期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
An Improved Binary Search Anti-Collision Protocol for RFID Tag Identification 被引量:2
1
作者 Guozhong Dong Weizhe Zhang +2 位作者 Sichang Xuan Feng Qin Haowen Tan 《Computers, Materials & Continua》 SCIE EI 2020年第11期1855-1868,共14页
Radio frequency identification(RFID)has been widespread used in massive items tagged domains.However,tag collision increases both time and energy consumption of RFID network.Tag collision can seriously affect the succ... Radio frequency identification(RFID)has been widespread used in massive items tagged domains.However,tag collision increases both time and energy consumption of RFID network.Tag collision can seriously affect the success of tag identification.An efficient anti-collision protocol is very crucially in RFID system.In this paper,an improved binary search anti-collision protocol namely BRTP is proposed to cope with the tag collision concern,which introduces a Bi-response mechanism.In Bi-response mechanism,two groups of tags allowed to reply to the reader in the same slot.According to Bi-response mechanism,the BRTP strengthens the tag identification of RFID network by reducing the total number of queries and exchanged messages between the reader and tags.Both theoretical analysis and numerical results verify the effectiveness of the proposed BRTP in various performance metrics including the number of total slots,system efficiency,communication complexity and total identification time.The BRTP is suitable to be applied in passive RFID systems. 展开更多
关键词 RFID ANTI-COLLISION binary search Bi-response mechanism
下载PDF
Watermark Embedding for Direct Binary Searched Halftone Images by Adopting Visual Cryptography
2
作者 Yangyang Wang Rongrong Ni +1 位作者 Yao Zhao Min Xian 《Computers, Materials & Continua》 SCIE EI 2018年第5期255-265,共11页
In this paper,two methods are proposed to embed visual watermark into direct binary search(DBS)halftone images,which are called Adjusted Direct Binary Search(ADBS)and Dual Adjusted Direct Binary Search(DADBS).DADBS is... In this paper,two methods are proposed to embed visual watermark into direct binary search(DBS)halftone images,which are called Adjusted Direct Binary Search(ADBS)and Dual Adjusted Direct Binary Search(DADBS).DADBS is an improved version of ADBS.By using the proposed methods,the visual watermark will be embedded into two halftone images separately,thus,the watermark can be revealed when these two halftone images are overlaid.Experimental results show that both methods can achieve excellent image visual quality and decoded visual patterns. 展开更多
关键词 Data hiding HALFTONE direct binary search visual watermark.
下载PDF
Limiting theorems for the nodes in binary search trees 被引量:1
3
作者 LIU Jie SU Chun CHEN Yu 《Science China Mathematics》 SCIE 2008年第1期101-114,共14页
We consider three random variables X_n, Y_n and Z_n, which represent the numbers of the nodes with 0, 1, and 2 children, in the binary search trees of size n. The expectation and variance of the three above random var... We consider three random variables X_n, Y_n and Z_n, which represent the numbers of the nodes with 0, 1, and 2 children, in the binary search trees of size n. The expectation and variance of the three above random variables are got, and it is also shown that X_n, Y_n and Z_n are all asymptotically normal as n→∞by applying the contraction method. 展开更多
关键词 binary search tree NODES law of large numbers contraction method limiting distribution 60F05 05C80
原文传递
Blocking optimized SIMD tree search on modern processors 被引量:2
4
作者 张倬 陆宇凡 +2 位作者 沈文枫 徐炜民 郑衍衡 《Journal of Shanghai University(English Edition)》 CAS 2011年第5期437-444,共8页
Tree search is a widely used fundamental algorithm. Modern processors provide tremendous computing power by integrating multiple cores, each with a vector processing unit. This paper reviews some studies on exploiting... Tree search is a widely used fundamental algorithm. Modern processors provide tremendous computing power by integrating multiple cores, each with a vector processing unit. This paper reviews some studies on exploiting single instruction multiple date (SIMD) capacity of processors to improve the performance of tree search, and proposes several improvement methods on reported SIMD tree search algorithms. Based on blocking tree structure, blocking for memory alignment and dynamic blocking prefetch are proposed to optimize the overhead of memory access. Furthermore, as a way of non-linear loop unrolling, the search branch unwinding shows that the number of branches can exceed the data width of SIMD instructions in the SIMD search algorithm. The experiments suggest that blocking optimized SIMD tree search algorithm can achieve 1.6 times response speed faster than the un-optimized algorithm. 展开更多
关键词 single instruction multiple date (SIMD) tree search binary search streaming SIMD extensions (SSE) Cell broadband engine (BE)
下载PDF
A Physical Layer Network Coding Based Tag Anti-Collision Algorithm for RFID System 被引量:3
5
作者 Cuixiang Wang Xing Shao +1 位作者 Yifan Meng Jun Gao 《Computers, Materials & Continua》 SCIE EI 2021年第1期931-945,共15页
In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,w... In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,which results in a collision and leads to the degrading of tags identifying efficiency.To improve the multiple tags’identifying efficiency due to collision,a physical layer network coding based binary search tree algorithm(PNBA)is proposed in this paper.PNBA pushes the conflicting signal information of multiple tags into a stack,which is discarded by the traditional anti-collision algorithm.In addition,physical layer network coding is exploited by PNBA to obtain unread tag information through the decoding operation of physical layer network coding using the conflicting information in the stack.Therefore,PNBA reduces the number of interactions between reader and tags,and improves the tags identification efficiency.Theoretical analysis and simulation results using MATLAB demonstrate that PNBA reduces the number of readings,and improve RFID identification efficiency.Especially,when the number of tags to be identified is 100,the average needed reading number of PNBA is 83%lower than the basic binary search tree algorithm,43%lower than reverse binary search tree algorithm,and its reading efficiency reaches 0.93. 展开更多
关键词 Radio frequency identification(RFID) tag anti-collision algorithm physical layer network coding binary search tree algorithm
下载PDF
FAST IMPLEMENTATION OF ORTHOGONAL EMPIRICAL MODE DECOMPOSITION AND ITS APPLIGA-TION INTO HARMONIC DETECTION 被引量:2
6
作者 QIN Yi QIN Shuren MAO Yongfang 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2008年第2期93-98,共6页
Since the empirical mode decomposition (EMD) lacks strict orthogonality, the method of orthogonal empirical mode decomposition (OEMD) is innovationally proposed. The primary thought of this method is to obtain the... Since the empirical mode decomposition (EMD) lacks strict orthogonality, the method of orthogonal empirical mode decomposition (OEMD) is innovationally proposed. The primary thought of this method is to obtain the intrinsic mode function (IMF) and the residual function by auto-adaptive band-pass filtering. OEMD is proved to preserve strict orthogonality and completeness theoretically, and the orthogonal basis function of OEMD is generated, then an algorithm to implement OEMD fast, IMF binary searching algorithm is built based on the point that the analytical band-pass filtering preserves perfect band-pass feature in the frequency domain. The application into harmonic detection shows that OEMD successfully conquers mode aliasing, avoids the occurrence of false mode, and is featured by fast computing speed. Furthermore, it can achieve harmonic detection accurately combined with the least square method. 展开更多
关键词 Empirical mode decomposition Orthogonal empirical mode decomposition Analytic band-pass filtering binary searching Harmonic detection
下载PDF
Gravity-based heuristic for set covering problems and its application in fault diagnosis 被引量:2
7
作者 Yun Li Zhiming Cai 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2012年第3期391-398,共8页
A novel algorithm named randomized binary gravita- tional search (RBGS) algorithm is proposed for the set covering problem (SCP). It differs from previous SCP approaches because it does not work directly on the SC... A novel algorithm named randomized binary gravita- tional search (RBGS) algorithm is proposed for the set covering problem (SCP). It differs from previous SCP approaches because it does not work directly on the SCP matrix. In the proposed algo- rithm, the solution of SCP is viewed as multi-dimension position of objects in the binary search space. All objects in the space attract each other by the gravity force, and this force causes a global movement of all objects towards the objects with heavier masses which correspond to good solutions. Computation results show that the proposed algorithm is very competitive. In addition, the proposed aigodthm is extended for SCP to solve the fault diagno- sis problem in graph-based systems. 展开更多
关键词 set covering problem (SCP) gravity force binary search space fault diagnosis.
下载PDF
A Fast and Memory-Efficient Approach to NDN Name Lookup 被引量:4
8
作者 Dacheng He Dafang Zhang +2 位作者 Ke Xu Kun Huang Yanbiao Li 《China Communications》 SCIE CSCD 2017年第10期61-69,共9页
For name-based routing/switching in NDN, the key challenges are to manage large-scale forwarding Tables, to lookup long names of variable lengths, and to deal with frequent updates. Hashing associated with proper leng... For name-based routing/switching in NDN, the key challenges are to manage large-scale forwarding Tables, to lookup long names of variable lengths, and to deal with frequent updates. Hashing associated with proper length-detecting is a straightforward yet efficient solution. Binary search strategy can reduce the number of required hash detecting in the worst case. However, to assure the searching path correct in such a schema, either backtrack searching or redundantly storing some prefixes is required, leading to performance or memory issues as a result. In this paper, we make a deep study on the binary search, and propose a novel mechanism to ensure correct searching path without neither additional backtrack costs nor redundant memory consumptions. Along any binary search path, a bloom filter is employed at each branching point to verify whether a said prefix is present, instead of storing that prefix here. By this means, we can gain significantly optimization on memory efficiency, at the cost of bloom checking before each detecting. Our evaluation experiments on both real-world and randomly synthesized data sets demonstrate our superiorities clearly 展开更多
关键词 named data networking binary search of hash table bloom filter
下载PDF
Data Hiding in AMBTC Images Using Selective XOR Hiding Scheme
9
作者 Yung-Yao Chen Yu-Chen Hu +1 位作者 Ting-Kai Yang You-An Wang 《Computers, Materials & Continua》 SCIE EI 2022年第6期5167-5182,共16页
Nowadays since the Internet is ubiquitous,the frequency of data transfer through the public network is increasing.Hiding secure data in these transmitted data has emerged broad security issue,such as authentication an... Nowadays since the Internet is ubiquitous,the frequency of data transfer through the public network is increasing.Hiding secure data in these transmitted data has emerged broad security issue,such as authentication and copyright protection.On the other hand,considering the transmission efficiency issue,image transmission usually involves image compression in Internet-based applications.To address both issues,this paper presents a data hiding scheme for the image compression method called absolute moment block truncation coding(AMBTC).First,an image is divided into nonoverlapping blocks through AMBTC compression,the blocks are classified four types,namely smooth,semi-smooth,semi-complex,and complex.The secret data are embedded into the smooth blocks by using a simple replacement strategy.The proposed method respectively embeds nine bits(and five bits)of secret data into the bitmap of the semi-smooth blocks(and semicomplex blocks)through the exclusive-or(XOR)operation.The secret data are embedded into the complex blocks by using a hidden function.After the embedding phase,the direct binary search(DBS)method is performed to improve the image qualitywithout damaging the secret data.The experimental results demonstrate that the proposed method yields higher quality and hiding capacity than other reference methods. 展开更多
关键词 Content protection technology security for image data absolute moment block truncation coding(AMBTC) direct binary search(DBS)
下载PDF
Optimal Allocation of a Hybrid Wind Energy-Fuel Cell System Using Different Optimization Techniques in the Egyptian Distribution Network
10
作者 Adel A. Abou El-Ela Sohir M. Allam Nermine K. Shehata 《Energy and Power Engineering》 2021年第1期17-40,共24页
This paper presents an optimal proposed allocating procedure for hybrid wind energy combined with proton exchange membrane fuel cell (WE/PEMFC) system to improve the operation performance of the electrical distributio... This paper presents an optimal proposed allocating procedure for hybrid wind energy combined with proton exchange membrane fuel cell (WE/PEMFC) system to improve the operation performance of the electrical distribution system (EDS). Egypt has an excellent wind regime with wind speeds of about 10 m/s at many areas. The disadvantage of wind energy is its seasonal variations. So, if wind power is to supply a significant portion of the demand, either backup power or electrical energy storage (EES) system is needed to ensure that loads will be supplied in reliable way. So, the hybrid WE/PEMFC system is designed to completely supply a part of the Egyptian distribution system, in attempt to isolate it from the grid. However, the optimal allocation of the hybrid units is obtained, in order to enhance their benefits in the distribution networks. The critical buses that are necessary to install the hybrid WE/ PEMFC system, are chosen using sensitivity analysis. Then, the binary Crow search algorithm (BCSA), discrete Jaya algorithm (DJA) and binary particle swarm optimization (BPSO) techniques are proposed to determine the optimal operation of power systems using single and multi-objective functions (SOF/MOF). Then, the results of the three optimization techniques are compared with each other. Three sensitivity factors are employed in this paper, which are voltage sensitivity factor (VSF), active losses sensitivity factor (ALSF) and reactive losses sensitivity factor (RLSF). The effects of the sensitivity factors (SFs) on the SOF/MOF are studied. The improvement of voltage profile and minimizing active and reactive power losses of the EDS are considered as objective functions. Backward/forward sweep (BFS) method is used for the load flow calculations. The system load demand is predicted up to year 2022 for Mersi-Matrouh City as a part of Egyptian distribution network, and the design of the hybrid WE/PEMFC system is applied. The PEMFC system is designed considering simplified mathematical expressions. The economics of operation of both WE and PEMFC system are also presented. The results prove the capability of the proposed procedure to find the optimal allocation for the hybrid WE/PEMFC system to improve the system voltage profile and to minimize both active and reactive power losses for the EDS of Mersi-Matrough City. 展开更多
关键词 Wind Energy System Proton Exchange Membrane Fuel Cell binary Crow search Algorithm Discrete Jaya Algorithm binary Particle Swarm Optimization Technique
下载PDF
A high-precision synchronization circuit for clock distribution
11
作者 路崇 谭洪舟 +1 位作者 段志奎 丁一 《Journal of Semiconductors》 EI CAS CSCD 2015年第10期108-116,共9页
In this paper, a novel structure of a high-precision synchronization circuit, HPSC, using interleaved delay units and a dynamic compensation circuit is proposed. HPSCs are designed for synchronization of clock distrib... In this paper, a novel structure of a high-precision synchronization circuit, HPSC, using interleaved delay units and a dynamic compensation circuit is proposed. HPSCs are designed for synchronization of clock distribution networks in large-scale integrated circuits, where high-quality clocks are required. The application of a hybrid structure of a coarse delay line and dynamic compensation circuit performs roughly the alignment of the clock signal in two clock cycles, and finishes the fine tuning in the next three clock cycles with the phase error suppressed under 3.8 ps. The proposed circuit is implemented and fabricated using a SMIC 0.13 μm 1P6M process with a supply voltage at 1.2 V. The allowed operation frequency ranges from 200 to 800 MHz, and the duty cycle ranges between [20%, 80%]. The active area of the core circuits is 245 × 134 μm2, and the power consumption is 1.64 mW at 500 MHz. 展开更多
关键词 HPSC clock synchronization circuit SMD dynamic compensation circuit binary search interleaveddelay units
原文传递
Concurrent Manipulation of Expanded AVL Trees
12
作者 章寅 许卓群 《Journal of Computer Science & Technology》 SCIE EI CSCD 1998年第4期325-336,共12页
The concurrent manipulation of an expanded AVL tree (EAVL tree) is considered in this paper. The presented system can support any number of concurrent processes which perform searching, insertion and deletion on the t... The concurrent manipulation of an expanded AVL tree (EAVL tree) is considered in this paper. The presented system can support any number of concurrent processes which perform searching, insertion and deletion on the tree. Simulation results indicate the high performance of the system. Elaborate techniques are used to achieve such a system unawilable based on any known algorithms. Methods developed in this paper may provide new insights into other problems in the area of concurrent search structure manipulation. 展开更多
关键词 AVL tree data structure binary search tree concurrent algorithm concurrency control locking protocol
原文传递
Inverse Generalized Minimum Cost Flow Problem Under the Hamming Distances
13
作者 Mobarakeh Karimi Massoud Aman Ardeshir Dolati 《Journal of the Operations Research Society of China》 EI CSCD 2019年第2期355-364,共10页
Given a generalized minimum cost flow problem,the corresponding inverse problem is to find a minimal adjustment of the cost function so that the given generalized flow becomes optimal to the problem.In this paper,we c... Given a generalized minimum cost flow problem,the corresponding inverse problem is to find a minimal adjustment of the cost function so that the given generalized flow becomes optimal to the problem.In this paper,we consider both types of the weighted Hamming distances for measuring the adjustment.In the sum-type case,it is shown that the inverse problem is APX-hard.In the bottleneck-type case,we present a polynomial time algorithm. 展开更多
关键词 Generalized minimum cost flow Inverse problem Hamming distance binary search
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部