In the Radio Frequency Identification(RFID) system, in order to solve data collision problems between multiply tags existing within the scope of the reader during identification process, based on the analysis of ALOHA algorithm and the application of Code Division Multiple Access(CDMA) technology, an anti-collision ALOHA algorithm Based on Spread Spectrum(ABSS) is proposed. The throughput of this algorithm decreases along with the increase of frame’s transmission delay and increases as the number of spread codes increase. When the number of spreading codes is equal to the load, the minimum throughput of this system is gotten. When the number of spreading codes is larger than the load, the throughput will increase with the number of spreading codes, so the throughput of system will be higher than that of slot ALOHA. CDMA-based communication system model of multi-tag and reader is established on Simulink to respectively study influence of the signal-to-noise ratio, the uplink rate and frame size on the communication error rate. Experimental data show that communication quality between the reader and tags is reliable, and in reality, the error rate is close to zero.
Since the sensor nodes prone to the software or mechanical failure, this may cause the permanent data loss of some or all of the data. In order to ensure the reliability of data collection in Wireless Sensor Network(WSN), this paper proposes an improved data online recovery scheme. The data of nodes are redundant processed by using the distributed storage mechanism, and based on the recovery request sent by the sensors, a constant approximation competitive ratio polynomial time data recovery algorithm is proposed, which can have the low complexity competitive ratio when admission control is allowed, and the size of recovery pieces is constrained, and achieves the constant approximation ratio bound in acyclic networks. Analysis and simulation experimental results show that the proposed algorithm can recover network data exactly and attain minimum recovery cost for any recovery request.
Combination of coarse-grained and fine-grained Dynamic Taint Analysis(DTA) is developed to take speed and accuracy both into account. By comparing the realization process of coarse-grained DTA and fine-grained DTA, this paper proposes a new analysis framework. It executes online coarse-grained DTA to filter useful instruction, uses offline fine-grained DTA to calculate taint information. Coarse-grained and fine-grained taint mark methods are established respectively by comparing the difference of taint analysis. Data-flow property strategy and control-flow property strategy are developed under the condition of coarse-grained DTA and fine-grained DTA. As a transfer file, offline track record structure is designed to provide necessary information for fine-grained analysis. A prototype system is implemented and the experimental result proves that this method can ensure the rapid collection of taint information through online coarse-grained mode, and use offline fine-grained mode to improve the accuracy with accepted time consumption.
Trojan circuits can bypass traditional defensive techniques as they occupy a layer below the entire software stack. This paper proposes a hardware trojan detection technology based on probabilistic signature. Based on logic detection technology, using random and hypothesis algorithm, this paper constructs the probability signature of circuits(Boolean functions), as the unique identifier template. When the signature of circuit under test does not match the template, an alarm is launched. It designs two circuits that implement full adder and AES encryption, and then they are implanted with common hardware Trojan. It makes in-depth theoretical analysis and research on whether the probabilistic signature of the circuits implanted with hardware Trojans is changed in comparison with the two kinds of original circuits. It tests the circuits based on FPGA platform via probabilistic method. As a result, it is verified that based on the probability signature, it can easily achieve a 95% level of confidence on the detection of hardware Trojans implanted into the combinational logic circuits.
With the explosive number growth of services in cloud computing environment, how to select the services that can meet user’s requirement from the services which have same or similar function becomes the key problem to be resolved in cloud computing. So a multi-objective service composition optimization model with Quality of Service(QoS) restriction is built, and since some disadvantages of the traditional Multi-objective Particle Swarm Optimization(MOPSO) algorithm, such as less diversity of solutions and falling into local extremum easily, a method of Chaotic MOPSO(CMOPSO) algorithm is proposed. This algorithm uses the information entropy theory to maintain non-dominated solution set so as to retain the diversity of solution and the uniformity of distribution. When the diversity of population disappears, it introduces chaotic disturbance mechanism to improve the diversity of population and the ability of global optimization algorithm to avoid falling into local extremum. Experimental result shows that the astringency and the diversity of solution set of CMOPSO algorithm are better than traditional MOPSO algorithm, and it can solve the problem of service dynamic selection under cloud computing environment more efficiently.
Recently, LBlock as a new lightweight block cipher is presented. By using both the structure of LBlock algorithm and the basic idea from the cube test, two neutral-bit detection algorithms are proposed. It is shown that all master key bits are involved in the each output of 9-round reduced LBlock cipher. Moreover, for given 18 cube variables, there still is nonexistence of key neutral-bit for 11-round reduced LBlock cipher. Research result shows that the full-round LBlock cipher has good key bits confusion against the classical cube attacks.
Aiming at the problem that characteristics of the long distance band-type network will constrain the effect of general Wireless Sensor Network(WSN) routing protocols, and causes a “hot spot” problem in long distance band-type network, this paper introduces the energy balanced consumption multi-hop routing protocol CRLDB. It takes the idea of non-uniform cluster, concept of competition radius and the corresponding competitive strategy, and joins the number of cluster head node selection mechanism with the optimal number of cluster head, node residual energy and the surrounding neighbors, to balance nodes residual energy and transmission energy. Simulation by NS2 shows CRLDB routing protocol, compared with existing routing protocols Low Energy Adaptive Clustering Hierarchy(LEACH), LEACH-C for the survival time in the network, the network’s overall energy consumption and the amount of data received by base stations, CRLDB protocol with several performances in the above has a large improvement, can balance the network’s energy consumption and increase the network’s lifetime.
Uyghur which belongs to altaic language system is a typical agglutinative language and has large number of suffixes, and there is a big contrast with Chinese. According to the morphological characteristics of Uyghur language, this paper analyzes the Uyghur suffix’s role in Chinese-Uyghur statistical machine translation system. With the help of the Cheiro and exsiting technology it builds a hierarchical phrase-based Chinese-Uyghur statistical machine translation system. By comparing the performance of translation system with different granularity parallel corpora, experimental results show that the stem-affix representational units improve the performance of Chinese-Uyghur statistical machine translation system, and the BLEU value achieves to 0.197 2.