Entity

Time filter

Source Type

Hangzhou, China

Tan J.,China Ji Liang University | Zhang M.,China Ji Liang University
Chinese Journal of Sensors and Actuators | Year: 2013

This paper proposes an energy-efficient reprogramming protocol with selection of scope. Firstly, based on the application that needs to be updated, node's residual energy, effective degree and link quality, this protocol selects a subset of the nodes in the network as core nodes to create a virtual backbone. Then in order to disseminate data, it employs a two phase approach, in which the software image is delivered to the core nodes by pipeline in the first phase, and to the needed ordinary nodes parallelly in the second phase, reduces the number of nodes involved in the reprogramming efficiently, saves energy and achieves the selection of scope. And in addition to further reducing energy consumption, a coordinated sleep schedule is introduced. The performance analysis and simulation experiment indicate that, the average delay and energy consumption in this protocol drops 5.6%-24.8% and 5.1%-27.7% approximately compared with ThreeStages and Aqueduct. Source


Guo M.Y.,China Ji Liang University | Lou H.L.,China Ji Liang University
Applied Mechanics and Materials | Year: 2013

In this paper, six sigma methods were used in bearing ring grinding process improvement. In the improvement, bearing outer ring roundness error was selected as the assessment index, and exsiting problems in grinding process were defined, roundness error of bearing outer ring was measured.One-way analysis of variance was applied to analyze the test results, it indicates that workpiece center height, guide wheel tilt angle and grinding wheel balance are the three main factors that affecting roundness error.According to this analysis, orthogonal experiment was designed. The results show that grinding wheel balance, guide wheel tilt angle and workpiece center height on the impact of roundness error are in descending order. On this basis, a series of measures were carried out to control these three parameters. Uitimately, the grinding process capability index is increased from 0.88 to 1.43, and the target of improvement are achieved. © (2013) Trans Tech Publications, Switzerland. Source


Jin T.,China Ji Liang University | Yijing W.,China Ji Liang University
International Journal of Security and its Applications | Year: 2014

The data security and privacy are key issues, as well as the security measures of clinical application are desired to be simple operations of "plug and play" for wireless body area networks (BAN). In this paper, a secure multi-hop data transmission protocol based on combination of node's clock characteristics and properties of the BAN/BSN is presented without relying on any pre-distributed secret information. First, through exchanging clock frequency (CF) among node x , its neighbor i and sink in a safe environment, the pair-wise Kx between node x and sink is generated with CF of x and is used to encrypt data sensed by x ; the pair-wise Kxi or Kix between x and i is generated with clock skew of two nodes is used to encrypt route information; Second, the RREQ and RREP messages of AODV protocol is improved, and creates a secure route only composed of legal nodes through authenticating nodes with CFs of two adjacent nodes; Finally, the data packet produced by source x is divided into Data1 and Data2, Data2 is the being sensed data encrypted with Kx , and Data1 encrypted with Kxi or Kix includes source, destination, generated time of data and other information, the intermediate node needs to encrypt Data1again after decrypting Data1 to obtain route information, and transmits this data packet to sink with hop-by-hop. This protocol has good security in dynamics and accuracy of keys, avoiding passive and active attacks, preventing node capture and supporting new node joining through security analysis, and has accepted overheads of memory, computation and energy consumption by means of performance analysis; it satisfies the requirements of "plug and play" without added node's hardware and pre-load any keys, makes the complicated data security and privacy in the BAN/BSN become operable easily and practicable strongly. © 2014 SERSC. Source


Tan J.,China Ji Liang University | Wang Y.,China Ji Liang University | Zhang M.,China Ji Liang University
Chinese Journal of Sensors and Actuators | Year: 2014

The more reliability and timeliness are required in wireless body area networks (WBAN) compared to traditional wireless sensor networks, and all the packets are needed to be reliable. A timely and reliable protocol (AODV-RT) is presented, considering limited memory resource of the node and the priority of the WBAN data, it guarantees reliability and timeliness utilizing error recovery of E2E (End-To-End), HBH (Hop-By-Hop), and combining E2E with HBH. The alarm data, which has highest priority, is cached at each node along the route path. The HBH error recovery is provided firstly; Then the error recovery combining E2E with HBH is provided for lower RSSI (Received Signal Strength Indicator)node to caching higher priority data packet at the previous node, and finally the ETE error recovery is adopted for lower priority packet. The performance analysis and simulation experiment indicate that our protocol is more advantaged then similar MAODV-SIM in packet delivery ratio, end-to-end delay and energy consumption. Source


Zhou L.H.,China Ji Liang University | Xu X.H.,China Ji Liang University | Yu D.Z.,China Ji Liang University
Applied Mechanics and Materials | Year: 2014

This paper presents a methodology for diagnostics of fixture failures in multistation assembly processes. Diagnosis matrix equation is established by state space equation and measurement equation, which study the conditions of deviation source diagnosis. The determination method of deviation source diagnosis is obtained. 3-D scanner is used to measure the key data. A case study illustrates the proposed method. © (2014) Trans Tech Publications, Switzerland. Source

Discover hidden collaborations