• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liao Guoqiong, Yang Lechuan, Zhang Haiyan, Yang Xianpei. An Offset Addition Vector Coding Strategy for Supporting Path Tracing Query in RFID-Based Supply Chains[J]. Journal of Computer Research and Development, 2020, 57(6): 1323-1334. DOI: 10.7544/issn1000-1239.2020.20190207
Citation: Liao Guoqiong, Yang Lechuan, Zhang Haiyan, Yang Xianpei. An Offset Addition Vector Coding Strategy for Supporting Path Tracing Query in RFID-Based Supply Chains[J]. Journal of Computer Research and Development, 2020, 57(6): 1323-1334. DOI: 10.7544/issn1000-1239.2020.20190207

An Offset Addition Vector Coding Strategy for Supporting Path Tracing Query in RFID-Based Supply Chains

Funds: This work was supported by the National Natural Science Foundation of China (61262009, 61772245), the Key Program of the Natural Science Foundation of Jiangxi Province of China (20151BBG70046), and the Key Project of Science and Technology of Jiangxi Education Department (GJJ160419).
More Information
  • Published Date: May 31, 2020
  • As an important technical support of intelligent Internet of things, radio frequency identification (RFID) technology has been widely used in supply chain tracing and real-time monitoring. In order to improve the tracking and query efficiency of tagged objects in the RFID-based supply chain environment, it is necessary to effectively encode the temporal and spatial data of RFID objects. Considering the characteristics including big volume, the existence of the loop and frequent update of the data in RFID-based supply chains, based on the idea that infinite vectors can be inserted between a pair of vectors, an offset addition vector path coding strategy is proposed. This strategy takes spatiotemporal data nodes as coding objects and assigns a unique pair of vectors to each node by vector addition to achieve uniform coding. At the same time, an optimization strategy is proposed to solve the overflow problem caused by excessive code value, and the correctness of the optimization strategy is proved. The experimental results show that the proposed vector encoding strategy and its optimization strategy can meet the requirements of different types of tracing queries, and have the advantages of fast encoding speed, slow overflow of code value, high update efficiency and can support loop.
  • Related Articles

    [1]Pei Zhongyi, Liu Lin, Wang Chen, Wang Jianmin. An Explainability-Centric Requirements Analysis Framework for Machine Learning Applications[J]. Journal of Computer Research and Development, 2024, 61(4): 983-1002. DOI: 10.7544/issn1000-1239.202220794
    [2]Yin Xiaokang, Lu Bin, Cai Ruijie, Zhu Xiaoya, Yang Qichao, Liu Shengli. Memory Copy Function Identification Technique with Control Flow and Data Flow Analysis[J]. Journal of Computer Research and Development, 2023, 60(2): 326-340. DOI: 10.7544/issn1000-1239.202110990
    [3]Tan Tian, Ma Xiaoxing, Xu Chang, Ma Chunyan, Li Yue. Survey on Java Pointer Analysis[J]. Journal of Computer Research and Development, 2023, 60(2): 274-293. DOI: 10.7544/issn1000-1239.202220901
    [4]Zhu Yi’an, Shi Xianchen, Yao Ye, Li Lian, Ren Pengyuan, Dong Weizhen, Li Jiayu. A WCET Analysis Method for Multi-Core Processors with Multi-Tier Coherence Protocol[J]. Journal of Computer Research and Development, 2023, 60(1): 30-42. DOI: 10.7544/issn1000-1239.202111244
    [5]Zhou Hongbo, Jin Dahai, and Gong Yunzhan. Application of Interval Arithmetic in Software Testing Based on Field-Sensitive Point-to Analysis[J]. Journal of Computer Research and Development, 2012, 49(9): 1852-1862.
    [6]Wang Yawen, Yao Xinhong, Gong Yunzhan, Yang Zhaohong. A Method of Buffer Overflow Detection Based on Static Code Analysis[J]. Journal of Computer Research and Development, 2012, 49(4): 839-845.
    [7]Wang Lei, Chen Gui, and Jin Maozhong. Detection of Code Vulnerabilities via Constraint-Based Analysis and Model Checking[J]. Journal of Computer Research and Development, 2011, 48(9): 1659-1666.
    [8]Han Wei, He Yeping. Static Analysis of TOCTTOU Vulnerabilities in Unix-Style File System[J]. Journal of Computer Research and Development, 2011, 48(8): 1430-1437.
    [9]Ye Pengfei, Peng Xin, and Zhao Wenyun. Recovering the Use Case from Object-Oriented Programs by Static Analysis[J]. Journal of Computer Research and Development, 2010, 47(12).
    [10]Bian Xiaofeng, Zhou Xuehai. Study on Modeling MIPS Processors for Static WCET Analysis[J]. Journal of Computer Research and Development, 2006, 43(10): 1828-1834.
  • Cited by

    Periodical cited type(3)

    1. 黄阳,周旭,杨志邦,余婷,张吉,曾源远,李肯立. 基于缓存的时变道路网最短路径查询算法. 计算机研究与发展. 2022(02): 376-389 . 本站查看
    2. 李永刚. 基于云计算的数据信息加密安全存储仿真研究. 电子设计工程. 2021(11): 132-135 .
    3. 刘铎,杨涓,谭玉娟. 边缘存储的发展现状与挑战. 中兴通讯技术. 2019(03): 15-22 .

    Other cited types(7)

Catalog

    Article views (729) PDF downloads (142) Cited by(10)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return