China Ji Liang University

Hangzhou, China

China Ji Liang University

Hangzhou, China

Time filter

Source Type

Tan J.,China Ji Liang University | Kang S.,China Ji Liang University | Jin N.,China Ji Liang University
Chinese Journal of Sensors and Actuators | Year: 2010

The remote reprogramming is a very important means for the efficient management and maintenance of deployed sensor networks, but the updated code is required to send to all nodes in networks reliably and energy-efficiently. A reliable and energy-efficient transport protocol based on OLSA for reprogramming in sensor networks is presented. It changes in-sequence transport of ADV-REQ-DATA three handshakes to out-of-order transport of ADVDATA two handshakes through the parameter r of "Next ADV Interval" and total segments C of code in an ADV message, reduces the number of broadcast nodes and overhead of energy with selecting broadcast nodes from the MPR set formed in lower layer OLSR protocol, and counts the number of nodes to be reprogrammed after completion. The performance analysis and simulation experiment indicate that our protocol is more advantaged then traditional PSFQ in nodes rate with the complete updated code, average delay and energy consumption.

Tan J.,China Ji Liang University | Wang Y.,China Ji Liang University | Zhang M.,China Ji Liang University
Chinese Journal of Sensors and Actuators | Year: 2014

The more reliability and timeliness are required in wireless body area networks (WBAN) compared to traditional wireless sensor networks, and all the packets are needed to be reliable. A timely and reliable protocol (AODV-RT) is presented, considering limited memory resource of the node and the priority of the WBAN data, it guarantees reliability and timeliness utilizing error recovery of E2E (End-To-End), HBH (Hop-By-Hop), and combining E2E with HBH. The alarm data, which has highest priority, is cached at each node along the route path. The HBH error recovery is provided firstly; Then the error recovery combining E2E with HBH is provided for lower RSSI (Received Signal Strength Indicator)node to caching higher priority data packet at the previous node, and finally the ETE error recovery is adopted for lower priority packet. The performance analysis and simulation experiment indicate that our protocol is more advantaged then similar MAODV-SIM in packet delivery ratio, end-to-end delay and energy consumption.

Guo L.,China Ji Liang University | Yin H.,China Ji Liang University | Wang J.,China Ji Liang University | Xu N.,China Ji Liang University | Tan J.,China Ji Liang University
IET Conference Publications | Year: 2012

In H.264/AVC, rate control and mode decision play important roles for efficient video compression. Usually, rate control employs R-D model to select the quantization parameter for precise bit rate control. R-D model which includes rate quantization (R-Q) model and distortion quantization (D-Q) model can be derived from mathematic modeling based on distribution of DCT coefficients. Therefore, the DCT coefficients distribution models are very important for D-Q modeling. Currently, some D-Q models have been proposed based on these three models, such as Laplacian, Cauchy and Generalized Gaussian Distribution (GGD), but there is no systematic and rigorous comparison on their accuracy. In this paper, we will have an analysis on three DCT coefficients distribution models. Also, we will test several existing D-Q models and give fair comparison on these models. This work is meaningful for efficient video coding algorithm optimization in the future.

Zhou L.H.,China Ji Liang University | Xu X.H.,China Ji Liang University | Yu D.Z.,China Ji Liang University
Applied Mechanics and Materials | Year: 2014

This paper presents a methodology for diagnostics of fixture failures in multistation assembly processes. Diagnosis matrix equation is established by state space equation and measurement equation, which study the conditions of deviation source diagnosis. The determination method of deviation source diagnosis is obtained. 3-D scanner is used to measure the key data. A case study illustrates the proposed method. © (2014) Trans Tech Publications, Switzerland.

Chen H.Y.,China Ji Liang University | Shen H.Y.,China Ji Liang University | Ying Y.H.,China Ji Liang University
Proceedings - 2014 IEEE Workshop on Electronics, Computer and Applications, IWECA 2014 | Year: 2014

Particle concentration detection sensor which is based on light scattering particle concentration theory has high reliability, fast and easy using and so on. However, it demands to extract the small signal in the background of the large noise. It requires to use the modulated light source, so this paper design the circuit, it uses the digital multiplier and make the sensor work more steady and more fast. Tirst the signal goes through the preamplifier circuit, then goes through the six-order band-pass filter, the last the band limited weak signal should be locked by lock-in amplifier. The paper offers the good method to detect the weak signal in the big noise ground. © 2014 IEEE.

Tan J.,China Ji Liang University | Zhang M.,China Ji Liang University | Chu N.,China Ji Liang University
Chinese Journal of Sensors and Actuators | Year: 2012

Most of the existed reprogramming protocol for sensor networks assum that all nodes in networks are homogeneous and run the same application, hut the nodes are heterogeneous in practice. A new reprogramming protocol with selection of scope is presented, it changes traditional ADV-REQ-DATA three handshakes protocol to route creation, code dissemination and requesting missed packets three stages protocol, reduces the number of intermediate forward nodes efficiently. With acquiring sequence of nodes which want to get code packet in one hop, the intermediate nodes transmits updated code with targeted nodes through unicast or multicast, decreases the REQ messages without broadcast as flooding, and counts homogeneous and heterogeneous nodes which forward the packet. The performance analysis and simulation experiment indicate that our protocol is advantaged then traditional Aqueduct in average delay and energy consumption.

Guo M.Y.,China Ji Liang University | Lou H.L.,China Ji Liang University
Applied Mechanics and Materials | Year: 2013

In this paper, six sigma methods were used in bearing ring grinding process improvement. In the improvement, bearing outer ring roundness error was selected as the assessment index, and exsiting problems in grinding process were defined, roundness error of bearing outer ring was measured.One-way analysis of variance was applied to analyze the test results, it indicates that workpiece center height, guide wheel tilt angle and grinding wheel balance are the three main factors that affecting roundness error.According to this analysis, orthogonal experiment was designed. The results show that grinding wheel balance, guide wheel tilt angle and workpiece center height on the impact of roundness error are in descending order. On this basis, a series of measures were carried out to control these three parameters. Uitimately, the grinding process capability index is increased from 0.88 to 1.43, and the target of improvement are achieved. © (2013) Trans Tech Publications, Switzerland.

Tan J.,China Ji Liang University | Zhang M.,China Ji Liang University
Chinese Journal of Sensors and Actuators | Year: 2013

This paper proposes an energy-efficient reprogramming protocol with selection of scope. Firstly, based on the application that needs to be updated, node's residual energy, effective degree and link quality, this protocol selects a subset of the nodes in the network as core nodes to create a virtual backbone. Then in order to disseminate data, it employs a two phase approach, in which the software image is delivered to the core nodes by pipeline in the first phase, and to the needed ordinary nodes parallelly in the second phase, reduces the number of nodes involved in the reprogramming efficiently, saves energy and achieves the selection of scope. And in addition to further reducing energy consumption, a coordinated sleep schedule is introduced. The performance analysis and simulation experiment indicate that, the average delay and energy consumption in this protocol drops 5.6%-24.8% and 5.1%-27.7% approximately compared with ThreeStages and Aqueduct.

Jin T.,China Ji Liang University | Yijing W.,China Ji Liang University
International Journal of Security and its Applications | Year: 2014

The data security and privacy are key issues, as well as the security measures of clinical application are desired to be simple operations of "plug and play" for wireless body area networks (BAN). In this paper, a secure multi-hop data transmission protocol based on combination of node's clock characteristics and properties of the BAN/BSN is presented without relying on any pre-distributed secret information. First, through exchanging clock frequency (CF) among node x , its neighbor i and sink in a safe environment, the pair-wise Kx between node x and sink is generated with CF of x and is used to encrypt data sensed by x ; the pair-wise Kxi or Kix between x and i is generated with clock skew of two nodes is used to encrypt route information; Second, the RREQ and RREP messages of AODV protocol is improved, and creates a secure route only composed of legal nodes through authenticating nodes with CFs of two adjacent nodes; Finally, the data packet produced by source x is divided into Data1 and Data2, Data2 is the being sensed data encrypted with Kx , and Data1 encrypted with Kxi or Kix includes source, destination, generated time of data and other information, the intermediate node needs to encrypt Data1again after decrypting Data1 to obtain route information, and transmits this data packet to sink with hop-by-hop. This protocol has good security in dynamics and accuracy of keys, avoiding passive and active attacks, preventing node capture and supporting new node joining through security analysis, and has accepted overheads of memory, computation and energy consumption by means of performance analysis; it satisfies the requirements of "plug and play" without added node's hardware and pre-load any keys, makes the complicated data security and privacy in the BAN/BSN become operable easily and practicable strongly. © 2014 SERSC.

Liu L.,China Ji Liang University | Tao J.,China Ji Liang University
Advanced Materials Research | Year: 2012

This paper brings public participate into the analysis framework and analyzes its effectiveness on the environment pollution. The studies have shown that the effectiveness of public participation on industrial wastes has relevant to the type of the industrial pollutants. © (2012) Trans Tech Publications, Switzerland.

Loading China Ji Liang University collaborators
Loading China Ji Liang University collaborators