JOURNAL OF LIGHT INDUSTRY

CN 41-1437/TS  ISSN 2096-1553

2011 Vol. 26, No. 6

Display Method:          |     

RFID security authentication protocol based on the dynamic refresh ID
ZHANG Su-zhi, WANG Zhao-hui, SUN Pei-feng
2011, 26(6) :1-4. doi: 10.3969/j.issn.1004-1478.2011.06.001
Abstract:
Security of the low-cost RFID system protocol was not high.A security mutual authentication protocol DRHA was proposed which based on unidirectional Hash function,pseudo-random number generator and dynamic refersh ID.DRHA solves the problem of synchronous of server and labels through saving each label of the new and old identify groups of server.Security analysis showed that the protocol can resist common attacks,and has high safety and practicality.
Design and implementation of personal Windows firewall based on SPI
CAI Zeng-yu, CHEN Zhi-hao, LIU Shu-ru, GAN Yong
2011, 26(6) :5-8. doi: 10.3969/j.issn.1004-1478.2011.06.002
Abstract:
In view of the problem that the current platform based on the Windows personal firewall can not control according to the application program and lack of business firewall contrast,one kind personal Windows firewall based on the SPI was proposed.The firewall uses Winsock2 SPI programming technology,the system module adopts the dynamic link library,global variable interface and interface functions,and realizes data monitoring,log management,management rules and system monitoring and other functions.The experimental results showed that the firewall had good performance and achieved the basic function of the personal firewall.It can guarantee the network safety of personal computer.
Identity-based multi-party key agreement scheme
ZHANG Wei, WU Jian
2011, 26(6) :9-11. doi: 10.3969/j.issn.1004-1478.2011.06.003
Abstract:
Identity-based key agreement schemes are mostly oriented two-party or three at present.It cannot satisfy the needs of modern communication about multiple party at the same time.An identity-based multi-party key agreement scheme was proposed which can mutually authenticate by using the digital signature to increase communication entity authentication.Analysis showed that the scheme is not required by pairing computation,has high efficiency and safety.
Simulation study of transmission of vedio data streams through wireless area network based on PSNR
LIU Shu-ru, CAI Zeng-yu, GAN Yong, NIE Nan
2011, 26(6) :12-15. doi: 10.3969/j.issn.1004-1478.2011.06.004
Abstract:
In view of the low bandwidth,the high error rate and the high delay of wireless networks,simulation model in NS2 was established.The simulation analysis of the different packet error rate,the compression quantisation parameter,the length of GOP and packet for image quality based on the PSNR evaluation method respectively were carried out.The result of the simulation analysis provides the beneficial reference for the wireless network more effectively in vedio data transmission.
A novel algorithm of dynamic minimum contention window adjustment for 802.11 DCF
WANG Ming-chao
2011, 26(6) :16-19. doi: 10.3969/j.issn.1004-1478.2011.06.005
Abstract:
In order to improve the performance of IEEE 802.11 DCF,based on the existing protocol S-DCF,through the improvement of optimal transmission probability of τ,a new approach based on minimum contention window-based channed access mechanism was proposed.The algorithm can optimize performance of wireless network through the dynamic adjustment of the contention Window double and reset the probability according to network size.The mathematical modeling and theoretical analysis were carried out using Markov chain PPT-DCF.The results showed that when the network size varies,PPT-DCF performance has more better than the S-DCF does.
GAHP-based assessment of emergency response agencies
JIN Bao-hua, ZHAO Li-hui, LI Jin-xu, LIN Qing
2011, 26(6) :20-23. doi: 10.3969/j.issn.1004-1478.2011.06.006
Abstract:
Aiming at the problem that many influence factors have uncertainty in the process of assessing emergency response agencies,GAHP method was applied to emergency response agencies assessment model.AHP was used to quantity evaluating indicator first,then GST was used to establish sample matrix of assessment,and assessment conclusions were obtained.An example verified the practicality and effectiveness of this method.
Research on adaptive strategy for pervasive computing middleware
GUO Yan-hui
2011, 26(6) :24-27. doi: 10.3969/j.issn.1004-1478.2011.06.007
Abstract:
To solve the ignorance of service quality of adaptive middleware platform,an kind of adaptive strategy suitable for pervasive computing middleware was put forword.In the strategy QoS feature is added,service contract concept is introduced and genetic algorithm is used to solve optimizoction problem.Thus better adaptive effect has been achieved.
A data interactive method of Android cell phone and database
WANG Shao-xiang, SHAO Yu-bin, LONG Hua, XIA Teng-fei
2011, 26(6) :28-30. doi: 10.3969/j.issn.1004-1478.2011.06.008
Abstract:
In view of the communication interface of Android mobile phone and server,a solution for mobile phone terminal and the database data interaction was put forward.The data of method access uses database mode.The server use tomcat through the JSP file to achieve access to the database.Using API which is provided by Google and Sun,with HTTP GET and POST mobile phone terminal access to tomcat is realized.The test results showed that according to the stored data size and security selecting suitable database can be chosen,and interactive parsing capabilities of Android platform and database data can be extended.
Automatic generation of object-oriented test case based on GATS algorithm
WANG Qian, ZHANG Jin-hua
2011, 26(6) :31-34. doi: 10.3969/j.issn.1004-1478.2011.06.009
Abstract:
Based on genetic algorithm and introducing tabu search algorithm,a method which is test cases automatically generating for an object-oriented class was proposed.The method designs a new code of class object and constructs the fitness function for the test cases automatically generating of class objects required. Each test case in the local area finds the optimal value again, therefore the ability of search for the best value of overall algorithm was improved.The experiment results showed that by this algorithm,the combination of optimization of genetic groups and tabu search strong climbing ability quickly realized the global optimization and generate high-quality test cases.
Research and design of heuristic attribute reduction algorithm
YANG Fan
2011, 26(6) :35-37. doi: 10.3969/j.issn.1004-1478.2011.06.010
Abstract:
Based on the attribute reduction of rough set, a new algorithm was proposed with two ways.By using binary discernibility matrix,attribute reduction set in the first step could be contributed.Then using recognizable matrix and its important attribute to get attribute reduction in the mean time this reduction is checking whether it is contained by the reduction set in the first step,so as to judge if this reduction set belongs to the feasible one.It's a kind of intuitionistic and effective attribute reduction algorithm with the demonstration of theoretical analysis and experiment.
Collaborative application of multiple integrated development environments to programming language experiment
ZHENG Yuan-pan, SU Xiao-ke, JIN Zhao
2011, 26(6) :38-41. doi: 10.3969/j.issn.1004-1478.2011.06.011
Abstract:
In order to enhance effect of programming language experiments,influence of four kinds of integrated development environments(IDE),i.e.Visual C++ 6.0,Turbo C++ 3.0,Borland C++ 3.1 and Turbo C 2.0 on C language experiments was studied with the methods of characteristics analysis and case-based comparison. The collaborative application of integrated development environment on programming language experiment was put forward.Research suggested that collaborative application of multiple IDEs is necessary,applicable and high-efficient.
Research of Lua scripting encrypt and decrypt
JIANG Bo, ZHANG Zhi-bin, LI Guo, YAO Wen-wei
2011, 26(6) :42-45. doi: 10.3969/j.issn.1004-1478.2011.06.012
Abstract:
Aiming at the problem that open Lua scripting has no security mechanism,the encrypt and decrypt functions are loaded into dynamic linking library(DLL) using ASE and Sha256 algorithms,the import function within DLL is called in the Lua scripting.It was indicated by testing that the encrypted Lua scripting is more secure than the original one.In addition,the encrypt speed of Lua calling DLL is compared with that of other method,and the results showed that the former is greatly improved in the speed of encrypt.
Design and implementation of AES's visualization platform based on MFC
QIAO Zi-rui, ZHOU Yan-wei
2011, 26(6) :46-51. doi: 10.3969/j.issn.1004-1478.2011.06.013
Abstract:
To understand the encryption and decryption operation of AES,the visualization platform of AES was designed and implementation based on MFC.It shows the transformation of the ciphertext and the key in every stage of AES's encryption process,through reproduction AES's encryption/decryption process we can easily understand the complex iterative process,the document encryption/decryption operations are achieved.
The system design of network virtual experiment in distance education
YANG Cai-lin
2011, 26(6) :52-54. doi: 10.3969/j.issn.1004-1478.2011.06.014
Abstract:
Aiming at the current situation of experiment teaching in distance education,a network virtual eperiment system was designed using the Browser/Server pattern.This system can makes virtual experiment anytime,not only provides condition and technique for teaching reform in experiment course and distance education,but also provides more new and best apparatus for students.
Study on integrating of pharmaceutical industry standard YY/T 0287-2003 and CMMI
WU Yu-hui, WANG Hai-tao
2011, 26(6) :55-59. doi: 10.3969/j.issn.1004-1478.2011.06.015
Abstract:
The common quality management framework of medical device industry was structured by using definition and deployment axis methods when YY/T 0287-2003 standard quality attributes are deployed in the CMMI model.This framework is a standard mapping table for the performance of CMMI model and YY/T 0287-2003.The companies can quickly and accurately find out the process areas which are to achieve specific goal,therefore effective methods for deploying the quality management regulations of medical device industry were provided.
A new algorithm of target detection and tracking
HUANG Min, CHEN Gang, YANG Guo-feng
2011, 26(6) :60-63. doi: 10.3969/j.issn.1004-1478.2011.06.016
Abstract:
In view of the problem of the current target detection and tracking algorithm of real-time and precision,a new mehod based on Gaussian mixture model was put forward that it uses difference method to detect the target,by detecting the target position and color features and using improved Hough transform to detect target shape,finds a match with the target trajectory so as to achieve the goal accurate tracking.The experimental results showed that the method has higher detection accuracy and tracking efficiency and can meet the needs of intelligent monitoring system in real-time.
A method of improving binocular vision stereo matching accuracy
LIN Jun-yi, HUANG Chang-biao, LIU Bin, JIANG Kai-yong
2011, 26(6) :64-66. doi: 10.3969/j.issn.1004-1478.2011.06.017
Abstract:
To resolve the problem of low stereo matching accuracy of current phase stereo matching algorithm,a matching method based on the combination of Gray code and phase-shift was put forward.The method used Ostu algorithm to gain the optimal segmentation threshold,and the accuracy segmentation of the Gray code image was carried out.The Gaussian filter was presented to filter the sine grating image,and the high precision phase could be obtained by combining with the Gray code.The object measuring experiment results indicated that this method can improve the matching accuracy and obtain the better measuring result.
Improvement of image matching algorithm SIFT
YAO Wen-wei, ZHANG Zhi-bin, LI Guo, JIANG Bo
2011, 26(6) :67-70. doi: 10.3969/j.issn.1004-1478.2011.06.018
Abstract:
Aiming at the proplem that the representability of each feature point needs 128-dimensional vector will reduce efficiency of SIFT algorithm,an improved SIFT algorithm was proposed which uses circle structure to substitute the original square structure and at the same time decrease the original dimension of SIFT algorithm characteristics description from 128 to 48.The experimental results showed that the method has faster speed of computation and higher precision of matching.
3D face reconstruction based on skin color model
ZHANG Jin-hua, WANG Qian
2011, 26(6) :71-74. doi: 10.3969/j.issn.1004-1478.2011.06.019
Abstract:
In order to reduce the deficiencies of texture in the procession of 3D face reconstruction,a 3D face reconstruction approach based on skin color model was proposed.First,this method uses the improved ASM to get facial feature and obtains the depth 3D geometric information by planar projection and liner combination and achieves a specific face model by using TPS algorithm.Then,it converts RGB space to YUV and YIQ space in order to judge which feature point was shin color point.The skin color point was effectively located in skin color area through rectifing side angle feature points.Finally,texture mapping after correction was made according to shin color points.The experiment results showed that this approach could realize high realistic 3D face reconstruction only by using single not absolutely positive pictures,and improve texture missing.
A texture recognition algorithm resisting to shearing attack and smearing attack
HE Bing, YUAN Wei
2011, 26(6) :75-79. doi: 10.3969/j.issn.1004-1478.2011.06.020
Abstract:
Aiming at the problem that the existing texture recognition algorithm was insufficient to strong shearing and smearing attack,a novel texture recognition algorithm was proposed by non-negative matrix factorization(NMF) and invariant moments.Firstly,non-negative matrix factorization(NMF) was used to translate the training texture samples matrix V into the base matrix W and the corresponding coefficient matrix H,meanwhile,the corresponding coefficient matrix H was stored.Then,invariant moments of matrix W was calculated as feature vector.For shearing and cropping training samples image,matrix W could be restored by matrix V and corresponding matrix H of the existing non-shearing image.Then,invariant moments of matrix W was calculated as feature vector.Finally,K nearest neighbor classifier was used to classify the extracted feature vector.The experimental results showed that the proposed method has more strong robust for shearing and smearing texture images,and the correct classification results(CCPS) was 100%.Meanwhile,the CCPS was about 85% for texture image attacked by impulse noise.
Feedback prediction analysis of two-way data mining
GAO Li-juan, LIU Yun, ZHAO Ling
2011, 26(6) :80-82. doi: 10.3969/j.issn.1004-1478.2011.06.021
Abstract:
Aiming at the problem that data mining prediction model can only make simplex forecast and not respond to the accuracy of forecast analysis,in order to forecast future trends,a feedback predictive model was put forward based on combined correlation model and LMS regression model,and minimum mean square algorithm was used to verify accuracy of the model.The simulation results showed that this model has high accuracy in prediction for mid and long-term
A vertical handoff algorithm in 3G-WLAN based on cost function
ZHANG Jian-wei, LI Zhao-yang, GUO Peng-fei, WANG Ling-yan
2011, 26(6) :83-87. doi: 10.3969/j.issn.1004-1478.2011.06.022
Abstract:
To solve the problem that current handoff algorithm is not taken into account a variety of properties and prone to ping-pong effect, an algorithm of 3G-WLAN vertical handoff based on the cost function was proposed.This algorithm adopts for the thought of evaluating access network based on cost functions and according to the features of network to analyze the parameters of network and normalized them,so it can handoff decision adaptively and realize the handoff sentence adaptively to the mobile node.The results showed that the algorithm can effectively decrease unnecessary handoff and improve adaptablity of heterogeneous network.
RFID anti-collision algorithm based on single index
LI Xue-qiao, JI Xiao-yu, WANG Jing
2011, 26(6) :88-91. doi: 10.3969/j.issn.1004-1478.2011.06.023
Abstract:
At present,the binary tree algorithm has more time delay and more redundant data.A kind of single index based on SI algorithm was presented.The algorithm sends only one collision bit index value when the reader pages.The label received the index value after decoding and obtained collision location.The simulation results showed that SI anti-collision algorithm is better than other binary tree algorithm in transmission delay and data redundancy,and more suitable for the number of label more occasions.
Design and implementation of intelligent night light based on ZigBee
GAN Yong, JIA Chun-li, ZOU Dong-yao, LIU Xin-xin
2011, 26(6) :92-94. doi: 10.3969/j.issn.1004-1478.2011.06.024
Abstract:
In response to the low degree of intelligence of traditional household lighting control mode,the intelligent night light was designed by using CC2530 single-chip microcomputer as control core,using active infrared technology to detect the human body,interfacing ZigBee wireless network based on the signal transmission of relay modules and voltage module.This intelligent night light will make it possible that night light will be on only in needed time and places according to the lamp brightness,in order to achieve engery saving through the application of intelligent control system.
Research and design of a wireless call system for ward based on ZigBee technology
ZOU Jie, CHEN Sheng-yun
2011, 26(6) :95-98. doi: 10.3969/j.issn.1004-1478.2011.06.025
Abstract:
The existing hospital ward call system is mostly installed in the form of wire.It's complex and expensive,and in the practical application the reliability of alarm information transmission is not guaranteed.To solve the above problems,a wireless call system which is based on ZigBee technology was put forward.It uses SOC CC2430 chip produced by TI company of the United States to complete the hardware design of nurse station controller,ward pager and portable transponder.The Z-Stack protocal and IAR Embedded Workbench is used as development tools to saftware designing.Finally,through the experimental test,it showed that the system is easy to install and expand,low cost,high reliability,and it can effectively replace the existing wired call system.
Design of an automatic tracking system of suspicious object for non-attended substation
CHENG Hua, YANG Wei, LIU Xin-yu
2011, 26(6) :99-102. doi: 10.3969/j.issn.1004-1478.2011.06.026
Abstract:
In order to deal with the problem that the degree of automation of monitoring system for non-attended substation is low and the real time quality is poor,an abnormal target automatic tracking system based on TMS320C6416 operational processor was developed.An original direction discrimination and velocity prediction algorithm were designed on software in order to detect the parameters of moving object and then to control camera to track the abnormal moving target.The hardware of this system was based on embedded technology so that it could realize the integration of camera,PTZ and controller.The result of field trials showed that the system had a good tracking performance and stability.
Design and implementation of the wireless sensor network node based on μC/OS operating system
ZHANG Tao, WANG Zhao-qiang, HE Lei
2011, 26(6) :103-106. doi: 10.3969/j.issn.1004-1478.2011.06.027
Abstract:
A μC/OS operating system design method based on intelligent wireless sensor network(WSN) node was proposed,using CC430 single-chip microcontroller as the core node hardware,transplanting μC/OS core to the single-chip microcomputer.The experiment results showed that core can greatly simplify application design.Nodes realize collecting,coding,calling,linking,receiving,sending and other functions under the premise of ensuring the realization of a low-cost,and improve the network flexibility and reliability of the sensor nodes.
Study on anti-interference of spread-spectrum communications system
LI Da-jun
2011, 26(6) :107-111. doi: 10.3969/j.issn.1004-1478.2011.06.028
Abstract:
Because of the spectrum leakage and transient effects of BPSK demodulation technology,in order to improve the communication system of anti-interference capability,aiming at direct sequence spread spectrum communication system interference,BPSK modulation and demodulation techniques were optimizated using Shannon formula and the improved DFT(RT-DFT) algorithm.From the RT-DFT algorithms optimized mathematical model of the BPSK modulation and demodulation technology,anti-interference feasibility of the theory was analyzed.Simulation analysis proved that the algorithm was effective after the demodulation of BPSK narrowband interference suppression and improved error performance and enhance anti-interference ability.
Performance analysis of multitone jamming suppression in OFDM
LI Ying
2011, 26(6) :112-116. doi: 10.3969/j.issn.1004-1478.2011.06.029
Abstract:
A random phased multitone jamming model was presented and the performance of multitone jamming suppression in OFDM was analyzed.In the OFDM system of the coherent demodulation,BER and signal to interference ratio followed the reverse linear decline of relationship in multitone interference with random phase.And the performance of convolutional encoding and diversity combining was analyzed. Both theoretical expressions and simulations showed that though multitone jamming is harmful to OFDM,diversity and convolutional encoding can suppress the jamming effectively.
The IPTV constrction scheme of Henan Unicom based on the network convergence
HAN Bing-xin, XU Xue-qing
2011, 26(6) :117-120. doi: 10.3969/j.issn.1004-1478.2011.06.030
Abstract:
Based on the background of network convergence,the construction scheme of He′nan Unicom IPTV was put forward.Hierarchical business platforms consisting of provincial nodes,local nodes and marginal nodes were built.Bearing network from the layers of backbone network,metropolitan-area networks and access network separately were desinged,deploying and routing of broadcasting service was made through multicast and video-on-demand through unicast.IPoE was used for authentication and accounting.This scheme can provide technical support for accelerating IPTV system platforms establishment and meet the needs of operator networks' IPTV business development.
Fixed telephone network intelligence design of Zhoukou city
LI Yong-jun, XU Xiao-rong, ZHANG Dong-ming
2011, 26(6) :121-124. doi: 10.3969/j.issn.1004-1478.2011.06.031
Abstract:
Based on the idea of the separation of the phone number and the switch,the intelligent user database new severer is introduced into the existing fixed telephone network to save the information of the customer,and by the extended ISUP protocol and the extended MAP protocol,the information exchange is implemented between the switch or the soft switch device and SHLP.The fixed telephone network intelligence method was proposed for Zhoukou city.In this method,SS/SSP and SDC are used,SG and SS/SSP are put together,and SS can access SDC.This is helpful to support flexible tariff policy and activate the telephone number resources to the whole network,and lay the foundation for next-generation network convergence.
Journal Information

Founded in 1986, bimonthly

Administered by:The Education Department Henan Province

Sponsored by:Zhengzhou University of Light Industry

Editor-in-chief:Wei Shizhong

Executive Editor-in-Chief:Zou Lin

Subeditor:Qu Shuanghong

Edited & published by:Editorial Department of Journal of Light Industry

CN 41-1437/TS

ISSN 2096-1553

Address:136 Science Avenue, Zhengzhou City, Henan Province, China

Postal Code:450001

Tel:(086)0371-86608635
(086)0371-86608633

Email:qgxb@zzuli.edu.cn
qgxb1986@163.com

Download Center
More+