Research on Anti-collision Algorithm Optimization of RFID Tag Based on Binary Search
|
|
- Gyles McDonald
- 5 years ago
- Views:
Transcription
1 Research on Anti-collision Algorithm Optimization of RFID Tag Based on Binary Search Jinyan Liu, Quanyuan Feng School of Information Science and Technology, Southwest Jiaotong University, Chengdu , China Abstract This paper explores the optimization path of anti-collision algorithm for RFID system based on binary search. The structure and working principle of the RFID system are firstly analyzed, and then the binary anti-collision algorithms are explored, pertinent to tag collision in the RFID system. Based on the exploration of the operation principle of the basic binary search algorithm, the dynamic binary search algorithm and the bit-locking backward binary search algorithm, it can be learnt that the basic binary search algorithm has the disadvantages of data redundancy and relatively large number of queries and that the latter two can effectively make up the deficiencies of the basic binary search method. Finally, the jumping binary search algorithm is proposed based on the summarization and analysis of the two search algorithms with its realization process discussed and its related characteristics compared and analyzed. Keywords: Binary search, Rfid, Tag Anti-Collision, Radio frequency. 1. RESEARCH STATUS OF RFID TECHNOLOGY 1.1 The application status of RFID technology Radio frequency identification technology (RFID technology) originated in the research field of military radar of the British Air Force in the 1940s. In the 1960s, the theory of RFID technology has rapidly developed and gradually adjusted to the application fields. Britain, the United States, Japan and Switzerland are at the worldleading level in research and application of RFID technology, especially in aspects of chip technology development and electronic label technology. China s RFID technology research starts relatively late but develops rapidly, and the RFID technology has been gradually applied to various fields of society, attracting great concern of the economic market. The application of RFID technology in payment for bus and city subway by swiping cell phone greatly facilitates the traveling of the citizens. And in Shanghai World Expo, people can enter the Expo Park and buy food by swiping cell phone. RFID technology plays an important role in user identification, asset management and goods tracking, contributing to its great application value in the fields of economy, military, medicine, logistics transportation, objects storage and management. (Figure 1) For paper book management in libraries, the RFID technology can be applied to accurately locate every book so that the misplaced books can be immediately discovered and the reasonable location can be accurately determined. (Figure 2) RFID technology can be used to automatically scan the goods in the shipping cart and quickly generate the bill on the cell phone of the consumers for them to confirm and settle. Figure 1. RFID warehouse logistics management system technology 15
2 1.2 Research status of anti-collision algorithm Figure 2. Intelligent library RFID technology plays an increasingly important role in the various fields of society and in people's daily life, and the promotion of its market value in turn contributes to the development of the research on RFID technology. The key direction of RFID technology research is anti-collision algorithm, and the crucial issue of RFID technology research is to solve the long-standing communication collision problem in the application of RFID technology and thus to ensure the integrity and correctness of communication data. The communication collision problems in the applications of RFID technology are mainly caused by the simultaneous multi-label and multi-reader occupation of the communication channels and the complex external interference factors. The multi-access mode is the major way to realize the anti-collision algorithm of RFID technology both at home and abroad, which includes SDMA (space division multiple access), TDMA (time division multiple access) and CDMA (code division multiple access). The current common RFID anti-collision algorithm is based on the TDMA binary tree anti-collision algorithm and its improved algorithm. 2. SYSTEM STRUCTURE OF RFID The RFID system mainly consists of electronic tags, computer communication networks and readers, and the structure of the RFID system differs according to the specific application fields. The electronic tags, computer communication networks and readers are the core components of the RFID system, which play an indispensable core role in any RFID system architecture. By optimizing the coordination relationship of the three, the RFID system can operate more efficiently. 2.1 The classification and structure functions of electronic tags The RFID tag with a specific electronic code is the carrier of data in the system. The association of the electronic tag with the identified object determines the unique and specific identity of the latter, enabling the identified object to be systematically managed. The electronic tags store data through the chip and realize data transmission though wireless antenna. The information reception and feedback function enables electronic tags to be applied in more areas. Electronic tags can be divided into active tags and passive tags, among which the former with power supply can play an active role and exert a powerful application effect in a particular environment and the latter without built-in power supply is unable to transmit data actively. Though incapable of active data transmission, the passive tag has more extensive scopes of application because of its flexibility. The electronic tags can also be divided into high-frequency electronic tags, low-frequency electronic tags and microwave electronic tags according to the operating frequency, among which the microwave electronic tags are the widely-used type of electronic tags. The passive electronic tags will present four varying states during the operation of the RFID system, i.e. the ready state, selected state, off-power state and passive state. (Figure 3) The electronic tags have the following functional characteristics: First, the electronic tags carry information in the RFID system. Both the active electronic tags and the passive electronic tags must be equipped with the function of information storage. The storage of the specific information of objects forms the electronic tags with independent and unique information characteristic, which enables the objects to be equipped with specific identity characteristics. 16
3 Second, the article information contained in the electronic tags is of great application significance, which requires that the electronic tags should not only store the article information safely and completely but also modify or delete the information if necessary. Third, the chip as a key part of the electronic tag is responsible for the acceptance and decoding of signals and decoding of information as well as encoding on the return signals. 2.2 The structure and function of readers Figure 3. Electronic label status switching Readers are mainly responsible for the two-way data transmission with the electronic tags in the RFID system, and the management, storage, control and other instructions can be transmitted to the reader through the computer communication equipment. In the operating process of the RFID system, the readers can realize the read-in and read-out of the electronic tag data through the data transmission with the tags. The RFID system realizes effective operation due to the data transmission and identification functions of readers. The different operating frequency of the readers determines their different effective recognition distances. The reader is mainly composed of the RF interface, the antenna and the logic control unit. The RF unit of the reader is the transmitting terminal of energy, emitting energy of different frequencies during its operation and carrying out logic modulation on the received signals. The logic unit of the reader mainly functions to read and write the data information and to establish data connections with the application system. The main features of the reader are: First, there are two separate signal channels inside the reader. One is the channel for signal transmission from the transmitter to the electronic tags, and the other is the data channel for receiving the electronic tag data information. The non-interference signal transmission of the two channels enables information exchange to be achieved between the reader and the electronic tags. Second, the reader can receive the instructions sent from the computer end, according to the data contents of which certain operations will be conducted. In this process, the reader can also operate on the electronic tags through the instructions of the computer end. Third, the antenna of the reader can not only convert electromagnetic waves into a specific current signal but also transform the electric current into electromagnetic waves which will be transmitted to the passive electronic tags. The passive electronic tags can only be recognized in the RFID system by accepting signals from the reader antenna. Fourth, the control module of the reader is a key part to realize the information interaction between the electronic tag and the reader, and it can also decode the data information. The reader in the RFID system mainly functions to identify and transmit data and signals, which process must be completed by the control module. The core task of the control module is to control the information interaction between the electronic tag and the reader, thus realizing the anti-collision algorithm of the reader. 17
4 3. THE BINARY SEARCH-BASED ALGORITHMS The binary tree algorithm is deterministic. The core of the anti-collision principle of binary tree algorithm is to divide the collided tags into two subsets of 1 and 0. If tag collision occurs during the query of the subset 0, the tag will be further divided into two subsets of 01 and 00, on which the query will be re-conducted. Whenever collision occurs during the query, the set will be divided for further query. When the subset 0 is recognized without any collision, the query will be conducted on the subset 1 until all the tags are recognized without collision. (Figure 4) 3.1 Binary search algorithm Figure 4.Binary tree collision avoidance algorithm model The binary search algorithm compensates for the low channel utilization of the ALOHA algorithm. Binary search algorithm has significant superiority, mainly manifested by the non-necessity for the tag to memorize the previous queries, which greatly reduces the operation links and enhances the operational efficiency. The binary search algorithm only reads and queries a bit prefix; when the query command is the same as the tag serial number, the tag will respond accordingly and send the serial number for comparison with the query demand. During the comparison, the response of a tag indicates the result of correct recognition; in case of the response of several tags, the reader will determine the location of the collision, according to which the query demand will be changed. The reader will recognize all tags during the continuous correction of the query demand. The specific algorithm can be divided into three steps: First, the reader will send query commands based on the data bits, all of which area sequences of 1. Provided that the data bit is and that the reader sends the query command of , the query command will lead to the reaction of the tag receiving the command, which feeds back the serial number to the reader through the information channel. Second, read and compare the REQUEST with the serial number on the tag and examine whether there exists collision bit (Figure 5). Since the serial numbers of tags are variant, a unique tag will be recognized if there is no collision; otherwise, there will be collision of multiple tags, in which case the reader will correct the REQUEST to obtain a new one according to the collision bit by maintaining bits from the highest order to the highest collision bit as 0 and setting the bits from the highest collision bit to the lowest order to be 1. Figure 5. Manchester detects the collision bits 18
5 Figure 6. Binary search process Third, re-send REQUEST and execute the second step until the tag is correctly recognized. It enters the passive state after the reader reads its data. The algorithm again performs the search from the first step until all the tags are identified. The algorithm flow is shown in Figure Dynamic binary search algorithm Binary search algorithm possesses high computational efficiency in practical application. But in cases of long serial number during the binary search recognition process, there will be numerous repeated bits between the electronic tags and the reader, greatly increasing the search time and the possibility of errors in the operation. The dynamic binary search algorithm as the improved version of binary search algorithm not only inherits its superiority but also has it optimized in light of its deficiencies, contributing to the higher success rate and more accurate operation of the anti-collision of RFID tags. The search process of the dynamic binary search algorithm is the same to that of the binary search algorithm except for the difference in the execution of the second step, where only the data from the highest collision bit to the highest order are sent every time the query REQUEST is sent out from the reader. A new REQUEST is obtained without sending the bits 1 from the highest collision bit to the final bit during the non-dynamic search. The tag is not required to send the high-order similar to the query command of the reader. (Table 1) Table 1 Dynamic binary search recognition table First search Second search Third search REQUEST Tag A Tag B Tag C Collision bit decoding results 1x1x001x 1x001x Identification tag No No B After three times of searches with the dynamic binary search algorithm, the tag B is correctly recognized by the reader. Compared with the basic binary search algorithm, the dynamic binary search algorithm is significantly improved in the efficiency of operation. Under the premise of equal number of searches, the dynamic binary search algorithm can effectively reduce the output of the reader query command, especially the transmission of 19
6 the tag serial number. Through the simplification of these operations, the dynamic binary search algorithm can greatly shorten the operation time, thus effectively improving its operating efficiency. 3.3 Bit-locking backward dynamic binary search algorithm The data redundancy generated in the search of binary algorithm is the key factor influencing its efficiency. The dynamic binary search algorithm can improve the data redundancy caused by the search process without reducing the number of reader searches, thus enhancing the overall operation efficiency. When a tag is correctly identified, the reader resends the search command to query all the remaining tags, which means the query returns to the root node of the binary tree. This backward binary algorithm can not only effectively improve the data redundancy but also reduce the searches due to the return to the binary tree root. As can be seen in table 2, the backward binary search retains the upper-storey node with the method of grouping during its implementation. It inherits the three steps of the binary search algorithm in terms of operation links, through which B can be accurately recognized. The query REQUEST is reset by taking another subset according to the highest collision bit of group 0 in the table for query of unread tags in the group, i.e. the REQUEST can be used to recognize the tag A in group 0. When the tags in group 0 are fully recognized, the query demand of the reader returns to the root node to recognize the tag C in group 1 by resending The binary search method requires 6 searches, which indicates that the recognition of n tags requires 2n (log n +1) searches; while the bit-locking backward binary search method only requires 5 searches for 1 tag and (2n-1) searches for recognition of n tags. When the number of tags is larger, the reduction of search times is more evident, as shown in table 3, which can be obtained by calculation and figure 7. Table 2 Lock back binary search table First search Lock grouping Second search Third search REQUEST and 1 groups Tag A Tag B Tag C The 0 group Collision bit decoding results 1 x 1 x x x001x Identification tag NO The 1 group NO B Table 3 Binary algorithm and backward binary algorithm query times Tag count Method 1query method Method 2query method Figure 7. Binary search method and lock back search search times 20
7 3.4 Jumping dynamic binary search algorithm The dynamic binary search algorithm can improve the efficiency of the operation by reducing the data redundancy during the actual operation, and the bit-locking backward binary search algorithm can enhance the operation efficiency by reducing the number of queries, both of which compensate and improve the deficiencies of the binary search algorithm from different perspectives based on the guarantee of the rationality of the basic operation. The jumping dynamic binary search algorithm can extract and integrate the advantages of the first two excellent binary search algorithms, thus enabling it to become the most advanced algorithm in the RFID tag anti-collision algorithms. It maximizes the operation efficiency under the insurance of operation rationality and reduces the data bits of the reader query command and the tag serial number to be sent on the basis of the execution of the bit-locking backward method. The recognition process of the jumping dynamic search is shown in table 4. Table 4 Jump dynamic search recognition First search Lock grouping Second search Third search REQUEST and 1 groups Tag A Tag B Tag C The 0 group Collision bit decoding results 1 x 1 x x 1x001x Identification tag NO The 1 group NO B The three searches in Figure 10 are circularly conducted according to the basic three steps of dynamic binary search. Upon the completion of the first search, the bit-locking grouping is carried out to mark the upper-layer nodes. The tag B is returned to group 0 after being recognized for the implementation of the next two steps. The fourth step: the reader query command is 1011 and returns to group 0; the tag A is correctly recognized by sending the last four bits 0010 apart from the query demand, after which it is commanded to sleep. The fifth step: reset the query demand to be , and the tag C in group 1 is recognized. The jumping dynamic binary search algorithm requires fewer searches on average than the basic binary search and the bit-locking backward binary search and less data transmission than dynamic search method, and it possesses the overall performance much higher than that of the basic binary search algorithm, the dynamic binary search algorithm and the bitlocking backward binary search algorithm, integrating the advantages of the former three algorithms. 4. CONCLUSION Through the research on the binary search algorithm, it is found that the basic binary search algorithm is characterized by accuracy and especially larger effectiveness in avoiding RFID tag collision compared with ALOHA algorithm. However, the basic binary search algorithm will produce data redundancy in the detection process, and the overall operation efficiency is also influenced because of the relatively large number of queries. In light of the deficiencies of the basic binary search method, the dynamic binary search method is proposed to optimize the problem of data redundancy, and the bit-locking backward binary search method is put forward to solve the problem of large number of queries. The two algorithms both improve the basic binary search algorithm to a certain extent, enhancing the operation efficiency while guaranteeing the operation accuracy. The dynamic binary search algorithm is the most advanced one at present, which inherits the advantages of the dynamic binary algorithm and the bit-locking backward binary search algorithm, solving the problem of data redundancy and greatly reducing the queries of the reader by integrating the advantages of the former two algorithms. They can play a role in the jumping binary search algorithm, and thus greatly optimize the RFID tag anti-collision algorithm, promoting the extensive application and development of RFID technology in social fields. ACKNOWLEDGMENTS This work is supported by the National Natural Science Foundation of China under Grant
8 REFERENCES Fan W.J., Zhang S.S., Tian X. (2012). Research on Anti-collision Algorithm of RFID based on backward binary search, Computer Applications and Software, 05, Gao J.H, Zheng X.Y. (2012). RFID. Binary search anti-collision algorithm, Computer Measurement and Control, 10, He X.T., Zheng W.F. (2011). RFID. Binary collision suppression algorithm based on two points superposition, Journal of South China Normal University (NATURAL SCIENCE EDITION), 03, Li Z.J., Zhou J., Qiao J., Wu W.J. (2013). Research and optimization of adaptive fractal coding RFID anticollision algorithm, Journal of Communications, 09, Mo L. (2010). Research on RFID bit shielded binary search anti-collision algorithm, Journal of Hebei University of Science and Technology, 05, Wang L., Jin J., Zhang J. (2011). Jumping binary tree search anti-collision algorithm and its analysis, Microelectronics and Computer, 07, Wu J.X., Huang S.Y., Li C.Y., Ho H. (2009). Improved RFID binary search anti-collision algorithm, Computer Engineering and Applications, 05, , 235. Xia Z.G., He Y.G., Hou Zhou state. (2010). Computer engineering and application of anti-collision algorithm, A Binary Tree Detection Label, Vol. 20, pp Yan X.L., Chen Q.K., Hao J.T. (2013). A new anti-collision algorithm of microcomputer system based on dynamic binary, 09, Zhang W.X., Aung Z.M., Yin X.Z. (2012). An improved backward binary search RFID multi tag anticollision algorithm, Journal of HeFei University of Technology (NATURAL SCIENCE EDITION), 07, ,
An Improved DFSA Anti-collision Algorithm Based on the RFID-based Internet of Vehicles
2016 2 nd International Conference on Energy, Materials and Manufacturing Engineering (EMME 2016) ISBN: 978-1-60595-441-7 An Improved DFSA Anti-collision Algorithm Based on the RFID-based Internet of Vehicles
More informationRFID systems: anti-collision protocols and applications. Naeem Khademi Cyber-Physical Systems,
RFID systems: anti-collision protocols and applications Naeem Khademi Cyber-Physical Systems, 12.11.2010 RFID Systems Radio-frequency identification (RFID) is a technology that uses communication via electromagnetic
More informationResearch on Design and Application of Computer Database Quality Evaluation Model
Research on Design and Application of Computer Database Quality Evaluation Model Abstract Hong Li, Hui Ge Shihezi Radio and TV University, Shihezi 832000, China Computer data quality evaluation is the
More informationThe Design of Supermarket Electronic Shopping Guide System Based on ZigBee Communication
The Design of Supermarket Electronic Shopping Guide System Based on ZigBee Communication Yujie Zhang, Liang Han, and Yuanyuan Zhang College of Electrical and Information Engineering, Shaanxi University
More informationRemote Monitoring System of Ship Running State under Wireless Network
Journal of Shipping and Ocean Engineering 7 (2017) 181-185 doi 10.17265/2159-5879/2017.05.001 D DAVID PUBLISHING Remote Monitoring System of Ship Running State under Wireless Network LI Ning Department
More informationInternet of Things (IoT)
Internet of Things (IoT) Yan Zhang Professor, University of Oslo, Norway April 7, 2017 1 Outline Internet of Things (IoT) Key Technologies RFID Mobile Cloud Computing Things A real/physical or digital/virtual
More informationRETRACTED ARTICLE. Web-Based Data Mining in System Design and Implementation. Open Access. Jianhu Gong 1* and Jianzhi Gong 2
Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 1907-1911 1907 Web-Based Data Mining in System Design and Implementation Open Access Jianhu
More informationCHAPTER 3 ANTI-COLLISION PROTOCOLS IN RFID BASED HUMAN TRACKING SYSTEMS (A BRIEF OVERVIEW)
33 CHAPTER 3 ANTI-COLLISION PROTOCOLS IN RFID BASED HUMAN TRACKING SYSTEMS (A BRIEF OVERVIEW) In a RFID based communication system the reader activates a set of tags, and the tags respond back. As outlined
More informationAnalysis and Simulation of RFID Anti-collision Algorithms
Analysis and Simulation of RFID Anti-collision Algorithms Tao Cheng, Li Jin School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing 44, P.R.China E-mail: chtao@bjtu.edu.cn
More informationReader collisions take place when several neighbor readers try to interrogate the same tag at the same time, such that the neighbor readers interfere
An Anti-Collision protocol of RFID Based on Divide and Conquer Algorithm Chen-Chung Liu, 1 and Yin-Tsung Chan 2 Department of Electronic Engineering National Chin-Yi University of Technology 1 ccl@ncut.edu.tw,
More informationResearch and Application of E-Commerce Recommendation System Based on Association Rules Algorithm
Research and Application of E-Commerce Recommendation System Based on Association Rules Algorithm Qingting Zhu 1*, Haifeng Lu 2 and Xinliang Xu 3 1 School of Computer Science and Software Engineering,
More informationResearch on the Security Authentication Mode of MF1 S50 Electronic Tag
ORIGINAL ARTICLE Research on the Security Authentication Mode of MF1 S50 Electronic Tag Xiao Zhiliang Foshan Polytechinc., Foshan, Guangdong, China, 528137 Abstract: This paper expatiates the security
More informationDesign of Coal Mine Power Supply Monitoring System
2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016) Design of Coal Mine Power Supply Monitoring System Lei Shi 1, Guo Jin 2 and Jun Xu 3 1 2 Department of electronic
More informationInternet of Things (IoT)
Internet of Things (IoT) INF5050 February 19, 2016 1 Outline Internet of Things (IoT) Key Technologies RFID Mobile Cloud Computing Things A real/physical or digital/virtual entity that exists and moves
More informationResearch on Approach of Equipment Status and Operation Information Acquisition Based on Equipment Control Bus
Research on Approach of Equipment Status and Operation Information Acquisition Based on Equipment Control Bus Xu Li a, *, Chen Meng, Huixia Jiang, Cheng Wang Army Engineering University, Shijiazhuang 050003,
More informationA Data Classification Algorithm of Internet of Things Based on Neural Network
A Data Classification Algorithm of Internet of Things Based on Neural Network https://doi.org/10.3991/ijoe.v13i09.7587 Zhenjun Li Hunan Radio and TV University, Hunan, China 278060389@qq.com Abstract To
More informationDesign and Implementation of Dual-Mode Wireless Video Monitoring System
Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Design and Implementation of Dual-Mode Wireless Video Monitoring System BAO Song-Jian, YANG Shou-Liang ChongQing University
More informationA Wireless Internet of Things Architecture Based on Mobile Internet
A Wireless Internet of Things Architecture Based on Mobile Internet https://doi.org/10.3991/ijoe.v13i10.7745 Bing Zhou Jiaozuo University, Jiaozuo, China zbcn81@126.com Abstract In order to develop a valid
More informationKeywords: Motion Capture System, Virtual Interaction, Wireless Sensor Network, Motion Builder
Advances in Engineering Research (AER), volume 107 2nd International Conference on Materials Engineering and Information Technology Applications (MEITA 2016) Study of Virtual Interaction System based on
More informationIntelligent Computer Room Management Platform Based on RF Card
2017 2 nd International Conference on Artificial Intelligence and Engineering Applications (AIEA 2017) ISBN: 978-1-60595-485-1 Intelligent Computer Room Management Platform Based on RF Card LI ZHANG and
More informationQT-CBP: A New RFID Tag Anti-collision Algorithm Using Collision Bit Positioning*
: A New RFID Tag Anti-collision Algorithm Using Collision Bit Positioning* Hyunji Lee and Jongdeok Kim Dept. of Computer Science and Engineering, Pusan National University eastleap@pusan.ac.kr, kimjd@pusan.ac.kr
More informationInternational Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015)
International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015) ARINC - 429 airborne communications transceiver system based on FPGA implementation Liu Hao 1,Gu Cao 2,MA
More informationThe research of key technologies in the fifth-generation mobile communication system Su Lina1, a, Chen Wen2,b, Chen Ping3,c, Lu Yanqian4,d
International Industrial Informatics and Computer Engineering Conference (IIICEC 2015) The research of key technologies in the fifth-generation mobile communication system Su Lina1, a, Chen Wen2,b, Chen
More informationThe Study and Implementation of Text-to-Speech System for Agricultural Information
The Study and Implementation of Text-to-Speech System for Agricultural Information Huoguo Zheng 1,2,*, Haiyan Hu 1,2, Shihong Liu 1,2, and Hong Meng 1,2 1 Agricultural Information Institute, Chinese Academy
More informationAn Efficient Tag Identification Algorithm Based on Improved Collision Detection
An Efficient Tag Identification Algorithm Based on Improved Collision Detection Ya-Ning Yan 1 and Jian Xiong 2 1. ZTE Telecommunications College, Xi an Peihua University, Xi an 710065, China 2. School
More informationResearch on Hybrid Network Technologies of Power Line Carrier and Wireless MAC Layer Hao ZHANG 1, Jun-yu LIU 2, Yi-ying ZHANG 3 and Kun LIANG 3,*
2017 International Conference on Computer, Electronics and Communication Engineering (CECE 2017) ISBN: 978-1-60595-476-9 Research on Hybrid Network Technologies of Power Line Carrier and Wireless MAC Layer
More informationAn Overview of Optical Label Switching Technology
Physics Procedia 22 (2011) 392 396 2011 International Conference on Physics Science and Technology (ICPST 2011) An Overview of Optical Label Switching Technology Fugen Su a,hongli Jin b,fulu Jin c a* a
More informationStudy of Smart Home System based on Zigbee Wireless Sensor System. Jie Huang 1
2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016) Study of Smart Home System based on Zigbee Wireless Sensor System Jie Huang 1 1 College of Mechanical and Electronic
More informationDesign of Campus one-finger Service System Based on Fingerprint Identification
Design of Campus one-finger Service System Based on Fingerprint Identification Shouxi Zhu Aviation Information Technology R&D Center Binzhou University Binzhou, China Wenlai Ma Flying College of Binzhou
More informationThe Analysis and Research of IPTV Set-top Box System. Fangyan Bai 1, Qi Sun 2
Applied Mechanics and Materials Online: 2012-12-13 ISSN: 1662-7482, Vols. 256-259, pp 2898-2901 doi:10.4028/www.scientific.net/amm.256-259.2898 2013 Trans Tech Publications, Switzerland The Analysis and
More informationResearch on Two - Way Interactive Communication and Information System Design Analysis Dong Xu1, a
5th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2017) Research on Two - Way Interactive Communication and Information System Design Analysis Dong Xu1,
More informationComprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority
IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority To cite this article:
More informationResearch of tooling test signal collection and analysis Guozhuang Liang 1, a, Xuan Chen 1,b,Yufeng Yao 2,c
5th International Conference on Information Engineering for Mechanics and Materials (ICIMM 2015) Research of tooling test collection and analysis Guozhuang Liang 1, a, Xuan Chen 1,b,Yufeng Yao 2,c 1 School
More informationAgriculture Wireless Temperature and Humidity Sensor Network Based on ZigBee Technology
Agriculture Wireless Temperature and Humidity Sensor Network Based on ZigBee Technology Xi Wang 1 and Hui Gao 2 1 Heilongjiang Bayi Agricultural Reclamation University, Daqing 163319, China 2 Lanzhou Jiaotong
More informationDesign And Implementation Of USART IP Soft Core Based On DMA Mode
Design And Implementation Of USART IP Soft Core Based On DMA Mode Peddaraju Allam 1 1 M.Tech Student, Dept of ECE, Geethanjali College of Engineering & Technology, Hyderabad, A.P, India. Abstract A Universal
More information2017 International Conference on Economics, Management Engineering and Marketing (EMEM 2017) ISBN:
2017 International Conference on Economics, Management Engineering and Marketing (EMEM 2017) ISBN: 978-1-60595-502-5 Design of Attendance Check System Based on Ethernet Technology and Fingerprint Recognition
More informationTHE STUDY AND IMPLEMENTATION OF TEXT-TO-SPEECH SYSTEM FOR AGRICULTURAL INFORMATION
THE STUDY AND IMPLEMENTATION OF TEXT-TO-SPEECH SYSTEM FOR AGRICULTURAL INFORMATION Huoguo Zheng,2,* 1, Haiyan Hu 1, 2,Shihong Liu 1, 2, Hong Meng 1, 2 1 Agricultural Information Institute, Chinese Academy
More informationA Tentative Study on Ward Monitoring System based on Zigbee Technology Jifeng Liang
7th International Conference on Education, Management, Computer and Medicine (EMCM 2016) A Tentative Study on Ward Monitoring System based on Zigbee Technology Jifeng Liang Xi an Fanyi University, Xi an
More informationA Training Simulator for PD Detection Personnel
Journal of Power and Energy Engineering, 2014, 2, 573-578 Published Online April 2014 in SciRes. http://www.scirp.org/journal/jpee http://dx.doi.org/10.4236/jpee.2014.24077 A Training Simulator for PD
More informationThe Design of CAN Bus Communication System Based on MCP2515 and S3C2440 Jinmei Liu, Junhong Wang, Donghui Sun
Advanced Materials Research Online: 2014-05-21 ISSN: 1662-8985, Vol. 933, pp 516-520 doi:10.4028/www.scientific.net/amr.933.516 2014 Trans Tech Publications, Switzerland The Design of CAN Bus Communication
More informationApplied mechanics and applied technology in fuel injection pump bench. Rotational speed measurement system design based on CPLD
Advanced Materials Research Online: 2014-03-24 ISSN: 1662-8985, Vol. 910, pp 316-319 doi:10.4028/www.scientific.net/amr.910.316 2014 Trans Tech Publications, Switzerland Applied mechanics and applied technology
More informationAgricultural Collection System Based on Zigbee
301 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Editors: Peiyu Ren, Yancang Li, Huiping Song Copyright 2015, AIDIC Servizi S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The
More informationAnalysis on the technology improvement of the library network information retrieval efficiency
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(6):2198-2202 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Analysis on the technology improvement of the
More informationResearch into a Wireless Smart Parking System
241 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Editors: Peiyu Ren, Yancang Li, Huiping Song Copyright 2015, AIDIC Servizi S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The
More informationFramework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm
Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm Huiqi Zhao 1,2,3, Yinglong Wang 2,3*, Minglei Shu 2,3 1 Department of Information
More informationApplication of Redundant Backup Technology in Network Security
2018 2nd International Conference on Systems, Computing, and Applications (SYSTCA 2018) Application of Redundant Backup Technology in Network Security Shuwen Deng1, Siping Hu*, 1, Dianhua Wang1, Limin
More informationThe Design of Electronic Color Screen Based on Proteus Visual Designer Ting-Yu HOU 1,a, Hao LIU 2,b,*
2016 Joint International Conference on Service Science, Management and Engineering (SSME 2016) and International Conference on Information Science and Technology (IST 2016) ISBN: 978-1-60595-379-3 The
More informationTemperature Control System of Cold Storage
International Conference on Electromechanical Control Technology and Transportation (ICECTT 2015) Temperature Control System of Cold Storage Ting Lu 1 and Zeliang Liu 2 School of Electronic Engineering,
More informationA Rapid Development Method of Virtual Assembly Experiments Based on 3D Game Engine Wenfeng Hu 1, a, Xin Zhang 2,b
A Rapid Development Method of Virtual Assembly Experiments Based on 3D Game Engine Wenfeng Hu 1, a, Xin Zhang 2,b 1 School of Computer Science, Communication University of China, Beijing, China 2 School
More informationAn Active RFID Tag for Outdoor Billboard Management
2017 2nd International Conference on Communications, Information Management and Network Security (CIMNS 2017) ISBN: 978-1-60595-498-1 An Active RFID Tag for Outdoor Billboard Management Hui JIANG 1,2,
More informationComparative Evaluation of Probabilistic and Deterministic Tag Anti-collision Protocols for RFID Networks
Comparative Evaluation of Probabilistic and Deterministic Tag Anti-collision Protocols for RFID Networks Jihoon Choi and Wonjun Lee Division of Computer and Communication Engineering College of Information
More informationNEAR FIELD COMMUNICATION - THE FUTURE TECHNOLOGY FOR AN INTERACTIVE WORLD
Int. J. Engg. Res. & Sci. & Tech. 2013 Jignesh Patel and Badal Kothari, 2013 Research Paper ISSN 2319-5991 www.ijerst.com Vol. 2, No. 2, May 2013 2013 IJERST. All Rights Reserved NEAR FIELD COMMUNICATION
More informationApplication of Theory and Technology of Wireless Sensor Network System for Soil Environmental Monitoring
Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com Application of Theory and Technology of Wireless Sensor Network System for Soil Environmental Monitoring 1,2,3 Xu Xi, 3 Xiaoyao Xie, 4 Zhang
More informationThe Improved Embedded Zerotree Wavelet Coding (EZW) Algorithm
01 International Conference on Image, Vision and Computing (ICIVC 01) IPCSI vol. 50 (01) (01) IACSI Press, Singapore DOI: 10.7763/IPCSI.01.V50.56 he Improved Embedded Zerotree Wavelet Coding () Algorithm
More informationSerial Communication Based on LabVIEW for the Development of an ECG Monitor
Advanced Materials Research Online: 2013-08-16 ISSN: 1662-8985, Vols. 734-737, pp 3003-3006 doi:10.4028/www.scientific.net/amr.734-737.3003 2013 Trans Tech Publications, Switzerland Serial Communication
More informationResearch on Building Baseline of IT Risk Control and Its Application in IT Risks Management
Management Science and Engineering Vol. 8, No. 3, 2014, pp. 11-16 DOI: 10.3968/5520 ISSN 1913-0341 [Print] ISSN 1913-035X [Online] www.cscanada.net www.cscanada.org Research on Building Baseline of IT
More informationANN-Based Modeling for Load and Main Steam Pressure Characteristics of a 600MW Supercritical Power Generating Unit
ANN-Based Modeling for Load and Main Steam Pressure Characteristics of a 600MW Supercritical Power Generating Unit Liangyu Ma, Zhiyuan Gao Automation Department, School of Control and Computer Engineering
More informationAN WIRELESS COLLECTION AND MONITORING SYSTEM DESIGN BASED ON ARDUINO. Lu Shaokun 1,e*
Advanced Materials Research Online: 2014-06-25 ISSN: 1662-8985, Vols. 971-973, pp 1076-1080 doi:10.4028/www.scientific.net/amr.971-973.1076 2014 Trans Tech Publications, Switzerland AN WIRELESS COLLECTION
More informationResearch on the key technologies and realization of virtual campus
Journal of Physics: Conference Series PAPER OPEN ACCESS Research on the key technologies and realization of virtual campus To cite this article: Cheng Zhang 2018 J. Phys.: Conf. Ser. 1074 012141 View the
More informationDeduction and Logic Implementation of the Fractal Scan Algorithm
Deduction and Logic Implementation of the Fractal Scan Algorithm Zhangjin Chen, Feng Ran, Zheming Jin Microelectronic R&D center, Shanghai University Shanghai, China and Meihua Xu School of Mechatronical
More informationMultisource Remote Sensing Data Mining System Construction in Cloud Computing Environment Dong YinDi 1, Liu ChengJun 1
4th International Conference on Computer, Mechatronics, Control and Electronic Engineering (ICCMCEE 2015) Multisource Remote Sensing Data Mining System Construction in Cloud Computing Environment Dong
More informationSimulation and Analyses of Anti-Collision Algorithms for Active RFID System Based on MiXiM Simulation Module
Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com Simulation and Analyses of Anti-Collision Algorithms for Active RFID System Based on MiXiM Simulation Module Zhixiong CHEN, Qinghe GAO, Dongsheng
More informationConstruction and Application of Cloud Data Center in University
International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2014) Construction and Application of Cloud Data Center in University Hong Chai Institute of Railway Technology,
More informationInformation Acquisition System Based on ZigBee and ARM
295 A publication of CHEMICAL EGIEERIG TRASACTIOS VOL. 46, 2015 Guest Editors: Peiyu Ren, ancang Li, Huiping Song Copyright 2015, AIDIC Servizi S.r.l., ISB 978-88-95608-37-2; ISS 2283-9216 The Italian
More informationDesign of Greenhouse Temperature and Humidity Monitoring System Based on ZIGBEE Technique Ming Xin 1,a, Wei Zhongshan 1,b,*
International Conference on Computational Science and Engineering (ICCSE 2015) Design of Greenhouse Temperature and Humidity Monitoring System Based on ZIGBEE Technique Ming Xin 1,a, Wei Zhongshan 1,b,*
More informationStudy on data encryption technology in network information security. Jianliang Meng, Tao Wu a
nd International Workshop on Materials Engineering and Computer Sciences (IWMECS 05) Study on data encryption technology in network information security Jianliang Meng, Tao Wu a School of North China Electric
More informationBioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Research on motion tracking and detection of computer vision ABSTRACT KEYWORDS
[Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 21 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(21), 2014 [12918-12922] Research on motion tracking and detection of computer
More informationResearch on Device Control System Design Based on Stepping Motor. Zhongyong Tian
3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) Research on Device Control System Design Based on Stepping Motor Zhongyong Tian The people's
More informationLDAP-based IOT Object Information Management Scheme
ISSN 2409-2665 Journal of Logistics, Informatics and Service Science Vol. 1 (2014) No. 1, pp. 11-22 LDAP-based IOT Object Information Management Scheme Li Hai 1*, Fan Chunxiao 1, Wu Yuexin 1, Liu Jie 1,
More informationmanufacturing process.
Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 203-207 203 Open Access Identifying Method for Key Quality Characteristics in Series-Parallel
More informationOptimization of Wireless Data Transmission System Based on GPRS
Optimization of Wireless Data Transmission System Based on GPRS Abstract Huiying Shao, Huan Tong, Pei Wang Xingtai Polytechnic College, Xingtai 054000, China In information era, rapid development of communication
More informationRoad Network Traffic Congestion Evaluation Simulation Model based on Complex Network Chao Luo
6th International Conference on Machinery, Materials, Environment, Biotechnology and Computer (MMEBC 26) Road Network Traffic Congestion Evaluation Simulation Model based on Complex Network Chao Luo Department
More informationThe Establishment of Large Data Mining Platform Based on Cloud Computing. Wei CAI
2017 International Conference on Electronic, Control, Automation and Mechanical Engineering (ECAME 2017) ISBN: 978-1-60595-523-0 The Establishment of Large Data Mining Platform Based on Cloud Computing
More informationAN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE
AN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE Changwu Zhu 1, Guanxiang Yan 2, Zhi Liu 3, Li Gao 1,* 1 Department of Computer Science, Hua Zhong Normal University, Wuhan 430079, China
More informationDesign and Implementation of Smart Gateway Based on Wireless Communication Technique
International Conference on Education, Management and Computer Science (ICEMC 2016) Design and Implementation of Smart Gateway Based on Wireless Communication Technique Zhongxiang Xiao1, a, Tengxue Rong1,
More informationThe Finance & Technology Department and the Engineering Department recommend that Council receive this report as information.
CORPORATE REPORT NO: R011 COUNCIL DATE: January 16, 2017 REGULAR COUNCIL TO: Mayor & Council DATE: January 10, 2017 FROM: SUBJECT: General Manager, Finance & Technology General Manager, Engineering TELUS
More informationResearch of Traffic Flow Based on SVM Method. Deng-hong YIN, Jian WANG and Bo LI *
2017 2nd International onference on Artificial Intelligence: Techniques and Applications (AITA 2017) ISBN: 978-1-60595-491-2 Research of Traffic Flow Based on SVM Method Deng-hong YIN, Jian WANG and Bo
More informationResearch on Construction of Road Network Database Based on Video Retrieval Technology
Research on Construction of Road Network Database Based on Video Retrieval Technology Fengling Wang 1 1 Hezhou University, School of Mathematics and Computer Hezhou Guangxi 542899, China Abstract. Based
More informationDesign and Implementation of Inspection System for Lift Based on Android Platform Yan Zhang1, a, Yanping Hu2,b
2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016) Design and Implementation of Inspection System for Lift Based on Android Platform Yan Zhang1, a, Yanping Hu2,b 1
More informationA study on reliability of high-speed passenger transport network based on complex network analysis 1
Acta Technica 61 No. 4A/2016), 25 38 c 2017 Institute of Thermomechanics CAS, v.v.i. A study on reliability of high-speed passenger transport network based on complex network analysis 1 Xu Zhang 2, Bingzhi
More informationNetworking. Melissa Winstanley
Networking Melissa Winstanley mwinst@cs.washington.edu What is a computer network? "A collection of autonomous computers interconnected by a single technology" Can exchange information Many different technologies
More informationThe Key Technology and Algorithm Design for the Development of Intelligent Examination System
6th International Conference on Electronics, Mechanics, Culture and Medicine (EMCM 2015) The Key Technology and Algorithm Design for the Development of Intelligent Examination System Kai Lu1, a * and Mingrui
More informationResearch and Application of Unstructured Data Acquisition and Retrieval Technology
2018 2nd International Conference on Systems, Computing, and Applications (SYSTCA 2018) Research and Application of Unstructured Data Acquisition and Retrieval Technology Zhenjiang Lei1,*, Lin Qiao2, Lina
More informationA priority based dynamic bandwidth scheduling in SDN networks 1
Acta Technica 62 No. 2A/2017, 445 454 c 2017 Institute of Thermomechanics CAS, v.v.i. A priority based dynamic bandwidth scheduling in SDN networks 1 Zun Wang 2 Abstract. In order to solve the problems
More informationExistence and Dynamics of Bounded Traveling Wave Solutions to Getmanou Equation
Commun. Theor. Phys. 70 (2018) 672 676 Vol. 70, No. 6, December 1, 2018 Existence and Dynamics of Bounded Traveling Wave Solutions to Getmanou Equation Zhen-Shu Wen ( 温振庶 ) School of Mathematical Sciences,
More informationZigBee Routing Algorithm Based on Energy Optimization
Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com ZigBee Routing Algorithm Based on Energy Optimization Wangang Wang, Yong Peng, Yongyu Peng Chongqing City Management College, No. 151 Daxuecheng
More informationModel the P2P Attack in Computer Networks
International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015) Model the P2P Attack in Computer Networks Wei Wang * Science and Technology on Communication Information
More informationQiqihar University, China *Corresponding author. Keywords: Highway tunnel, Variant monitoring, Circle fit, Digital speckle.
2017 2nd International Conference on Applied Mechanics and Mechatronics Engineering (AMME 2017) ISBN: 978-1-60595-521-6 Research on Tunnel Support Deformation Based on Camera and Digital Speckle Improvement
More informationAn Improved Frequent Pattern-growth Algorithm Based on Decomposition of the Transaction Database
Algorithm Based on Decomposition of the Transaction Database 1 School of Management Science and Engineering, Shandong Normal University,Jinan, 250014,China E-mail:459132653@qq.com Fei Wei 2 School of Management
More informationResearch on friction parameter identification under the influence of vibration and collision
Research on friction parameter identification under the influence of vibration and collision Qiang Chen 1, Yingjun Wang 2, Ying Chen 3 1, 2 Department of Control and System Engineering, Nanjing University,
More informationImproving RFID System To Read Tags Efficiently
Improving RFID System To Read Tags Efficiently Dissertation submitted in partial fulfillment of the requirements for the degree of Master of Technology by Naval Bhandari (Roll Number 04329023) under the
More informationUnstructured Data Migration and Dump Technology of Large-scale Enterprises
2018 2nd International Conference on Systems, Computing, and Applications (SYSTCA 2018) Unstructured Data Migration and Dump Technology of Large-scale Enterprises Shuo Chen1,*, Shixin Fan2, Zhao Li1, Xinliu
More informationInformation Push Service of University Library in Network and Information Age
2013 International Conference on Advances in Social Science, Humanities, and Management (ASSHM 2013) Information Push Service of University Library in Network and Information Age Song Deng 1 and Jun Wang
More informationTest Cases Generation from UML Activity Diagrams
Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing Test Cases Generation from UML Activity Diagrams Hyungchoul Kim, Sungwon
More informationMulti-Source Spatial Data Distribution Model and System Implementation
Communications and Network, 2013, 5, 93-98 http://dx.doi.org/10.4236/cn.2013.51009 Published Online February 2013 (http://www.scirp.org/journal/cn) Multi-Source Spatial Data Distribution Model and System
More informationConstruction of Knowledge Base for Automatic Indexing and Classification Based. on Chinese Library Classification
Construction of Knowledge Base for Automatic Indexing and Classification Based on Chinese Library Classification Han-qing Hou, Chun-xiang Xue School of Information Science & Technology, Nanjing Agricultural
More informationDesign and Implementation of Agricultural Information Resources Vertical Search Engine Based on Nutch
619 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 51, 2016 Guest Editors: Tichun Wang, Hongyang Zhang, Lei Tian Copyright 2016, AIDIC Servizi S.r.l., ISBN 978-88-95608-43-3; ISSN 2283-9216 The
More informationTest Analysis of Serial Communication Extension in Mobile Nodes of Participatory Sensing System Xinqiang Tang 1, Huichun Peng 2
International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015) Test Analysis of Serial Communication Extension in Mobile Nodes of Participatory Sensing System Xinqiang
More information[Type text] [Type text] [Type text] Yuetao Wu, Weizhou Zhou School of Finance and Economics of Xi an Jiaotong University, Xi an, , (CHINA)
[Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 19 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(19), 2014 [11590-11594] Research on mobile payment based on connection
More informationOntology Molecule Theory-based Information Integrated Service for Agricultural Risk Management
2154 JOURNAL OF SOFTWARE, VOL. 6, NO. 11, NOVEMBER 2011 Ontology Molecule Theory-based Information Integrated Service for Agricultural Risk Management Qin Pan College of Economics Management, Huazhong
More information