期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
智能制造中RFID多标签快速识别问题的研究 被引量:2
1
作者 王涛 王琪 +2 位作者 张如伟 马义飞 裴翦 《计算机测量与控制》 2019年第4期163-166,共4页
工业现场多标签的快速识别问题一直是RFID技术实用领域亟待解决的问题;在分析现有的各种RFID防碰撞算法特点的基础上,提出了一种适用于多标签快速识别的改进型算法;该算法在正式进行标签识别前先统计标签ID中数字"1"的总位数... 工业现场多标签的快速识别问题一直是RFID技术实用领域亟待解决的问题;在分析现有的各种RFID防碰撞算法特点的基础上,提出了一种适用于多标签快速识别的改进型算法;该算法在正式进行标签识别前先统计标签ID中数字"1"的总位数,并将该统计值作为分组编号对待识别标签进行分组识别,有效地减少了标签数据碰撞发生的可能性;此外,该算法中新的查询前缀是根据首位碰撞位生成,有效避免了空搜索的存在,一定程度上减少了系统识别效率受标签ID长度的影响;最后,该算法中只将标签ID中与搜索前缀相匹配之后的数据返回给阅读器,有效减少了系统通信量;仿真结果表明,该算法性能稳定,吞吐率可达65%,可以有效应用在工业现场,实现多标签的快速读取。 展开更多
关键词 RFID防碰撞 查询树算法 搜索前缀 首位碰撞位
下载PDF
A Fast and Memory-Efficient Approach to NDN Name Lookup 被引量:4
2
作者 Dacheng He Dafang Zhang +2 位作者 Ke Xu Kun Huang Yanbiao Li 《China Communications》 SCIE CSCD 2017年第10期61-69,共9页
For name-based routing/switching in NDN, the key challenges are to manage large-scale forwarding Tables, to lookup long names of variable lengths, and to deal with frequent updates. Hashing associated with proper leng... For name-based routing/switching in NDN, the key challenges are to manage large-scale forwarding Tables, to lookup long names of variable lengths, and to deal with frequent updates. Hashing associated with proper length-detecting is a straightforward yet efficient solution. Binary search strategy can reduce the number of required hash detecting in the worst case. However, to assure the searching path correct in such a schema, either backtrack searching or redundantly storing some prefixes is required, leading to performance or memory issues as a result. In this paper, we make a deep study on the binary search, and propose a novel mechanism to ensure correct searching path without neither additional backtrack costs nor redundant memory consumptions. Along any binary search path, a bloom filter is employed at each branching point to verify whether a said prefix is present, instead of storing that prefix here. By this means, we can gain significantly optimization on memory efficiency, at the cost of bloom checking before each detecting. Our evaluation experiments on both real-world and randomly synthesized data sets demonstrate our superiorities clearly 展开更多
关键词 named data networking binary search of hash table bloom filter
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部