• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liao Guoqiong, Yang Lechuan, Zhang Haiyan, Yang Xianpei. An Offset Addition Vector Coding Strategy for Supporting Path Tracing Query in RFID-Based Supply Chains[J]. Journal of Computer Research and Development, 2020, 57(6): 1323-1334. DOI: 10.7544/issn1000-1239.2020.20190207
Citation: Liao Guoqiong, Yang Lechuan, Zhang Haiyan, Yang Xianpei. An Offset Addition Vector Coding Strategy for Supporting Path Tracing Query in RFID-Based Supply Chains[J]. Journal of Computer Research and Development, 2020, 57(6): 1323-1334. DOI: 10.7544/issn1000-1239.2020.20190207

An Offset Addition Vector Coding Strategy for Supporting Path Tracing Query in RFID-Based Supply Chains

Funds: This work was supported by the National Natural Science Foundation of China (61262009, 61772245), the Key Program of the Natural Science Foundation of Jiangxi Province of China (20151BBG70046), and the Key Project of Science and Technology of Jiangxi Education Department (GJJ160419).
More Information
  • Published Date: May 31, 2020
  • As an important technical support of intelligent Internet of things, radio frequency identification (RFID) technology has been widely used in supply chain tracing and real-time monitoring. In order to improve the tracking and query efficiency of tagged objects in the RFID-based supply chain environment, it is necessary to effectively encode the temporal and spatial data of RFID objects. Considering the characteristics including big volume, the existence of the loop and frequent update of the data in RFID-based supply chains, based on the idea that infinite vectors can be inserted between a pair of vectors, an offset addition vector path coding strategy is proposed. This strategy takes spatiotemporal data nodes as coding objects and assigns a unique pair of vectors to each node by vector addition to achieve uniform coding. At the same time, an optimization strategy is proposed to solve the overflow problem caused by excessive code value, and the correctness of the optimization strategy is proved. The experimental results show that the proposed vector encoding strategy and its optimization strategy can meet the requirements of different types of tracing queries, and have the advantages of fast encoding speed, slow overflow of code value, high update efficiency and can support loop.
  • Related Articles

    [1]Liu Qixu, Jin Ze, Chen Canhua, Gao Xinbo, Zheng Ningjun, Fang Yiwei, Feng Yun. Survey on Internet of Things Access Control Security[J]. Journal of Computer Research and Development, 2022, 59(10): 2190-2211. DOI: 10.7544/issn1000-1239.20220510
    [2]Du Ruizhong, Liu Yan, Tian Junfeng. An Access Control Method Using Smart Contract for Internet of Things[J]. Journal of Computer Research and Development, 2019, 56(10): 2287-2298. DOI: 10.7544/issn1000-1239.2019.20190416
    [3]Zhao Zhiyuan, Wang Jianhua, Zhu Zhiqiang, Sun Lei. Attribute-Based Encryption for Data Security Sharing of Internet of Things[J]. Journal of Computer Research and Development, 2019, 56(6): 1290-1301. DOI: 10.7544/issn1000-1239.2019.20180288
    [4]Huang Yicai, Zhou Weiwei, Yu Bin. Optimal Suppression Algorithm Against Worm Propagation in Wireless Service System for IoT Based on Target Cost Function[J]. Journal of Computer Research and Development, 2018, 55(11): 2467-2481. DOI: 10.7544/issn1000-1239.2018.20170305
    [5]Ren Yanbing, Li Xinghua, Liu Hai, Cheng Qingfeng, Ma Jianfeng. Blockchain-Based Trust Management Framework for Distributed Internet of Things[J]. Journal of Computer Research and Development, 2018, 55(7): 1462-1478. DOI: 10.7544/issn1000-1239.2018.20180073
    [6]Zhou Weiwei, Yu Bin. A Secure Transmission Model Between the Nodes in Clusters of Wireless Service System for Internet of Things[J]. Journal of Computer Research and Development, 2018, 55(7): 1393-1408. DOI: 10.7544/issn1000-1239.2018.20170920
    [7]Zhang Yuqing, Zhou Wei, Peng Anni. Survey of Internet of Things Security[J]. Journal of Computer Research and Development, 2017, 54(10): 2130-2143. DOI: 10.7544/issn1000-1239.2017.20170470
    [8]Dong Xiaolei. Advances of Privacy Preservation in Internet of Things[J]. Journal of Computer Research and Development, 2015, 52(10): 2341-2352. DOI: 10.7544/issn1000-1239.2015.20150764
    [9]Kong Junjun, Guo Yao, Chen Xiangqun, and Shao Weizhong. An Approach to Building Systems and Applications of Internet of Things with Smart Things[J]. Journal of Computer Research and Development, 2013, 50(6): 1198-1209.
    [10]Jianjia Wu and Wei Zhao. WInternet: From Net of Things to Internet of Things[J]. Journal of Computer Research and Development, 2013, 50(6): 1127-1134.
  • Cited by

    Periodical cited type(20)

    1. 韦修喜,彭茂松,黄华娟. 基于多策略改进蝴蝶优化算法的无线传感网络节点覆盖优化. 计算机应用. 2024(04): 1009-1017 .
    2. 刘超敏,胡玉平. 基于VGG—19和卡尔曼预处理的WSNs测距方法. 传感器与微系统. 2023(10): 139-142 .
    3. 刘松旭,张大鹏,乌云娜,刘鹏. 基于RSSI模型的无线传感器网络定位算法. 计算机仿真. 2022(01): 427-431 .
    4. 崔焕庆,张娜,罗汉江. 基于改进鸽群算法的无线传感器网络定位方法. 传感技术学报. 2022(03): 399-404 .
    5. 陈岩 ,高振国 ,王海军 ,欧阳云 ,缑锦 . 隐私保护能力可调的节点定位协议. 计算机研究与发展. 2022(09): 2075-2088 . 本站查看
    6. 刘琳岚,肖庭忠,舒坚,牛明晓. 基于门控循环单元的链路质量预测. 工程科学与技术. 2022(06): 51-58 .
    7. 赵高丽,宋军平. 水下传感器网络自组织连通恢复仿真. 计算机仿真. 2021(03): 152-156 .
    8. 刘恒,钟俊,刘辉. 基于优化核极限学习的WSN网络汇聚节点故障诊断. 新乡学院学报. 2021(06): 28-32 .
    9. 石秦峰,徐祥涛,杨晓东. 基于节点汇聚链路模型的光纤传感器物联网节点控制. 激光杂志. 2021(07): 109-113 .
    10. 张晶,罗施章,付谱平. 基于虚拟力移动锚节点的3D-DVHop-ACR定位算法. 控制与决策. 2021(10): 2409-2417 .
    11. 张盛安,周洋,方浩,孙玉洁. 贵州电网贵阳供电局网络资源敏捷定位关键问题设计. 电力大数据. 2021(05): 79-85 .
    12. 王礼霞,邰清清. 基于高阶马尔可夫链的无线传感器网络异常节点检测. 黑龙江工业学院学报(综合版). 2021(08): 93-97 .
    13. 宰红斌,刘建国,唐保国,马建国,上官明霞,单荣荣. 基于WSN的输电线路状态监测与数据采集跨层优化方法. 电气工程学报. 2021(03): 161-169 .
    14. 郑岚. 多信道通信网络环境下基于节点组簇技术通信资源调度算法. 山西能源学院学报. 2021(05): 97-99 .
    15. 徐逸夫,段隆振. 基于蛙跳算法的无线传感器网络节点重部署. 计算机仿真. 2021(10): 328-332 .
    16. 宋亚磊. 基于虚拟引力约束的光纤传感器网络节点空洞智能修复算法研究. 传感技术学报. 2021(10): 1395-1400 .
    17. 易柏言. 关于无线传感器网络的时间同步技术探究. 科技创新与应用. 2020(15): 152-153 .
    18. 王林,刘盼. 基于卷积神经网络的行人目标检测系统设计. 计算机测量与控制. 2020(07): 64-68+96 .
    19. 左伟伟. 基于微积分算子的网络节点发包概率分布研究. 电子设计工程. 2020(23): 116-119+124 .
    20. 李庐,赵晓峰. 基于拓扑感知映射算法的传感器网络数据稳定传输方法. 湖南科技学院学报. 2020(05): 54-57 .

    Other cited types(6)

Catalog

    Article views (728) PDF downloads (142) Cited by(26)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return