计算机专业的外文文献.pdf

合集下载

计算机专业外文文献翻译6

计算机专业外文文献翻译6

外文文献翻译(译成中文2000字左右):As research laboratories become more automated,new problems are arising for laboratory managers.Rarely does a laboratory purchase all of its automation from a single equipment vendor. As a result,managers are forced to spend money training their users on numerous different software packages while purchasing support contracts for each. This suggests a problem of scalability. In the ideal world,managers could use the same software package to control systems of any size; from single instruments such as pipettors or readers to large robotic systems with up to hundreds of instruments. If such a software package existed, managers would only have to train users on one platform and would be able to source software support from a single vendor.If automation software is written to be scalable, it must also be flexible. Having a platform that can control systems of any size is far less valuable if the end user cannot control every device type they need to use. Similarly, if the software cannot connect to the customer’s Laboratory Information Management System (LIMS) database,it is of limited usefulness. The ideal automation software platform must therefore have an open architecture to provide such connectivity.Two strong reasons to automate a laboratory are increased throughput and improved robustness. It does not make sense to purchase high-speed automation if the controlling software does not maximize throughput of the system. The ideal automation software, therefore, would make use of redundant devices in the system to increase throughput. For example, let us assume that a plate-reading step is the slowest task in a given method. It would make that if the system operator connected another identical reader into the system, the controller software should be able to use both readers, cutting the total throughput time of the reading step in half. While resource pooling provides a clear throughput advantage, it can also be used to make the system more robust. For example, if one of the two readers were to experience some sort of error, the controlling software should be smart enough to route all samples to the working reader without taking the entire system offline.Now that one embodiment of an ideal automation control platform has been described let us see how the use of C++ helps achieving this ideal possible.DISCUSSIONC++: An Object-Oriented LanguageDeveloped in 1983 by BjarneStroustrup of Bell Labs,C++ helped propel the concept of object-oriented programming into the mainstream.The term ‘‘object-oriented programming language’’ is a familiar phrase that has been in use for decades. But what does it mean? And why is it relevant for automation software? Essentially, a language that is object-oriented provides three important programming mechanisms:encapsulation, inheritance, and polymorphism.Encapsulation is the ability of an object to maintain its own methods (or functions) and properties (or variables).For example, an ‘‘engine’’ object might contain methods for starting, stopping, or accelerating, along with properties for ‘‘RPM’’ and ‘‘Oil pressure’’. Further, encapsulation allows an object to hide private data from a ny entity outside the object. The programmer can control access to the object’s data by marking methods or properties as public, protected,or private. This access control helps abstract away the inner workings of a class while making it obvious to a caller which methods and properties are intended to be used externally.Inheritance allows one object to be a superset of another object. For example, one can create an object called Automobile that inherits from Vehicle. The Automobile object has access to all non-private methods and properties of Vehicle plus any additional methods or properties that makes it uniquely an automobile.Polymorphism is an extremely powerful mechanism that allows various inherited objects to exhibit different behaviors when the same named method is invoked upon them. For example, let us say our Vehicle object contains a method called CountWheels. When we invoke this method on our Automobile, we learn that the Automobile has four wheels.However, when we call this method on an object called Bus,we find that the Bus has 10 wheels.Together, encapsulation, inheritance, and polymorphism help promote code reuse, which is essential to meeting our requirement that the software package be flexible. A vendor can build up a comprehensive library of objects (a serial communications class, a state machine class, a device driver class,etc.) that can be reused across many different code modules.A typical control software vendor might have 100 device drivers. It would be a nightmare if for each of these drivers there were no building blocks for graphical user interface (GUI) or communications to build on. By building and maintaining a library of foundation objects, the vendor will save countless hours of programming and debugging time.All three tenets of object-oriented programming are leveraged by the use of interfaces. An interface is essentially a specification that is used to facilitate communication between software components, possibly written by different vendors. An interface says, ‘‘if your cod e follows this set of rules then my software component will be able to communicate with it.’’ In the next section we will see how interfaces make writing device drivers a much simpler task.C++ and Device DriversIn a flexible automation platform, one optimal use for interfaces is in device drivers. We would like our open-architecture software to provide a generic way for end users to write their own device drivers without having to divulge the secrets of our source code to them. To do this, we define a simplifiedC++ interface for a generic device, as shown here:class IDevice{public:virtual string GetName() ? 0; //Returns the name//of the devicevirtual void Initialize() ? 0; //Called to//initialize the devicevirtual void Run() ? 0; // Called to run the device};In the example above, a Ctt class (or object) called IDevice has been defined. The prefix I in IDevice stands for ‘‘interface’’. This class defines three public virtual methods: GetName, Initialize, and Run. The virtual keyword is what enables polymorphism, allowing the executing program to run the methods of the inheriting class. When a virtual method declaration is suffixed with ?0, there is no base class implementation. Such a method is referred to as ‘‘pure virtual’’. A class like IDevice that contains only pure virtual functions is known as an ‘‘abstract class’’, or an‘‘interface’’. The IDevice definition, along with appropriate documentation, can be published to the user community,allowing developers to generate their own device drivers that implement the IDevice interface.Suppose a thermal plate sealer manufacturer wants to write a driver that can be controlled by our software package. They would use inheritance to implement our IDevice interface and then override the methods to produce the desired behavior: class CSealer : public IDevice{public:virtual string GetName() {return ‘‘Sealer’’;}virtual void Initialize() {InitializeSealer();}virtual void Run() {RunSealCycle();}private:void InitializeSealer();void RunSealCycle();};Here the user has created a new class called CSealer that inherits from the IDevice interface. The public methods,those that are accessible from outside of the class, are the interface methods defined in IDevice. One, GetName, simply returns the name of the device type that this driver controls.The other methods,Initialize() and Run(), call private methods that actually perform the work. Notice how the privatekeyword is used to prevent external objects from calling InitializeSealer() and RunSealCycle() directly.When the controlling software executes, polymorphism will be used at runtime to call the GetName, Initialize, and Run methods in the CSealer object, allowing the device defined therein to be controlled.DoSomeWork(){//Get a reference to the device driver we want to useIDevice&device ? GetDeviceDriver();//Tell the world what we’re about to do.cout !! ‘‘Initializing ’’!! device.GetName();//Initialize the devicedevice.Initialize();//Tell the world what we’re about to do.cout !! ‘‘Running a cycle on ’’ !!device.GetName();//Away we go!device.Run();}The code snippet above shows how the IDevice interface can be used to generically control a device. If GetDevice-Driver returns a reference to a CSealer object, then DoSomeWork will control sealers. If GetDeviceDriver returns a reference to a pipettor, then DoSomeWork will control pipettors. Although this is a simplified example, it is straightforward to imagine how the use of interfaces and polymorphism can lead to great economies of scale in controller software development.Additional interfaces can be generated along the same lines as IDevice. For example, an interface perhaps called ILMS could be used to facilitate communication to and from a LIMS.The astute reader will notice that the claim that anythird party can develop drivers simply by implementing the IDevice interface is slightly flawed. The problem is that any driver that the user writes, like CSealer, would have to be linked directly to the controlling software’s exec utable to be used. This problem is solved by a number of existing technologies, including Microsoft’s COMor .NET, or by CORBA. All of these technologies allow end users to implement abstract interfaces in standalone components that can be linked at runtime rather than at design time. The details are beyond the scope of this article.中文翻译:随着研究实验室更加自动化,实验室管理人员出现的新问题。

计算机英文文献加翻译

计算机英文文献加翻译

Management Information System Overview Management Information System is that we often say that the MIS, is a human, computers and other information can be composed of the collection, transmission, storage, maintenance and use of the system, system, emphasizing emphasizing the the management, management, management, stressed stressed stressed that that the modern information society In the increasingly popular. MIS is a new subject, it across a number of areas, such as scientific scientific management management management and and and system system system science, science, science, operations operations operations research, research, research, statistics statistics statistics and and and computer computer science. In these subjects on the basis of formation of information-gathering and processing methods, thereby forming a vertical and horizontal weaving, and systems. The 20th century, along with the vigorous development of the global economy, many economists have proposed a new management theory. In the 1950s, Simon made dependent on information management and decision-making ideas. Wiener published the same period of the control theory, that he is a management control process. 1958, Gail wrote: "The management will lower the cost of timely and accurate information to b etter control." During better control." During this period, accounting for the beginning of the computer, data processing in the term.1970, Walter T . Kenova just to the management information system under a definition of the . Kenova just to the management information system under a definition of the term: "verbal or written form, at the right time to managers, staff and outside staff for the past, present, the projection of future Enterprise and its environment-related information 原文请找腾讯3249114六,维^论~文.网 no no application application application model, model, model, no no mention mention of of computer applications. 1985, management information systems, the founder of the University of Minnesota professor of management at the Gordon B. Davis to a management information system a more complete definition of "management information system is a computer hardware and software resources, manual operations, analysis, planning , Control and decision -making model and the database - System. System. It It provides information to to support support enterprises enterprises or or organizations organizations of of the operation, management and decision-making function. "Comprehensive definition of this Explained Explained that that that the the the goal goal goal of of of management management management information information information system, system, system, functions functions functions and and and composition, composition, composition, but but also reflects the management information system at the time of level.With the continuous improvement of science and technology, computer science increasingly mature, the computer has to be our study and work on the run along. Today, computers are already already very low price, performance, but great progress, and it was used in many areas, the very low price, performance, but great progress, and it was used in many areas, the computer computer was was was so so so popular popular popular mainly mainly mainly because because because of of of the the the following following following aspects: aspects: aspects: First, First, First, the the the computer computer computer can can substitute for many of the complex Labor. Second, the computer can greatly enhance people's work work efficiency. efficiency. efficiency. Third, Third, Third, the the the computer computer computer can can can save save save a a a lot lot lot of of of resources. resources. resources. Fourth, Fourth, Fourth, the the the computer computer computer can can make sensitive documents more secure.Computer application and popularization of economic and social life in various fields. So that the original old management methods are not suited now more and social development. Many people still remain in the previous manual. This greatly hindered the economic development of mankind. mankind. In recent years, with the University of sponsoring scale is In recent years, with the University of sponsoring scale is growing, the number of students students in in in the the the school school school also also also have have have increased, increased, increased, resulting resulting resulting in in in educational educational educational administration administration administration is is is the the growing complexity of the heavy work, to spend a lot of manpower, material resources, and the existing management of student achievement levels are not high, People have been usin g the traditional method of document management student achievement, the management there are many shortcomings, such as: low efficiency, confidentiality of the poor, and Shijianyichang, will have a large number of of documents documents documents and and data, which is is useful useful for finding, finding, updating updating and maintaining Have brought a lot of difficulties. Such a mechanism has been unable to meet the development of the times, schools have become more and more day -to-day management of a bottleneck. bottleneck. In In In the the the information information information age age age this this this traditional traditional traditional management management management methods methods methods will will will inevitably inevitably inevitably be be computer-based information management replaced. As As part part part of of of the the the computer computer computer application, application, application, the the the use use use of of of computers computers computers to to to students students students student student student performance performance information for management, with a manual management of the incomparable advantages for example: example: rapid rapid rapid retrieval, retrieval, retrieval, to to to find find find convenient, convenient, convenient, high high high reliability reliability reliability and and and large large large capacity capacity capacity storage, storage, storage, the the confidentiality confidentiality of of of good, good, good, long long long life, life, life, cost cost cost Low. Low. Low. These These These advantages advantages advantages can can can greatly greatly greatly improve improve improve student student performance management students the efficiency of enterprises is also a scientific, standardized standardized management, management, management, and and and an an an important important important condition condition condition for for for connecting connecting connecting the the the world. world. world. Therefore, Therefore, the development of such a set of management software as it is very necessary thing.Design ideas are all for the sake of users, the interface nice, clear and simple operation as far as possible, but also as a practical operating system a good fault-tolerant, the user can misuse a timely manner as possible are given a warning, so that users timely correction . T o take full advantage advantage of the of the functions of visual FoxPro, design p owerful software powerful software at the same time, as much as possible to reduce the occupiers system resources. Visual FoxPro the command structure and working methods: Visual FoxPro was originally originally called called FoxBASE, FoxBASE, the the U.S. U.S. Fox Fox Software has introduced introduced a a database products, products, in in the run on DOS, compatible with the abase family. Fox Fox Software Software Microsoft acquisition, to be developed so that it can run on Windows, and changed its name to Visual FoxPro. Visual FoxPro is a powerful relational database rapid application development tool, tool, the the the use use use of of of Visual Visual Visual FoxPro FoxPro FoxPro can can can create create create a a a desktop desktop desktop database database database applications, applications, applications, client client client / / / server server applications applications and and and Web Web Web services services services component-based component-based component-based procedures, procedures, procedures, while while while also also also can can can use use use ActiveX ActiveX controls or API function, and so on Ways to expand the functions of Visual FoxPro.1651First, work methods 1. Interactive mode of operation (1) order operation VF in the order window, through an order from the keyboard input of all kinds of ways to complete the operation order. (2) menu operation VF use menus, windows, dialog to achieve the graphical interface features an interactive operation. (3) aid operation VF in the system provides a wide range of user-friendly operation of tools, such as the wizard, design, production, etc.. 2. Procedure means of implementation VF in the implementation of the procedures is to form a group of orders and programming language, an extension to save. PRG procedures in the document, and then run through the automatic implementation of this order documents and award results are displayed. Second, the structure of command 1. Command structure 2. VF orders are usually composed of two parts: The first part is the verb order, also known as keywords, for the operation of the designated order functions; second part of the order clause, for an order that the operation targets, operating conditions and other information . VF order form are as follows: 3. <Order verb> "<order clause>" 4. Order in the format agreed symbols 5. 5. VF in the order form and function of the use of the symbol of the unity agreement, the meaning of VF in the order form and function of the use of the symbol of the unity agreement, the meaning of these symbols are as follows: 6. Than that option, angle brackets within the parameters must be based on their format input parameters. 7. That may be options, put in brackets the parameters under specific requ ests from users choose to enter its parameters. 8. Third, the project manager 9. Create a method 10. command window: CREA T PROJECT <file name> T PROJECT <file name> 11. Project Manager 12. tab 13. All - can display and project management applications of all types of docume nts, "All" tab contains five of its right of the tab in its entirety . 14. Data - management application projects in various types of data files, databases, free form, view, query documents. 15. Documentation - display 原文请找腾讯原文请找腾讯3249114六,维^论~文.网 , statements, documents, labels and other documents. 16. Category - the tab display and project management applications used in the class library documents, including VF's class library system and the user's own design of the library. 17. Code - used in the project management procedures code documents, such as: program files (. PRG), API library and the use of project management for generation of applications (. APP). 18. (2) the work area 19. The project management work area is displayed and management of all types of document window. 20. (3) order button 21. Project Manager button to the right of the order of the work area of the document window to provide command. 22. 4, project management for the use of 23. 1. Order button function 24. New - in the work area window selected certain documents, with new orders button on the new document added to the project management window. 25. Add - can be used VF "file" menu under the "new" order and the "T ools" menu under the "Wizard" order to create the various independent paper added to the project manager, unified organization with management. 26. Laws - may amend the project has been in existence in the various documents, is still to use such documents to modify the design interface. 27. Sports - in the work area window to highlight a specific document, will run the paper.28. Mobile - to check the documents removed from the project. 29. 29. Even Even Even the the the series series series - - - put put put the the the item item item in in in the the the relevant relevant relevant documents documents documents and and and even even even into into into the the the application application executable file. Database System Design :Database design is the logical database design, according to a forthcoming data classification system and the logic of division-level organizations, is user-oriented. Database design needs of various departments of the integrated enterprise archive data and data needs analysis of the relationship between the various data, in accordance with the DBMS. 管理信息系统概要管理信息系统概要管理信息系统就是我们常说的MIS (Management Information System ),是一个由人、计算机等组成的能进行信息的收集、传送、储存、维护和使用的系统,在强调管理,强调信息的现代社会中它越来越得到普及。

计算机专业外文文献及翻译微软Visual Studio

计算机专业外文文献及翻译微软Visual Studio

计算机专业外文文献及翻译微软Visual Studio 微软 Visual Studio1 微软 Visual Studio Visual Studio 是微软公司推出的开发环境,Visual Studio 可以用来创建 Windows 平台下的Windows 应用程序和网络应用程序,也可以用来创建网络服务、智能设备应用程序和 Office 插件。

Visual Studio 是一个来自微软的集成开发环境 IDE(inteqrated development environment),它可以用来开发由微软视窗,视窗手机,Windows CE、.NET 框架、.NET 精简框架和微软的 Silverlight 支持的控制台和图形用户界面的应用程序以及 Windows 窗体应用程序,网站,Web 应用程序和网络服务中的本地代码连同托管代码。

Visual Studio 包含一个由智能感知和代码重构支持的代码编辑器。

集成的调试工作既作为一个源代码级调试器又可以作为一台机器级调试器。

其他内置工具包括一个窗体设计的 GUI 应用程序,网页设计师,类设计师,数据库架构设计师。

它有几乎各个层面的插件增强功能,包括增加对支持源代码控制系统(如 Subversion 和 Visual SourceSafe)并添加新的工具集设计和可视化编辑器,如特定于域的语言或用于其他方面的软件开发生命周期的工具(例如 Team Foundation Server 的客户端:团队资源管理器)。

Visual Studio 支持不同的编程语言的服务方式的语言,它允许代码编辑器和调试器(在不同程度上)支持几乎所有的编程语言,提供了一个语言特定服务的存在。

内置的语言中包括 C/C 中(通过Visual C)(通过 Visual ),C,中(通过 Visual C,)和 F,(作为Visual Studio2010),为支持其他语言,如 MPython和 Ruby 等,可通过安装单独的语言服务。

计算机专业外文文献翻译--Linux—网络时代的操作系统

计算机专业外文文献翻译--Linux—网络时代的操作系统

英文参考文献及翻译Linux - Operating system of cybertimesThough for a lot of people , regard Linux as the main operating system to make up huge work station group, finish special effects of " Titanic " make , already can be regarded as and show talent fully. But for Linux, this only numerous news one of. Recently, the manufacturers concerned have announced that support the news of Linux to increase day by day, users' enthusiasm to Linux runs high unprecedentedly too. Then, Linux only have operating system not free more than on earth on 7 year this piece what glamour, get the favors of such numerous important software and hardware manufacturers as the masses of users and Orac le , Informix , HP , Sybase , Corel , Intel , Netscape , Dell ,etc. , OK?1.The background of Linux and characteristicLinux is a kind of " free (Free ) software ": What is called free,mean users can obtain the procedure and source code freely , and can use them freely , including revise or copy etc.. It is a result of cybertimes, numerous technical staff finish its research and development together through Inte rnet, countless user is it test and except fault , can add user expansion function that oneself make conveniently to participate in. As the most outstanding one in free software, Linux has characteristic of the following:(1)Totally follow POSLX standard, expand the network operatingsystem of supporting all AT&T and BSD Unix characteristic. Because of inheritting Unix outstanding design philosophy , and there are clean , stalwart , high-efficient and steady kernels, their all key codes are finished by Li nus Torvalds and other outstanding programmers, without any Unix code of AT&T or Berkeley, so Linu x is not Unix, but Linux and Unix are totally compatible.(2)Real many tasks, multi-user's system, the built-in networksupports, can be with such seamless links as NetWare , Windows NT , OS/2 , Unix ,etc.. Network in various kinds of Unix it tests to be fastest in comparing and assess efficiency. Support such many kinds of files systems as FAT16 , FAT32 , NTFS , Ex t2FS , ISO9600 ,etc. at the same time .(3) Can operate it in many kinds of hardwares platform , including such processors as Alpha , SunSparc , PowerPC , MIPS ,etc., to various kinds of new-type peripheral hardwares, can from distribute on global numerous programmer there getting support rapidly too.(4) To that the hardware requires lower, can obtain very good performance on more low-grade machine , what deserves particular mention is Linux outstanding stability , permitted " year " count often its running times.2.Main application of Linux At present,Now, the application of Linux mainly includes:(1) Internet/Intranet: This is one that Linux was used most at present, it can offer and include Web server , all such Inter net services as Ftp server , Gopher server , SMTP/POP3 mail server , Proxy/Cache server , DNS server ,etc.. Linux kernel supports IPalias , PPP and IPtunneling, these functions can be used for setting up fictitious host computer , fictitious service , VPN (fictitious special-purpose network ) ,etc.. Operating Apache Web server on Linux mainly, the occupation rate of market in 1998 is 49%, far exceeds the sum of such several big companies as Microsoft , Netscape ,etc..(2) Because Linux has outstanding networking ability , it can be usedin calculating distributedly large-scaly, for instance cartoon making , scientific caculation , database and file server ,etc..(3) As realization that is can under low platform fullness of Unix that operate , apply at all levels teaching and research work of universities and colleges extensively, if Mexico government announce middle and primary schools in the whole country dispose Linux and offer Internet service for student already.(4) Tabletop and handling official business appliedly. Application number of people of in this respect at present not so good as Windows of Microsoft far also, reason its lie in Lin ux quantity , desk-top of application software not so good as Windows application far not merely,because the characteristic of the freedom software makes it not almost have advertisement that support (though the function of Star Office is not second to MS Office at the same time, but there are actually few people knowing).3.Can Linux become a kind of major operating system?In the face of the pressure of coming from users that is strengthened day by day, more and more commercial companies transplant its application to Linux platform, comparatively important incident was as follows, in 1998 ①Compaq and HP determine to put forward user of requirement truss up Linux at their servers , IBM and Dell promise to offer customized Linux system to user too. ②Lotus announce, Notes the next edition include one special-purpose edition in Linux. ③Corel Company transplants its famous WordPerfect to on Linux, and free issue. Corel also plans to move the other figure pattern process products to Linux platform completely.④Main database producer: Sybase , Informix , Oracle , CA , IBM have already been transplanted one's own database products to on Linux, or has finished Beta edition, among them Oracle and Informix also offer technical support to their products.4.The gratifying one is, some farsighted domestic corporations have begun to try hard to change this kind of current situation already. Stone Co. not long ago is it invest a huge sum of money to claim , regard Linux as platform develop a Internet/Intranet solution, regard this as the core and launch Stone's system integration business , plan to set up nationwide Linux technical support organization at the same time , take the lead to promote the freedom software application and development in China. In addition domestic computer Company , person who win of China , devoted to Linux relevant software and hardware application of system popularize too. Is it to intensification that Linux know , will have more and more enterprises accede to the ranks that Linux will be used with domestic every enterprise to believe, more software will be planted in Linux platform. Meanwhile, the domestic university should regard Linux as the original version and upgrade already existing Unix content of courses , start with analysing the source code and revising the kernel and train a large number of senior Linux talents, improve our country's own operating system. Having only really grasped the operating system, the software industry of our country could be got rid of and aped sedulously at present, the passive state led by the nose byothers, create conditions for revitalizing the software industry of our country fundamentally.中文翻译Linux—网络时代的操作系统虽然对许多人来说,以Linux作为主要的操作系统组成庞大的工作站群,完成了《泰坦尼克号》的特技制作,已经算是出尽了风头。

计算机毕设英文参考文献

计算机毕设英文参考文献

计算机毕设英文参考文献当涉及到毕业设计或者毕业论文的参考文献时,你可以考虑以下一些经典的计算机科学领域的文献:1. D. E. Knuth, "The Art of Computer Programming," Addison-Wesley, 1968.2. A. Turing, "On Computable Numbers, with an Application to the Entscheidungsproblem," Proceedings of the London Mathematical Society, 1936.3. V. Bush, "As We May Think," The Atlantic Monthly, 1945.4. C. Shannon, "A Mathematical Theory of Communication," Bell System Technical Journal, 1948.5. E. W. Dijkstra, "Go To Statement Considered Harmful," Communications of the ACM, 1968.6. L. Lamport, "Time, Clocks, and the Ordering of Events in a Distributed System," Communications of the ACM, 1978.7. T. Berners-Lee, R. Cailliau, "WorldWideWeb: Proposal for a HyperText Project," 1990.8. S. Brin, L. Page, "The Anatomy of a Large-Scale Hypertextual Web Search Engine," Computer Networks and ISDN Systems, 1998.这些文献涵盖了计算机科学领域的一些经典工作,包括算法、计算理论、分布式系统、人机交互等方面的内容。

计算机科学与技术英文文献

计算机科学与技术英文文献

Introduction to DevelopmentTo overcome the performance and scalability problems that CGI brings, Microsoft developed a new way for developers to build scalable applications. This high performance alternative is called the Internet Server Application Programming Interface(ISAPI). Instead of housing functionality in executable files, ISAPI uses DLLs. Using DLLs instead of executable programs has some definite performance and scalability advantages The ISAPI extension could also be called with arguments that will allow a single ISAPI extension to perform multiple tasks. Just as in the CGI example, the directory must have execute permissions enabled, or the DLL will be downloaded to the client rather than run on the server. ISAPI extensions are typically used to process client requests and output a response as HTML, which is very similar to the way CGI programs are used.ISAPI filters perform a function that can’t be directly duplicated with CGI applications. ISAPI filters are never explicitly called; instead, they are called by IIS in response to certain events in the life of a request. The developer can request that an ISAPI filter be called whenever any of the following events occur:1.When the server has preprocessed the client headers2.When the server authenticates the client3.When the server is mapping a logical URL to a physical URL4.Before raw data is sent from the client to the server5.After raw data is sent from the client to the server but before the server processes it 6.When the server logs information7.When the session is endingAs with any filter, ISAPI filters should request only the notifications it requires and process them as quickly as possible. One of the more common uses of ISAPI filters is to provide custom authentication. Another use is to modify the HTML that will be sent to the client. For example, an ISAPI filter could be used to change the background color of each page. Because ISAPI filters aren’t nearly as common as ISAPI extensions, I won’t cover them any further in this book. If you want to learn more about ISAPI extensions, you can check out my book Inside Server-Based Applications (Microsoft Press, 1999).ISAPI specifies several entry-point functions that must be exported from the DLL. Using these entry points, IIS can load the DLL; call the functions that it implements, passing in parameters as required; and receive the data to write back to the browser. ISAPI requires only two entry-point functions to be implemented these entry points, IIS can load the DLL;call the functions that it implements, passing in parameters as required; and receive the data to write back to the browser. ISAPI requires only two entry-point functions to be implementedA Better Solution: Active Server PagesIf you’re wondering why we’ve dwelt on th e alternatives to in a book about programming , the answer lies in the details of the implementation of and its predecessor, Active Server Pages (ASP). Understanding ISAPI is required for adept understanding of ASP and thus .During the beta of IIS 2.0, which became part of Windows NT 4.0, Microsoft introduced a new technology initially codenamed “Denali.” This was during Microsoft’s “Active” period and so the technology was eventually named Active Server Pages, or ASP. Several versions of have been released, most notably the versions included with Windows NT 4.0 Option Pack (ASP 2.0 and IIS 4.0) and Windows 2000 (ASP 3.0 and IIS 5.0). For the purposes of this discussion, I’ll consider ASP as a whole, without referring t o version differences became an instant hit, in large part because it made something that was difficult(create dynamic Web content) relatively easy. Creating CGI applications and ISAPI applications wasn’t terribly difficult, but using ASP was much simpler By default, ASP uses VBScript. Literally millions of developers are at least somewhat familiar with Visual Basic, Visual Basic for Applications (VBA), or VBScript. For these developers, ASP was the way to enter the Internet age. Certainly the developers could have learned a new programming language, but they didn’t have to with ASP. Partly because of its use of VBScript, ASP became a viable way to build Web applications.Just as important was the relatively easy access to databases allowed through Microsoft ActiveX Data Objects (ADO). When you need to generate dynamic content, that dynamic content obviously needs to come from somewhere, and ADO made it easy to get at that data.Finally, and perhaps most important, the development model allowed developers to essentially write code and run it. There was no need to perform compilation or elaborate installation steps. the architects were careful to capture this same development model, even though what’s going on under the covers is quite a bit different.A New Solution: When version 3.0 of was released along with Windows 2000, it became clearer that the future of software development was closely tied to the future of the Web. As part of its .NET initiative, Microsoft has introduced , a new version of ASP that retains the model of development ASP developers have come to know and love: youcan create the code and place it in the correct directory with the proper permissions, and it will just work. also introduces innovations that allow easier separation of the development of the core of an application and its presentation. adds many features to and enhances many of the capabilities in classic isn’t merely an incremental improvement to ASP; it’s really a completely new product, albeit a new product designed to allow the same development experience that ASP developers have enjoyed. Here are some of the notable features of : .NET Framework: The .NET Framework is an architecture that makes it easier to design Web and traditional applications.Common language runtime: The common language runtime provides a set of services for all languages. If you’re an ASP developer who has had to combine ASP scripting with COM objects, you’ll apprecia te the beauty of a common set of types across many languages.Compiled languages: provides enhanced performance through the use of compiled languages. Compiled languages allow the developer to verify that code is at least syntactically correct. ASP doesn’t provide any such facility, so simple syntax errors might not be caught until the first time the code is executed.Cool new languages Visual Basic: .NET is a completely new version of Visual Basic that provides a new, cleaner syntax. C# is a new language designed to look and feel a lot like C++, but without some of the unsafe features that make C++ difficult to use to create reliable applications. These two languages are available out of the box, but other languages will be available from third parties as well. As of this writing, COBOL and Eiffel implementations should be available for Visual Studio .NET as well.Visual Studio .NET: Visual Studio .NET is a cool new development environment that brings rapid application development (RAD) to the server.Improved components: The .NET Framework supports the use of new types of components that can be conveniently replaced in a running application.Web Forms: Web Forms allow Visual Basic–like development, with event handlers for common HTML widgets.XML Web services: XML Web services enable developers to create services and then make them available using industry standard protocols.: ADO for the .NET Framework is a new version of the technology that allows applications to more conveniently get at data residing in relational databases and in other formats, such as Extensible Markup Language (XML.) ConclusionThis brief history of Web development should provide you with a foundation as youcontinue reading about . Learning a programming language or development environment is much like learning a human language. Although books that cover the syntax and vocabulary are helpful, it’s often just as useful to understand the history of the people who use the language.If you’re an develope r, much of this chapter might be a review for you, but I hope that you’ve added something to your understanding of the history of . If you’re new to ASP and , understanding the history of ASP and what came before it will be useful as you begin to explore the exciting new technologies that make up .About Active Server Aside from the burden is not only (ASP) version of the next; It also provides a unified Web development models, including the development of enterprise-class Web applications generated personnel for the various services. grammar largely compatible with ASP, it also provides a new programming model and structure, flexibility and stability can produce better applications, and to provide better security protection. Through the existing ASP applications, gradually add functions to enhance ASP applications functions.When building applications, developers can use Web or XML Web services, or in any manner they deemed appropriate portfolio. Each functional access to the same support structure, so that you can use as a certification program, buffer frequently used data, or configuration of applications for self definition, only listed a few possibilities here.You can use Web-based generation of powerful the Web page. These generated pages, can be used to build public complaints server UI elements, and programming for the implementation of their common task. You can use these complaints to the building or from reusable components generated Web definition, thus simplifying the code page. For more information, please see Web pages. XML Web services provide a means of remote access server functions. Use XML Web services, enterprises can open data or business logic programming interface, and client-server applications and can acquire and operate these programming interfaces. Through the use of information such as web and XML standards such as the transmission of data across mobile firewall, XML Web services to customers - in-server or server-server programmed for data exchange. XML Web services without relying on specific components or technology transfer targets agreed. Therefore, the use of any language, using any component model, operating system and in any operating procedures can visit XML Web services. and. Net Framework version 1.1 installed, as each part of the Windows Server 2003 series products. You can add it through the control panels for the newprocedures, or use "of your server guide" opening it. In addition, according to this theme later introduced "with Windows XP Professional or Windows 2000 Server computer installed " process downloading 1.0. Installed Visual Studio. Net will also install 1.0.Use "of your server guide," in the operation of the Windows Server 2003 server installed .In the mission column, hit "start" button and then hit the "management of your servers," in the "management of your servers" window, hit "Add or remove players."In the "configuration of your server guide", hit the "next step" in the "server roles", selected "application servers (IIS, )," and then hit "next". "applications server option", hit the "opening " of, hit the "next" and then hit "next". If necessary, inserted in CD-ROM drive Windows Server 2003 installation CD, and then hit the "next step." Installation completed, hit the "completion."The use of "add / delete process" in operating the Windows Server 2003 server installed . In the mission column, hit "start" button, pointing to "control panels" and then hit the "add or delete procedures." "Windows components guides," "components" box, hit the "application server" of, then hit the "next step." When the "Windows components guides" configuration End Windows Server 2003, hit the "completion."In Windows Server 2003 series products in China by opening Server ManagementColumn in the mission, hit "start" button and then hit the "operation." In the "operation open" box, the importation and then hit "determined." ."Server management machine", a "local computer" and then hit "Web service expansion." Panes right, hit "" and then hit "allowed." state then changed to "allow".In operation running Windows XP Professional or Windows 2000 computer, download and install . If necessary, install and start IIS. On the installation, please refer to the operating system files. At /downloads/default.asp, a "Software Development Kits" (software development kits), hit the "Microsoft. net Framework SDK, "and then read the page on the SDK download requests, notes and choice. Hit for download option, and read the end-user licensing agreements, and then hit the "yes" (is). "document downloaded", download options to preserve documents, the choice to install procedures and documents downloaded to personal tale of folder, and then hit the "preservation". Check up on the latest personal tale of any document. Download documents located in the folder, Net Framework installation procedures Setup.exe.If you have IIS installed and activated, the installation of and. Net Framework, deployed applications and requests a page, but received one of the followingerror message, indicating the Web site has not been for the establishment of an appropriate authority or directory :"C:\Inetpub\Wwwroot" catalogue visit was denied. Failure to start monitoring directory changes. Server applications to visit catalogue "C:\Inetpub\Wwwroot\ Virtual Directory Name \". The catalogue does not exist or could not be visited for security establishment.At root Web site or any virtual directory, needs account (Aspnet_wp.exe process account) the retrieval, delivery and set limits. These must be installed, can visit the contents of documents and surveillance document changes. Requests the Executive next steps corrected the problem.Web site or virtual directory in the root of adding account retrieval, delivery and competence listedIn Windows resources management devices, to browse Web sites containing roots(acquiescence to the establishment of : C:\Inetpub\Wwwroot) or the virtual directory folder. In the "safe" choice card, hit "Add". Import Computer Name \ASPNET (for example, in the computer named Web imported Web\ASPNET), and then hit "determined." Allow account the following date: retrieval and implementation, a folder content, retrieval. Attention if the "Everyone" (Everyone) group or "users" group to retrieve root Web site or virtual directory, there would be no need to implement these steps.In Windows 2003 domain controller server, applications to network service identity operation (nothing to do with IIS isolation mode). In some cases, the domain controller function request to take additional steps to make your normal installation. 1.1 operating in the domain controller on the issue of the potential problems more information, Please see Microsoft knowledge base article Q824308 "IWAM Account is Not Granted the Impersonate Privilege for 1.1 on Windows 2000 Domain Controller with SP4" (SP4 installed in the Windows 2000 domain controller, not to IWAM account for 1.1 simulation Privileges), Web site knowledge base for . In the domain controller function. Net Framework 1.0 more information, Please see Microsoft knowledge base article Q315158, " Does Not Work with the Default Account on a Domain Controller" (with the domain controller, not the acquiescence account work), Web site knowledge base for .Author: ouglas J. TomFrom: Microsoft Applications微软设计应用因特网服务器应用程式介面:CGI具有扩充性能和克服的问题的能力,是微软公司开发的一种新的方式开发建设规模的应用。

计算机科学与技术 外文翻译 英文文献 中英对照

附件1:外文资料翻译译文大容量存储器由于计算机主存储器的易失性和容量的限制, 大多数的计算机都有附加的称为大容量存储系统的存储设备, 包括有磁盘、CD 和磁带。

相对于主存储器,大的容量储存系统的优点是易失性小,容量大,低成本, 并且在许多情况下, 为了归档的需要可以把储存介质从计算机上移开。

术语联机和脱机通常分别用于描述连接于和没有连接于计算机的设备。

联机意味着,设备或信息已经与计算机连接,计算机不需要人的干预,脱机意味着设备或信息与机器相连前需要人的干预,或许需要将这个设备接通电源,或许包含有该信息的介质需要插到某机械装置里。

大量储存器系统的主要缺点是他们典型地需要机械的运动因此需要较多的时间,因为主存储器的所有工作都由电子器件实现。

1. 磁盘今天,我们使用得最多的一种大量存储器是磁盘,在那里有薄的可以旋转的盘片,盘片上有磁介质以储存数据。

盘片的上面和(或)下面安装有读/写磁头,当盘片旋转时,每个磁头都遍历一圈,它被叫作磁道,围绕着磁盘的上下两个表面。

通过重新定位的读/写磁头,不同的同心圆磁道可以被访问。

通常,一个磁盘存储系统由若干个安装在同一根轴上的盘片组成,盘片之间有足够的距离,使得磁头可以在盘片之间滑动。

在一个磁盘中,所有的磁头是一起移动的。

因此,当磁头移动到新的位置时,新的一组磁道可以存取了。

每一组磁道称为一个柱面。

因为一个磁道能包含的信息可能比我们一次操作所需要得多,所以每个磁道划分成若干个弧区,称为扇区,记录在每个扇区上的信息是连续的二进制位串。

传统的磁盘上每个磁道分为同样数目的扇区,而每个扇区也包含同样数目的二进制位。

(所以,盘片中心的储存的二进制位的密度要比靠近盘片边缘的大)。

因此,一个磁盘存储器系统有许多个别的磁区, 每个扇区都可以作为独立的二进制位串存取,盘片表面上的磁道数目和每个磁道上的扇区数目对于不同的磁盘系统可能都不相同。

磁区大小一般是不超过几个KB; 512 个字节或1024 个字节。

计算机专业毕业设计论文外文文献中英文翻译——java对象

1 . Introduction To Objects1.1The progress of abstractionAll programming languages provide abstractions. It can be argued that the complexity of the problems you’re able to solve is directly related to the kind and quality of abstraction。

By “kind” I mean,“What is it that you are abstracting?” Assembly language is a small abstraction of the underlying machine. Many so—called “imperative” languages that followed (such as FORTRAN,BASIC, and C) were abstractions of assembly language。

These languages are big improvements over assembly language,but their primary abstraction still requires you to think in terms of the structure of the computer rather than the structure of the problem you are trying to solve。

The programmer must establish the association between the machine model (in the “solution space,” which is the place where you’re modeling that problem, such as a computer) and the model of the problem that is actually being solved (in the “problem space,” which is the place where the problem exists). The effort required to perform this mapping, and the fact that it is extrinsic to the programming language,produces programs that are difficult to write and expensive to maintain,and as a side effect created the entire “programming methods” industry.The alter native to modeling the machine is to model the problem you’re trying to solve。

关于计算机的英文文献

关于计算机的英文文献以下是一些关于计算机的英文文献:1. "Computer Science: The Discipline" by David Gries and Fred B. Schneider, published in 1993 in the journal Communications of the ACM.2. "The Art of Computer Programming" by Donald E. Knuth, published in three volumes between 1968 and 1973.3. "A Mathematical Theory of Communication" by Claude Shannon, published in 1948 in the Bell System Technical Journal.4. "Operating Systems Design and Implementation" by Andrew S. Tanenbaum and Albert S. Woodhull, published in 1997.5. "The Structure and Interpretation of Computer Programs" by Harold Abelson and Gerald Jay Sussman, published in 1984.6. "Computer Networks" by Andrew S. Tanenbaum, published in 1981.7. "Introduction to Algorithms" by Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein, published in 1990.8. "Foundations of Computer Science" by Alfred Aho and Jeffrey Ullman, published in 1992.9. "Computer Architecture: A Quantitative Approach" byJohn L. Hennessy and David A. Patterson, first published in 1990.10. "Artificial Intelligence: A Modern Approach" by Stuart Russell and Peter Norvig, first published in 1995.。

计算机专业相关外文文献

计算机专业相关外文文献IntroductionComputer science is a field of study that deals with the theory, design, and application of computers. The field is continuously growing and evolving as new technologies are developed and innovative applications arise. As a result, scholarly literature is essential in keeping up-to-date with the latest trends and developments within the field. This article will provide a comprehensive review of recent academic literature related to computer science.Review of Literature1. Artificial IntelligenceThe field of artificial intelligence (AI) has experienced significant growth in recent years. In their study, “Deep Learning for Computer Vision: A Brief Review,” Chen et al. (2018) provide an overview of deep learning algorithms usedfor object recognition and image classification. Additionally, Kostoulas et al. (2018) analyze the role that AI can play in supporting knowledge management within organizations.2. Computer NetworksComputer networks continue to be a crucial component of communication and data transfer. In his study, “An Overviewof Emerging Wireless Networking Technologies,” Rajamani (2018) provides an overview of emerging wireless networking technologies and their potential applications. Furthermore,Breugel et al. (2018) examine the use of blockchaintechnology for data management in decentralized wireless networks.3. CybersecurityGiven the increasing number of cybersecurity threats,research related to this area has been growing. In their study, “A Survey of Recen t Advancements in Malware Detection Techniques,” Khan et al. (2019) provide an overview ofrecent research focused on malware detection techniques. Alternatively, Mayorga et al. (2018) explore the importanceof training users in preventing cyber-attacks.4. Human-Computer InteractionHuman-computer interaction (HCI) is an interdisciplinaryfield focused on the design and usability of computer systems. In their study, “Twenty Years of CHI: A Bibliometric Overview,” Maldonado et al. (2019) provide an analysi s ofthe development of HCI research during the past two decades. alternatively, Zhou et al. (2018) explore the use of gamification techniques to increase user engagement in online education systems.5. Big DataAs a consequence of the rapid growth in the volume and complexity of data sets, the development of big data-related technologies has gained traction. In their study, “A Comprehensive Study on Big Data Analytics,” Singh et al. (2019) provide an overview of big data analytics technologies and applications. Furthermore, Nisar et al. (2018) explorethe use of machine learning algorithms to improve big datastorage and retrieval systems.ConclusionThis review provides a comprehensive overview of recent academic literature on various topics relevant to computer science. From the review, it is clear that developments in AI, computer networks, cybersecurity, HCI, and big data have the potential to transform various industries. As such, keepingup-to-date with the latest research can help professionals remain abreast of the latest trends and developments in the computer science field.。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

A Rapid Tag Identification Method with TwoSlots in RFID SystemsYong Hwan Kim, Sung Soo Kim, Kwang Seon AhnDepartment of Computer Engineering, Kyungpook National UniversityDaegu, Korea{hypnus, ninny, gsahn}@knu.ac.krAbstract—RFID is core technology in the area of ubiquitous compu-ting. Identify the objects begin with the reader’s query to the tag at-tached to the subject. When multiple tags exist in the reader’s inter-rogation zone, these tags simultaneously respond to the reader’s query, resulting in collision. In RFID system, the reader needs the anti-collision algorithm which can quickly identify all the tags in the interrogation zone. This paper proposes tree based Rapid Tag Identi-fication Method with Two Slots(RTIMTS). The proposed algorithm rapidly identifies a tag with the information of Two Slots and MSB(Most Significant Bit). Two Slots resolve the tag collision by receiving the response from the tag to the Slot 0 and 1. The reader can identify two tags at once using MSB of information added to the tag ID. With RTIMTS algorithm, the total time of tag identification can be shortened by decreasing the number of query-responses from the reader.Keywords-RFID; Anti-collision; Two Slots; the number of query-responses.I.I NTRODUCTIONRFID(Radio Frequency Identification) is a technology that deciphers or identifies the tag information through a reader (or interrogator) without contact. RFID have become very popular in many service industries, purchasing and distribution logis-tics, industry, manufacturing companies and material flow systems. Automatic Identification procedures exist to provide information about people, animals, goods and products in tran-sit[1][2].The reader receives required information from the tags by sending and receiving wireless signals with the tag. Since the communication between the readers and the tags shares wire-less channels, there exist collisions. The collisions can be di-vided into the reader collision and the tag collision. The reader collision occurs when multiple readers send request signals to one tag, and the tag receives the wrong request signal due to signal interference between readers. The tag collision occurs when more than two tags simultaneously respond to one reader and the reader cannot identify any tags. This kind of collision makes the reader take long time to identify tags within the read-er’s identification range and impossible to identify even one tag[3][4][5] [6].Therefore, the collision is a crucial problem that must be re-solved in RFID systems, so many studies to resolve this prob-lem have been carried out as well as are ongoing. This paper focuses on the tag collision problem which occurs in the case where one reader identifies multiple tags. Figure 1 provides schematizations of reader collision and tag collision.This paper proposes the Rapid Tag Identification Method with Two Slots (RTIMTS), for faster tag identification in mul-ti-tag environment where one reader identifies multiple tags. In the transfer paper[7], the proposed algorithm designs the method that it does without the value extracting procedure of even(or odd) parity bit of ID bit(T pb),the number of identified ‘1’s(T1n), the number of remaining ‘1’s(T rn), and the number of collided bit (T cb) with simple it can predict a tagID. Maximum 4 tag IDs canbe identified on one round by using Two slots.a) The Reader collision b) The Tag collisionFigure 1. The collision problem in RFID SystemII.T HE R ELATED WORKSA. Query TreeQuery Tree(QT) algorithm is a binary tree based anti colli-sion algorithm and has an advantage in easily implementation due to its simple operating mode[8]. QT sets the reader’s query and tag’s response as one round, and identifies tags by iterating the round. In each round, the reader requests prefix to tag’s ID. And when ID matches the prefix, each tag transmits all IDs including prefixes to the reader. At this time, if more than one tag simultaneously responds, the reader cannot recognize tag’s ID, but can recognize that there are currently more than two tags having the prefix. Then the reader adds ‘0’ or ‘1’ to the current prefix and queries the longer prefix to the tags again. When only one tag responds to the reader, it identifies the tag. In other words, the reader adds the prefix by 1 bit until only one tag responds and iterates this process until identifying all the tags within the range. Figure 2 shows the operating process of QT algorithms[10].Figure 2 shows the process that four tags respond according to the readers’ query. In round 1, 2, 3, and 7, the collision oc-curs because more than two tags respond, and in round 4, 5, 8, and 9, tag can be identified because only one tag responds. The digital coding method applied to QT cannot detect the collisionbits. When a collision occurs, the reader adds ‘0’ or ‘1’ to the2009 Eighth IEEE International Symposium on Network Computing and Applications 978-0-7695-3698-9/09 $25.00 © 2009 IEEEDOI 10.1109/NCA.2009.21292current prefix and queries this prefix to the tags. While having a merit of the simple realization, this generates an idle cycle which has no response like a round 6 [10].Figure 2. The operating process of Query Tree alogrithmB. Query Tree with Collision-Bit PositioningThe tag identification process of the Query Tree with colli-sion-Bit Positioning(QT-CBP) algorithm is as follows[9]. If a collision occurs, the reader detects the location of the collided bits and gets the number of the collided bits. If one collision is generated, a reader establishes ‘0’ and ‘1’ for a collided bit and it saves them into memory. If more than two collisions are gen-erated, a reader will create a new query prefix by appending ‘0’ and ‘1’ to queries to a head of location bit where the collisions are generated. And, it saves then into next stack. If a tag doesn't respond, a reader won’t move. Until all tags are identified, the above protocol is reiterated[11].The QT-CBP uses a stack differently that the QT uses a queue, and when one bit collision is generated, a reader identi-fies as two tags are existing. If tag ID has a collision conti-nuously, The QT-CBP will identify this in the same way with the QT, so it has to be improved[11].Figure 3 shows the process of identifying four tag IDs. In the step 3, a collision was generated, however, it detected that a collision was generated on the bit 2 of tag ID. So, it added ‘0’ and ‘1’ to the bit 2 respectively and it identifies two tag IDs. In the step 1 and 2, query prefix is created [11].Figure 3. The operating process of Collision-Bit Positioning alogrithmC. Collision Tracking using Manchester CodeIn the proposed algorithm, the reader must know the posi-tion and the number of collided bits. This can be resolved by using Manchester coding, which defines the value of a bit bythe change in level within a bit window. So, the state where the level doesn’t change doesn’t exist. If such state is tracked, it can be identified as a collision[1]. Figure 4 shows that the colli-sion can be tracked by an individual bit window with Manches-ter coding.Figure 4. Manchester code tracing a collision to an individual bitIn Figure 4, when the identification code of tag 1 is 10011111, and the identification code of tag2 is 10111011, two tags transmit their ID to the reader on the reader’s request. In case of the bits (bit 3 and bit 6) where two tags have different levels, like in Figure 4, the ‘no transition’ state continues in one bit block because positive and negative transitions cancel each other out. This state is not permissible in the Manchester cod-ing system and leads to an error, which is identified as a colli-sion. It is thus possible to track a collision to an individual bit when Manchester coding is applied.III. R APID T AG I DENTIFICATION M ETHOD WITH T WO S LOTS This section proposes the RTIMTS algorithm that can quickly identify multiple tags in the reader’s interrogation zone. Contrary to the existing algorithm which arbitrates for only one tag to respond at the specific point while identifying tags, the proposed algorithm identifies tags using a characteris-tic that a collision occurs between the tags. In other words, the RTIMTS algorithm predicts the tag ID by analyzing the num-ber of collided bits, the information of MSB(Most Significant Bit) and Two Slots. Also, it prevents collision as tags, which have the ID matching to the value of [prefix] corresponding to the reader’s request command, respond their ID from the [pre-fix]+2th bit in Two Slots using the [prefix]+1th bit of ID. The next section explains all the necessary details for the RTIMTS algorithm to operate and the way the RTIMTS algorithm oper-ates, while showing the example in which tags are identified by the RTIMTS algorithm.A. MSB informationThe RTIMTS algorithm identifies the tag using the Serial number which is identified by the collision tracking informa-tion by bit and the bit information of MSB inside tag ID. Figure 5 shows the structure of tag ID for the proposed algorithm.⊕⊕⊕⊕⊕Figure 5. Structure of tag IDIn the RTIMTS algorithm, the tag ID consists of MSB and Serial Number. The serial number is the part to store ID num-ber assigned to the tag, while MSB stores the XORed values of all the bits in the Serial Number. The reader predicts multiple tags using the MSB information and the collision tracking in-formation by each bit. The total length of tag ID is the existing Serial Number length + one bit of MSB. For example, if the Serial Number length is 6 bit, the total length of tag ID is 7bit. The tag ID used in the proposed algorithm has following cha-racteristics.•The MSB is always identified at the first part of the tag identification process. Because the reader’s identificationprocess always proceeds from the highest bit to the lowestone of the tag’s ID.•After the reader identifies the MSB of the tag, the tags responding to the reader’s request in the followingidentification process have the characteristics of beingdivided into two groups according to the XORed val-ue(‘1’ or ‘0’) of all the bits in the Serial Number.•The tags with matching [prefix] value of the reader re-ply on the Two Slots using the [prefix] + 1th bit oftheir tag ID. At this time, if there are two collision bits,the reader predicts two tags using the MSB information.B.Prediction MethodWhen the number of collisions is two, two cases where it is possible to predict according to the MSB information, are as followings.•Prediction 1In the case where the XORed value of a bit is ‘0’, thereader predicts (‘0’, ‘0’) and (‘1’, ‘1’) in two collided bits.•Prediction 2In the case where the XORed value of a bit is ‘1’, thereader predicts (‘0’, ‘1’) and (‘1’, ‘0’) in two collided bits.C.The Reader’s Request command and Tag’s RespondsFigure 6. Flow Chart of the RTIMTSFigure 6 shows a flowchart of the RTIMTS algorithm. The reader always pops the prefix from the stack to send the request command to tags. The tags that match the prefix respond their ID in the corresponding Slot from the [prefix]+2th bit accord-ing to the value of [prefix]+1th bit.An anti-collision resolution in the proposed algorithm works by grouping tags using Two Slots. Therefore, the tag in which the [prefix]+1th bit of its ID is ‘0’ replies in Slot 0, while the tag in which the [prefix]+1th bit of its ID is ‘1’ replies in Slot 1. After receiving the responses from tags, the reader se-quentially processes Slots from Slot 0.The possibility of prediction is checked using the proposed algorithm. When one tag replies in one Slot, the tag is identi-fied. And if there are two collisions because the two tags will reply in one Slot and the MSB information of tag ID is known, the reader can predicts the two tags. If it is impossible to pre-dict, two prefixes, in which ‘0’ and ‘1’ are added to the first collided bit, will be pushed onto the stack before proceeding to the next step. And then identifies all the tag in which a collision occurs with the iteration of above process.D.An example of RTIMTSFigure 7 shows that the way the requests of the reader and the responses of the tags process in the RTIMTS algorithm.Figure 7. Example of the RTIMTSIn the 1st iteration, the reader sends a request to tags with empty string(€) as a factor. Since the € is considered to match with every prefix, all the tags respond their ID in the corres-ponding Slot from the [prefix]+2th bit according to the value of [prefix]+1th bit.In Slot 1, the reader can identify tag 1 and tag 4 using the MSB information like the section III.B. The reader received the response signal, “11010X1X0”, from tags, the XORed value of a bit is 1 ⊕ 1 ⊕ 0 ⊕ 1 ⊕ 0 ⊕ 1⊕ 0 = 0. This case corresponds to Prediction 1, and ‘0’, ‘0’ and ‘1’, ‘1’ can be predicted in two collided bits. Therefore, two tags, “10100100” and “10101110”, are identified. With the proposed algorithm, thetag identification time can be shortened by predicting the tag using the MSB information anti-collision in the cases of two collisions and using Two SlotsIn the 2nd iteration, if the reader transmits “01” as the pre-fix value of a request, tag 2 and tag 3 that match prefix respond the ID in the corresponding Slot from the [prefix]+2th bit. In this case, two tags can be identified because only one tag rep-lies in the corresponding Slot.IV.P ERFORMANCE E VALUATIONIn this section, we evaluate the performance of the pro-posed algorithm in this paper. In the evaluation, we compared with the average number of query-responses of readers and tags of the QT algorithm, the QT-CBP algorithm, and the Anti Col-lision algorithm using Parity Bit(ACPB) algorithm[7] that wereproposed before by planning a simulation program with C# language.In the simulation program, the users can control the length of tag ID, number of tags and allocation of the tag ID. Tag ID lengths of 8 bit were used in the experiments. In each experi-ment, we used random assignment method and sequential as-signment method. We measured the number of query-responses between the reader and tags by changing the number of tags. Since less number of query-responses between the reader and tags represents that the reader can identify the tags faster, we regards the number of query-responses as time in the perfor-mance evaluation.Figure 8 shows the cases that 8 bit IDs are allocated to ran-dom assignment and sequential assignment. As shown in Fig-ure 8 a) and 8 b), the proposed algorithm shows better perfor-mance than other algorithms even if the number of tags in-creases.The results show that in the random assignment of 8 bit tag IDs experiments; the proposed algorithm has overall 79% less query iterations than the QT, 53% less than the QT-CBP, and 50% less than the ACPB. In case of the sequential assignment, the number of query iterations was reduced by about 82% compared to the QT, by about 50% compared to the QT-CBP and the ACPB.a) 8bit random assignmentb) 8 bit sequential assignmentFigure 8. 8 bit random assignment and sequential assignmentV.C ONCLUSIONIn RFID system, the tag collision problem occurs in multi-tag environment where multiple tags are identified. The anti-collision algorithm is necessary to arbitrate the collision and to identify all the tags faster.Added MSB can predict two bit patterns when two colli-sions occur. When the reader sends the request to tags with prefix as a factor, the only tags having the ID whose prefixes match the received prefix, respond. There tags can resolve the collision problem by selecting a Slot using the information of prefix+1th bit.R EFERENCES[1]K. Finkenzeller, RFID Hand Book: Fundamentals and Applications in ContactlessSmart Card and Identification, Second Edition, John Wiley & Sons Ltd, 2003. [2]P. H. Cole, “Fundamentals in RFID part1,” Korean RFID course, 2006, Availableat:.au/education/FundamentalsInRfidPart1.pdf. [3]S. Sarma, D. Brock, and D. Engels, "Radio Frequency Identification and theElectronic Product Code," IEEE Micro, vol. 21, no. 6, pp. 50-54, November 2001.[4] D. W. Engels and S. E. Sarma, “The Reader Collision Problem,” In Proceedings ofIEEE International Conference on SMC 02, 2002.[5]J. Waldrop, D. W. Engels, and S. E. Sarma, “Colorwave: An AnticollisionAlgorithm for the Reader Collision,” In proceedings of IEEE ICC 03, 2003. [6]J. Myung, and W. Lee, "Adaptive Binary Splitting: A RFID Tag CollisionArbitration Protocol for Tag Identification," ACM MoNET 06, vol. 11, no.5, pp.711-722, 2006.[7]S. S. Kim, Y. H. Kim, S. J. Lee, and K. S. Ahn, "An Improved Anti CollisionAlgorithm using Parity Bit in RFID System," Seventh IEEE International Symposium on NCA 08, pp. 224-227, 2008.[8] C. Law, K. Lee, and K. Y. Siu, “Efficient Memoryless protocol for TagIdentification”, In Proceedings of the 4th international workshop on DIALM 00, ACM, pp. 75-84, 2000.[9]H. Lee, J. Kim, “QT-CBP : A New RFID Tag Anticollision Algorithm UsingCollision Bit Positioning”, EUC 06, LNCS, Springer Vol. 4097, pp. 591-600, 2006.[10]Y. H. Kim, S. S. Kim, S. J. Lee, and K. S. Ahn, " An Anti-Collision Algorithmwithout Idle Cycle using 4-ary Tree in RFID System," ICUIMC 09, ACM, pp.642-646, 2009.[11]Y. T. Kim, S. J. Lee, and K. S. Ahn, " An Efficient Anti-Collision Protocol UsingBit Change Sensing Unit in RFID System," The 14th IEEE International Conference on RTCSA 08, pp. 81-88, 2008.。

相关文档
最新文档