2011 Vol. 26, No. 6
Display Method: |
Security of the low-cost RFID system protocol was not high.A security mutual authentication protocol DRHA was proposed which based on unidirectional Hash function,pseudo-random number generator and dynamic refersh ID.DRHA solves the problem of synchronous of server and labels through saving each label of the new and old identify groups of server.Security analysis showed that the protocol can resist common attacks,and has high safety and practicality.
In view of the problem that the current platform based on the Windows personal firewall can not control according to the application program and lack of business firewall contrast,one kind personal Windows firewall based on the SPI was proposed.The firewall uses Winsock2 SPI programming technology,the system module adopts the dynamic link library,global variable interface and interface functions,and realizes data monitoring,log management,management rules and system monitoring and other functions.The experimental results showed that the firewall had good performance and achieved the basic function of the personal firewall.It can guarantee the network safety of personal computer.
Identity-based key agreement schemes are mostly oriented two-party or three at present.It cannot satisfy the needs of modern communication about multiple party at the same time.An identity-based multi-party key agreement scheme was proposed which can mutually authenticate by using the digital signature to increase communication entity authentication.Analysis showed that the scheme is not required by pairing computation,has high efficiency and safety.
In view of the low bandwidth,the high error rate and the high delay of wireless networks,simulation model in NS2 was established.The simulation analysis of the different packet error rate,the compression quantisation parameter,the length of GOP and packet for image quality based on the PSNR evaluation method respectively were carried out.The result of the simulation analysis provides the beneficial reference for the wireless network more effectively in vedio data transmission.
In order to improve the performance of IEEE 802.11 DCF,based on the existing protocol S-DCF,through the improvement of optimal transmission probability of τ,a new approach based on minimum contention window-based channed access mechanism was proposed.The algorithm can optimize performance of wireless network through the dynamic adjustment of the contention Window double and reset the probability according to network size.The mathematical modeling and theoretical analysis were carried out using Markov chain PPT-DCF.The results showed that when the network size varies,PPT-DCF performance has more better than the S-DCF does.
Aiming at the problem that many influence factors have uncertainty in the process of assessing emergency response agencies,GAHP method was applied to emergency response agencies assessment model.AHP was used to quantity evaluating indicator first,then GST was used to establish sample matrix of assessment,and assessment conclusions were obtained.An example verified the practicality and effectiveness of this method.
To solve the ignorance of service quality of adaptive middleware platform,an kind of adaptive strategy suitable for pervasive computing middleware was put forword.In the strategy QoS feature is added,service contract concept is introduced and genetic algorithm is used to solve optimizoction problem.Thus better adaptive effect has been achieved.
In view of the communication interface of Android mobile phone and server,a solution for mobile phone terminal and the database data interaction was put forward.The data of method access uses database mode.The server use tomcat through the JSP file to achieve access to the database.Using API which is provided by Google and Sun,with HTTP GET and POST mobile phone terminal access to tomcat is realized.The test results showed that according to the stored data size and security selecting suitable database can be chosen,and interactive parsing capabilities of Android platform and database data can be extended.
Based on genetic algorithm and introducing tabu search algorithm,a method which is test cases automatically generating for an object-oriented class was proposed.The method designs a new code of class object and constructs the fitness function for the test cases automatically generating of class objects required. Each test case in the local area finds the optimal value again, therefore the ability of search for the best value of overall algorithm was improved.The experiment results showed that by this algorithm,the combination of optimization of genetic groups and tabu search strong climbing ability quickly realized the global optimization and generate high-quality test cases.
Based on the attribute reduction of rough set, a new algorithm was proposed with two ways.By using binary discernibility matrix,attribute reduction set in the first step could be contributed.Then using recognizable matrix and its important attribute to get attribute reduction in the mean time this reduction is checking whether it is contained by the reduction set in the first step,so as to judge if this reduction set belongs to the feasible one.It's a kind of intuitionistic and effective attribute reduction algorithm with the demonstration of theoretical analysis and experiment.
In order to enhance effect of programming language experiments,influence of four kinds of integrated development environments(IDE),i.e.Visual C++ 6.0,Turbo C++ 3.0,Borland C++ 3.1 and Turbo C 2.0 on C language experiments was studied with the methods of characteristics analysis and case-based comparison. The collaborative application of integrated development environment on programming language experiment was put forward.Research suggested that collaborative application of multiple IDEs is necessary,applicable and high-efficient.
Aiming at the problem that open Lua scripting has no security mechanism,the encrypt and decrypt functions are loaded into dynamic linking library(DLL) using ASE and Sha256 algorithms,the import function within DLL is called in the Lua scripting.It was indicated by testing that the encrypted Lua scripting is more secure than the original one.In addition,the encrypt speed of Lua calling DLL is compared with that of other method,and the results showed that the former is greatly improved in the speed of encrypt.
To understand the encryption and decryption operation of AES,the visualization platform of AES was designed and implementation based on MFC.It shows the transformation of the ciphertext and the key in every stage of AES's encryption process,through reproduction AES's encryption/decryption process we can easily understand the complex iterative process,the document encryption/decryption operations are achieved.
Aiming at the current situation of experiment teaching in distance education,a network virtual eperiment system was designed using the Browser/Server pattern.This system can makes virtual experiment anytime,not only provides condition and technique for teaching reform in experiment course and distance education,but also provides more new and best apparatus for students.
The common quality management framework of medical device industry was structured by using definition and deployment axis methods when YY/T 0287-2003 standard quality attributes are deployed in the CMMI model.This framework is a standard mapping table for the performance of CMMI model and YY/T 0287-2003.The companies can quickly and accurately find out the process areas which are to achieve specific goal,therefore effective methods for deploying the quality management regulations of medical device industry were provided.
In view of the problem of the current target detection and tracking algorithm of real-time and precision,a new mehod based on Gaussian mixture model was put forward that it uses difference method to detect the target,by detecting the target position and color features and using improved Hough transform to detect target shape,finds a match with the target trajectory so as to achieve the goal accurate tracking.The experimental results showed that the method has higher detection accuracy and tracking efficiency and can meet the needs of intelligent monitoring system in real-time.
To resolve the problem of low stereo matching accuracy of current phase stereo matching algorithm,a matching method based on the combination of Gray code and phase-shift was put forward.The method used Ostu algorithm to gain the optimal segmentation threshold,and the accuracy segmentation of the Gray code image was carried out.The Gaussian filter was presented to filter the sine grating image,and the high precision phase could be obtained by combining with the Gray code.The object measuring experiment results indicated that this method can improve the matching accuracy and obtain the better measuring result.
Aiming at the proplem that the representability of each feature point needs 128-dimensional vector will reduce efficiency of SIFT algorithm,an improved SIFT algorithm was proposed which uses circle structure to substitute the original square structure and at the same time decrease the original dimension of SIFT algorithm characteristics description from 128 to 48.The experimental results showed that the method has faster speed of computation and higher precision of matching.
In order to reduce the deficiencies of texture in the procession of 3D face reconstruction,a 3D face reconstruction approach based on skin color model was proposed.First,this method uses the improved ASM to get facial feature and obtains the depth 3D geometric information by planar projection and liner combination and achieves a specific face model by using TPS algorithm.Then,it converts RGB space to YUV and YIQ space in order to judge which feature point was shin color point.The skin color point was effectively located in skin color area through rectifing side angle feature points.Finally,texture mapping after correction was made according to shin color points.The experiment results showed that this approach could realize high realistic 3D face reconstruction only by using single not absolutely positive pictures,and improve texture missing.
Aiming at the problem that the existing texture recognition algorithm was insufficient to strong shearing and smearing attack,a novel texture recognition algorithm was proposed by non-negative matrix factorization(NMF) and invariant moments.Firstly,non-negative matrix factorization(NMF) was used to translate the training texture samples matrix V into the base matrix W and the corresponding coefficient matrix H,meanwhile,the corresponding coefficient matrix H was stored.Then,invariant moments of matrix W was calculated as feature vector.For shearing and cropping training samples image,matrix W could be restored by matrix V and corresponding matrix H of the existing non-shearing image.Then,invariant moments of matrix W was calculated as feature vector.Finally,K nearest neighbor classifier was used to classify the extracted feature vector.The experimental results showed that the proposed method has more strong robust for shearing and smearing texture images,and the correct classification results(CCPS) was 100%.Meanwhile,the CCPS was about 85% for texture image attacked by impulse noise.
Aiming at the problem that data mining prediction model can only make simplex forecast and not respond to the accuracy of forecast analysis,in order to forecast future trends,a feedback predictive model was put forward based on combined correlation model and LMS regression model,and minimum mean square algorithm was used to verify accuracy of the model.The simulation results showed that this model has high accuracy in prediction for mid and long-term
To solve the problem that current handoff algorithm is not taken into account a variety of properties and prone to ping-pong effect, an algorithm of 3G-WLAN vertical handoff based on the cost function was proposed.This algorithm adopts for the thought of evaluating access network based on cost functions and according to the features of network to analyze the parameters of network and normalized them,so it can handoff decision adaptively and realize the handoff sentence adaptively to the mobile node.The results showed that the algorithm can effectively decrease unnecessary handoff and improve adaptablity of heterogeneous network.
At present,the binary tree algorithm has more time delay and more redundant data.A kind of single index based on SI algorithm was presented.The algorithm sends only one collision bit index value when the reader pages.The label received the index value after decoding and obtained collision location.The simulation results showed that SI anti-collision algorithm is better than other binary tree algorithm in transmission delay and data redundancy,and more suitable for the number of label more occasions.
In response to the low degree of intelligence of traditional household lighting control mode,the intelligent night light was designed by using CC2530 single-chip microcomputer as control core,using active infrared technology to detect the human body,interfacing ZigBee wireless network based on the signal transmission of relay modules and voltage module.This intelligent night light will make it possible that night light will be on only in needed time and places according to the lamp brightness,in order to achieve engery saving through the application of intelligent control system.
The existing hospital ward call system is mostly installed in the form of wire.It's complex and expensive,and in the practical application the reliability of alarm information transmission is not guaranteed.To solve the above problems,a wireless call system which is based on ZigBee technology was put forward.It uses SOC CC2430 chip produced by TI company of the United States to complete the hardware design of nurse station controller,ward pager and portable transponder.The Z-Stack protocal and IAR Embedded Workbench is used as development tools to saftware designing.Finally,through the experimental test,it showed that the system is easy to install and expand,low cost,high reliability,and it can effectively replace the existing wired call system.
In order to deal with the problem that the degree of automation of monitoring system for non-attended substation is low and the real time quality is poor,an abnormal target automatic tracking system based on TMS320C6416 operational processor was developed.An original direction discrimination and velocity prediction algorithm were designed on software in order to detect the parameters of moving object and then to control camera to track the abnormal moving target.The hardware of this system was based on embedded technology so that it could realize the integration of camera,PTZ and controller.The result of field trials showed that the system had a good tracking performance and stability.
A μC/OS operating system design method based on intelligent wireless sensor network(WSN) node was proposed,using CC430 single-chip microcontroller as the core node hardware,transplanting μC/OS core to the single-chip microcomputer.The experiment results showed that core can greatly simplify application design.Nodes realize collecting,coding,calling,linking,receiving,sending and other functions under the premise of ensuring the realization of a low-cost,and improve the network flexibility and reliability of the sensor nodes.
Because of the spectrum leakage and transient effects of BPSK demodulation technology,in order to improve the communication system of anti-interference capability,aiming at direct sequence spread spectrum communication system interference,BPSK modulation and demodulation techniques were optimizated using Shannon formula and the improved DFT(RT-DFT) algorithm.From the RT-DFT algorithms optimized mathematical model of the BPSK modulation and demodulation technology,anti-interference feasibility of the theory was analyzed.Simulation analysis proved that the algorithm was effective after the demodulation of BPSK narrowband interference suppression and improved error performance and enhance anti-interference ability.
A random phased multitone jamming model was presented and the performance of multitone jamming suppression in OFDM was analyzed.In the OFDM system of the coherent demodulation,BER and signal to interference ratio followed the reverse linear decline of relationship in multitone interference with random phase.And the performance of convolutional encoding and diversity combining was analyzed. Both theoretical expressions and simulations showed that though multitone jamming is harmful to OFDM,diversity and convolutional encoding can suppress the jamming effectively.
Based on the background of network convergence,the construction scheme of He′nan Unicom IPTV was put forward.Hierarchical business platforms consisting of provincial nodes,local nodes and marginal nodes were built.Bearing network from the layers of backbone network,metropolitan-area networks and access network separately were desinged,deploying and routing of broadcasting service was made through multicast and video-on-demand through unicast.IPoE was used for authentication and accounting.This scheme can provide technical support for accelerating IPTV system platforms establishment and meet the needs of operator networks' IPTV business development.
Based on the idea of the separation of the phone number and the switch,the intelligent user database new severer is introduced into the existing fixed telephone network to save the information of the customer,and by the extended ISUP protocol and the extended MAP protocol,the information exchange is implemented between the switch or the soft switch device and SHLP.The fixed telephone network intelligence method was proposed for Zhoukou city.In this method,SS/SSP and SDC are used,SG and SS/SSP are put together,and SS can access SDC.This is helpful to support flexible tariff policy and activate the telephone number resources to the whole network,and lay the foundation for next-generation network convergence.
Founded in 1986, bimonthly
Administered by:The Education Department Henan Province
Sponsored by:Zhengzhou University of Light Industry
Editor-in-chief:Wei Shizhong
Executive Editor-in-Chief:Zou Lin
Deputy Editor-in-Chief:Qu Shuanghong
Edited & published by:Editorial Department of Journal of Light Industry
CN 41-1437/TS
ISSN 2096-1553
Address:136 Science Avenue, Zhengzhou City, Henan Province, China
Postal Code:450001
Tel:(086)0371-86608635
(086)0371-86608633