyuan Gao Automation Department, School of Control and Computer Engineering

More information

AN WIRELESS COLLECTION AND MONITORING SYSTEM DESIGN BASED ON ARDUINO. Lu Shaokun 1,e*

AN WIRELESS COLLECTION AND MONITORING SYSTEM DESIGN BASED ON ARDUINO. Lu Shaokun 1,e* Advanced Materials Research Online: 2014-06-25 ISSN: 1662-8985, Vols. 971-973, pp 1076-1080 doi:10.4028/www.scientific.net/amr.971-973.1076 2014 Trans Tech Publications, Switzerland AN WIRELESS COLLECTION

More information

Research on the key technologies and realization of virtual campus

Research on the key technologies and realization of virtual campus Journal of Physics: Conference Series PAPER OPEN ACCESS Research on the key technologies and realization of virtual campus To cite this article: Cheng Zhang 2018 J. Phys.: Conf. Ser. 1074 012141 View the

More information

Deduction and Logic Implementation of the Fractal Scan Algorithm

Deduction and Logic Implementation of the Fractal Scan Algorithm Deduction and Logic Implementation of the Fractal Scan Algorithm Zhangjin Chen, Feng Ran, Zheming Jin Microelectronic R&D center, Shanghai University Shanghai, China and Meihua Xu School of Mechatronical

More information

Multisource Remote Sensing Data Mining System Construction in Cloud Computing Environment Dong YinDi 1, Liu ChengJun 1

Multisource Remote Sensing Data Mining System Construction in Cloud Computing Environment Dong YinDi 1, Liu ChengJun 1 4th International Conference on Computer, Mechatronics, Control and Electronic Engineering (ICCMCEE 2015) Multisource Remote Sensing Data Mining System Construction in Cloud Computing Environment Dong

More information

Simulation and Analyses of Anti-Collision Algorithms for Active RFID System Based on MiXiM Simulation Module

Simulation and Analyses of Anti-Collision Algorithms for Active RFID System Based on MiXiM Simulation Module Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com Simulation and Analyses of Anti-Collision Algorithms for Active RFID System Based on MiXiM Simulation Module Zhixiong CHEN, Qinghe GAO, Dongsheng

More information

Construction and Application of Cloud Data Center in University

Construction and Application of Cloud Data Center in University International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2014) Construction and Application of Cloud Data Center in University Hong Chai Institute of Railway Technology,

More information

Information Acquisition System Based on ZigBee and ARM

Information Acquisition System Based on ZigBee and ARM 295 A publication of CHEMICAL EGIEERIG TRASACTIOS VOL. 46, 2015 Guest Editors: Peiyu Ren, ancang Li, Huiping Song Copyright 2015, AIDIC Servizi S.r.l., ISB 978-88-95608-37-2; ISS 2283-9216 The Italian

More information

Design of Greenhouse Temperature and Humidity Monitoring System Based on ZIGBEE Technique Ming Xin 1,a, Wei Zhongshan 1,b,*

Design of Greenhouse Temperature and Humidity Monitoring System Based on ZIGBEE Technique Ming Xin 1,a, Wei Zhongshan 1,b,* International Conference on Computational Science and Engineering (ICCSE 2015) Design of Greenhouse Temperature and Humidity Monitoring System Based on ZIGBEE Technique Ming Xin 1,a, Wei Zhongshan 1,b,*

More information

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a nd International Workshop on Materials Engineering and Computer Sciences (IWMECS 05) Study on data encryption technology in network information security Jianliang Meng, Tao Wu a School of North China Electric

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Research on motion tracking and detection of computer vision ABSTRACT KEYWORDS

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Research on motion tracking and detection of computer vision ABSTRACT KEYWORDS [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 21 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(21), 2014 [12918-12922] Research on motion tracking and detection of computer

More information

Research on Device Control System Design Based on Stepping Motor. Zhongyong Tian

Research on Device Control System Design Based on Stepping Motor. Zhongyong Tian 3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) Research on Device Control System Design Based on Stepping Motor Zhongyong Tian The people's

More information

LDAP-based IOT Object Information Management Scheme

LDAP-based IOT Object Information Management Scheme ISSN 2409-2665 Journal of Logistics, Informatics and Service Science Vol. 1 (2014) No. 1, pp. 11-22 LDAP-based IOT Object Information Management Scheme Li Hai 1*, Fan Chunxiao 1, Wu Yuexin 1, Liu Jie 1,

More information

manufacturing process.

manufacturing process. Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 203-207 203 Open Access Identifying Method for Key Quality Characteristics in Series-Parallel

More information

Optimization of Wireless Data Transmission System Based on GPRS

Optimization of Wireless Data Transmission System Based on GPRS Optimization of Wireless Data Transmission System Based on GPRS Abstract Huiying Shao, Huan Tong, Pei Wang Xingtai Polytechnic College, Xingtai 054000, China In information era, rapid development of communication

More information

Road Network Traffic Congestion Evaluation Simulation Model based on Complex Network Chao Luo

Road Network Traffic Congestion Evaluation Simulation Model based on Complex Network Chao Luo 6th International Conference on Machinery, Materials, Environment, Biotechnology and Computer (MMEBC 26) Road Network Traffic Congestion Evaluation Simulation Model based on Complex Network Chao Luo Department

More information

The Establishment of Large Data Mining Platform Based on Cloud Computing. Wei CAI

The Establishment of Large Data Mining Platform Based on Cloud Computing. Wei CAI 2017 International Conference on Electronic, Control, Automation and Mechanical Engineering (ECAME 2017) ISBN: 978-1-60595-523-0 The Establishment of Large Data Mining Platform Based on Cloud Computing

More information

AN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE

AN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE AN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE Changwu Zhu 1, Guanxiang Yan 2, Zhi Liu 3, Li Gao 1,* 1 Department of Computer Science, Hua Zhong Normal University, Wuhan 430079, China

More information

Design and Implementation of Smart Gateway Based on Wireless Communication Technique

Design and Implementation of Smart Gateway Based on Wireless Communication Technique International Conference on Education, Management and Computer Science (ICEMC 2016) Design and Implementation of Smart Gateway Based on Wireless Communication Technique Zhongxiang Xiao1, a, Tengxue Rong1,

More information

The Finance & Technology Department and the Engineering Department recommend that Council receive this report as information.

The Finance & Technology Department and the Engineering Department recommend that Council receive this report as information. CORPORATE REPORT NO: R011 COUNCIL DATE: January 16, 2017 REGULAR COUNCIL TO: Mayor & Council DATE: January 10, 2017 FROM: SUBJECT: General Manager, Finance & Technology General Manager, Engineering TELUS

More information

Research of Traffic Flow Based on SVM Method. Deng-hong YIN, Jian WANG and Bo LI *

Research of Traffic Flow Based on SVM Method. Deng-hong YIN, Jian WANG and Bo LI * 2017 2nd International onference on Artificial Intelligence: Techniques and Applications (AITA 2017) ISBN: 978-1-60595-491-2 Research of Traffic Flow Based on SVM Method Deng-hong YIN, Jian WANG and Bo

More information

Research on Construction of Road Network Database Based on Video Retrieval Technology

Research on Construction of Road Network Database Based on Video Retrieval Technology Research on Construction of Road Network Database Based on Video Retrieval Technology Fengling Wang 1 1 Hezhou University, School of Mathematics and Computer Hezhou Guangxi 542899, China Abstract. Based

More information

Design and Implementation of Inspection System for Lift Based on Android Platform Yan Zhang1, a, Yanping Hu2,b

Design and Implementation of Inspection System for Lift Based on Android Platform Yan Zhang1, a, Yanping Hu2,b 2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016) Design and Implementation of Inspection System for Lift Based on Android Platform Yan Zhang1, a, Yanping Hu2,b 1

More information

A study on reliability of high-speed passenger transport network based on complex network analysis 1

A study on reliability of high-speed passenger transport network based on complex network analysis 1 Acta Technica 61 No. 4A/2016), 25 38 c 2017 Institute of Thermomechanics CAS, v.v.i. A study on reliability of high-speed passenger transport network based on complex network analysis 1 Xu Zhang 2, Bingzhi

More information

Networking. Melissa Winstanley

Networking. Melissa Winstanley Networking Melissa Winstanley mwinst@cs.washington.edu What is a computer network? "A collection of autonomous computers interconnected by a single technology" Can exchange information Many different technologies

More information

The Key Technology and Algorithm Design for the Development of Intelligent Examination System

The Key Technology and Algorithm Design for the Development of Intelligent Examination System 6th International Conference on Electronics, Mechanics, Culture and Medicine (EMCM 2015) The Key Technology and Algorithm Design for the Development of Intelligent Examination System Kai Lu1, a * and Mingrui

More information

Research and Application of Unstructured Data Acquisition and Retrieval Technology

Research and Application of Unstructured Data Acquisition and Retrieval Technology 2018 2nd International Conference on Systems, Computing, and Applications (SYSTCA 2018) Research and Application of Unstructured Data Acquisition and Retrieval Technology Zhenjiang Lei1,*, Lin Qiao2, Lina

More information

A priority based dynamic bandwidth scheduling in SDN networks 1

A priority based dynamic bandwidth scheduling in SDN networks 1 Acta Technica 62 No. 2A/2017, 445 454 c 2017 Institute of Thermomechanics CAS, v.v.i. A priority based dynamic bandwidth scheduling in SDN networks 1 Zun Wang 2 Abstract. In order to solve the problems

More information

Existence and Dynamics of Bounded Traveling Wave Solutions to Getmanou Equation

Existence and Dynamics of Bounded Traveling Wave Solutions to Getmanou Equation Commun. Theor. Phys. 70 (2018) 672 676 Vol. 70, No. 6, December 1, 2018 Existence and Dynamics of Bounded Traveling Wave Solutions to Getmanou Equation Zhen-Shu Wen ( 温振庶 ) School of Mathematical Sciences,

More information

ZigBee Routing Algorithm Based on Energy Optimization

ZigBee Routing Algorithm Based on Energy Optimization Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com ZigBee Routing Algorithm Based on Energy Optimization Wangang Wang, Yong Peng, Yongyu Peng Chongqing City Management College, No. 151 Daxuecheng

More information

Model the P2P Attack in Computer Networks

Model the P2P Attack in Computer Networks International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015) Model the P2P Attack in Computer Networks Wei Wang * Science and Technology on Communication Information

More information

Qiqihar University, China *Corresponding author. Keywords: Highway tunnel, Variant monitoring, Circle fit, Digital speckle.

Qiqihar University, China *Corresponding author. Keywords: Highway tunnel, Variant monitoring, Circle fit, Digital speckle. 2017 2nd International Conference on Applied Mechanics and Mechatronics Engineering (AMME 2017) ISBN: 978-1-60595-521-6 Research on Tunnel Support Deformation Based on Camera and Digital Speckle Improvement

More information

An Improved Frequent Pattern-growth Algorithm Based on Decomposition of the Transaction Database

An Improved Frequent Pattern-growth Algorithm Based on Decomposition of the Transaction Database Algorithm Based on Decomposition of the Transaction Database 1 School of Management Science and Engineering, Shandong Normal University,Jinan, 250014,China E-mail:459132653@qq.com Fei Wei 2 School of Management

More information

Research on friction parameter identification under the influence of vibration and collision

Research on friction parameter identification under the influence of vibration and collision Research on friction parameter identification under the influence of vibration and collision Qiang Chen 1, Yingjun Wang 2, Ying Chen 3 1, 2 Department of Control and System Engineering, Nanjing University,

More information

Improving RFID System To Read Tags Efficiently

Improving RFID System To Read Tags Efficiently Improving RFID System To Read Tags Efficiently Dissertation submitted in partial fulfillment of the requirements for the degree of Master of Technology by Naval Bhandari (Roll Number 04329023) under the

More information

Unstructured Data Migration and Dump Technology of Large-scale Enterprises

Unstructured Data Migration and Dump Technology of Large-scale Enterprises 2018 2nd International Conference on Systems, Computing, and Applications (SYSTCA 2018) Unstructured Data Migration and Dump Technology of Large-scale Enterprises Shuo Chen1,*, Shixin Fan2, Zhao Li1, Xinliu

More information

Information Push Service of University Library in Network and Information Age

Information Push Service of University Library in Network and Information Age 2013 International Conference on Advances in Social Science, Humanities, and Management (ASSHM 2013) Information Push Service of University Library in Network and Information Age Song Deng 1 and Jun Wang

More information

Test Cases Generation from UML Activity Diagrams

Test Cases Generation from UML Activity Diagrams Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing Test Cases Generation from UML Activity Diagrams Hyungchoul Kim, Sungwon

More information

Multi-Source Spatial Data Distribution Model and System Implementation

Multi-Source Spatial Data Distribution Model and System Implementation Communications and Network, 2013, 5, 93-98 http://dx.doi.org/10.4236/cn.2013.51009 Published Online February 2013 (http://www.scirp.org/journal/cn) Multi-Source Spatial Data Distribution Model and System

More information

Construction of Knowledge Base for Automatic Indexing and Classification Based. on Chinese Library Classification

Construction of Knowledge Base for Automatic Indexing and Classification Based. on Chinese Library Classification Construction of Knowledge Base for Automatic Indexing and Classification Based on Chinese Library Classification Han-qing Hou, Chun-xiang Xue School of Information Science & Technology, Nanjing Agricultural

More information

Design and Implementation of Agricultural Information Resources Vertical Search Engine Based on Nutch

Design and Implementation of Agricultural Information Resources Vertical Search Engine Based on Nutch 619 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 51, 2016 Guest Editors: Tichun Wang, Hongyang Zhang, Lei Tian Copyright 2016, AIDIC Servizi S.r.l., ISBN 978-88-95608-43-3; ISSN 2283-9216 The

More information

Test Analysis of Serial Communication Extension in Mobile Nodes of Participatory Sensing System Xinqiang Tang 1, Huichun Peng 2

Test Analysis of Serial Communication Extension in Mobile Nodes of Participatory Sensing System Xinqiang Tang 1, Huichun Peng 2 International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015) Test Analysis of Serial Communication Extension in Mobile Nodes of Participatory Sensing System Xinqiang

More information

[Type text] [Type text] [Type text] Yuetao Wu, Weizhou Zhou School of Finance and Economics of Xi an Jiaotong University, Xi an, , (CHINA)

[Type text] [Type text] [Type text] Yuetao Wu, Weizhou Zhou School of Finance and Economics of Xi an Jiaotong University, Xi an, , (CHINA) [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 19 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(19), 2014 [11590-11594] Research on mobile payment based on connection

More information

Ontology Molecule Theory-based Information Integrated Service for Agricultural Risk Management

Ontology Molecule Theory-based Information Integrated Service for Agricultural Risk Management 2154 JOURNAL OF SOFTWARE, VOL. 6, NO. 11, NOVEMBER 2011 Ontology Molecule Theory-based Information Integrated Service for Agricultural Risk Management Qin Pan College of Economics Management, Huazhong

More information