Share / Export Citation / Email / Print / Text size:

International Journal of Advanced Network, Monitoring and Controls

Xi'an Technological University

Subject: Computer Science , Software Engineering


eISSN: 2470-8038



Quadrotor Formation Control Method Based on Graph and Consistency Theory
Advanced Dynamic Autonomous Knowledge Learning Method for Distance Learning



Volume / Issue / page

Trending Articles

VOLUME 4 , ISSUE 1 (Sep 2019) - List of articles

The Shortcomings of Ipv6 and Upgrade of Ipv4

Tao Wang/ Jiaqiong Gao

Abstract IPv6 is to solve the problem of IPv4 address exhaustion, with the development of the Internet of things, big data and cloud storage and other technologies, these technologies are gradually applied in recent years, the continuous development of new technologies application show that the IPv6 address structure design ideas have some fatal defects. This paper proposed a route to upgrade the original IPv4 by studying on the structure of IPv6 “spliced address”, and point out the defects in t(..)

DOI: 10.21307/ijanmc-2019-029

Research and Design of Next Generation Internet (IPV9) Datagram

Zhongsheng Wang/ Jianping Xie/ Zhao Lin/ Wei Zhong

Abstract The current global Internet USES the TCP/IP protocol cluster. IP is the network layer protocol and the core protocol in this protocol family. The current version is IPv4 with 32-bit addresses. With the popularity of Internet applications, the limited address space defined by IPv4 has been exhausted. To expand the address space, the Internet Engineering Task Force (IETF) has designed the next generation IP protocol, IPv6, to replace IPv4. IPv6 redefines the address space, using a 128-bit(..)

DOI: 10.21307/ijanmc-2019-030

Design and Research of New Network Address Coding

Yufeng Lai/ Jianping Xie/ Xiaowei Cheng/ Yuyu Li

Abstract To solve a series of problems caused by address space and information security of contemporary Internet, Chinese scientists have proposed a new generation of network architecture. Since the release of IPv4 RFC791 in 1981, it has become the first widely used Internet of things protocol due to its characteristics of easy implementation and good operability. It constitutes the basic protocol of current Internet technology. However, due to the defects in address classification, address reso(..)

DOI: 10.21307/ijanmc-2019-031

Research of New Network Address Structure

Jiao Chong/ Jianping Xie/ Yinqiu Xu/ Hongwen Zhao

Abstract With the wide application of Internet technology, the number of hosts accessing the Internet has grown rapidly, and addresses will be more and more widely used in other intelligent terminals such as e-commerce logistics codes, space codes, identity codes, and 3D geocodes. The number of existing addresses is no longer sufficient for this development demand. The emergence of IPv6 temporarily alleviated the problem of IP address shortage, and IPv6 did not fully consider the security of dat(..)

DOI: 10.21307/ijanmc-2019-032

Rotation center calibration based on line laser rotating platform

Doudou Lei/ Baolong Liu/ Huimin Yao

Abstract Line lasers are of great significance in many fields such as industrial inspection, machine vision, cultural relics identification, mechanical design, and medical oral cavity. The three-dimensional reconstruction of the line laser can accurately obtain the three-dimensional information of the surface of the object, and quickly complete the three-dimensional contour reconstruction of the object to be tested. In the online laser rotation scanning, the object rotates around a certain point(..)

DOI: 10.21307/ijanmc-2019-033

A Full Decimal Method of Address Assignment for Networked Computer

Xin Zhan/ Jianping Xie/ Liming Jin/ Jiawen Lai

Abstract The full decimal method of address assignment for networked computers and intelligent terminals which input into the computer through various input devices of the computer and intelligent terminals is realized, and then, the external address of networked computer and intelligent media stored in the database and the internal arithmetic address are created correspondingly through a variety of transmission media by combination of different computer hardware and software. The new address as(..)

DOI: 10.21307/ijanmc-2019-034

From Network Security to Network Autonomous

Yubian Wang/ Shebzukhov Yuri

Abstract In the 20th century, the emergence of the Internet has completely changed the work and life of human beings around the world. Today, people are increasingly inseparable from network. The Internet has been integrated with the global industry, agriculture, education, science, technology and national defense. The current Internet was originated in the United States. The Internet systems based on IPv4 and IPv6, they are controlled by the United States completely. Computers connected to the (..)

DOI: 10.21307/ijanmc-2019-035

A Survey of Calibration Methods for Traditional Cameras Based on Line Structure Light

Ruixia Wu/ Baolong Liu/ Huimin Yao

Abstract The line structure light three-dimensional reconstruction system is a kind of three-dimensional non-contact measurement system, which has the advantages of high precision, high speed, small damage to objects and strong adaptability. Camera calibration is a major factor that constrains the accuracy of 3D measurement systems. The camera calibration is based on the pinhole imaging model, and through a series of complex calculations, the camera’s internal parameters (focal length, distortio(..)

DOI: 10.21307/ijanmc-2019-036

Research on Harris Corner Detection Method in Palmprint Recognition System

Hejing Wu

Abstract Palmprint location is the premise of feature space extraction and feature recognition, the speed and accuracy of palmprint location directly affect the speed and accuracy of palmprint recognition system, and the extraction of contour feature points is the key of palmprint location. The contour of palmprint is extracted by gray morphological gradient; then, based on the analysis of palmprint appearance characteristics, Harris corner is used to extract the key feature points of the image,(..)

DOI: 10.21307/ijanmc-2019-037

Research on Digital Camouflage Design and Camouflage Material of Tent Cloth

Zhiyi Hu/ Tong Xian/ Jun YU/ Haitao Su

Abstract Aiming at the distortion of texture details in Digital Camouflage design, as well as the poor camouflage performance, fast fading and short life of camouflage tent cloth, this paper presents a design method of Digital Camouflage based on target background, develops a camouflage coating with good weather resistance, color difference and spectral reflectance meeting the limited requirements, and realizes the paint printing of camouflage tent cloth. The results show that the digital camouf(..)

DOI: 10.21307/ijanmc-2019-038

The Research of a New Iteration of the Circular Algorithm

Shuping Xu/ Menyao Huang/ Li Chen/ Pei Xu

Abstract It is a problem of spectra analysis of flue gas that how to separate and calculate the concentration of different kinds of gas from continuous mixed gas absorption spectrum signal. So based on experimental data, a new iteration of the circular algorithm is put forward on the basis of Lambert-Beer’s law. The algorithm uses different UV-light wavelengths at 190nm-290nm for different characteristics of UV light with different absorption peaks. The iteration is repeated until the concentrat(..)

DOI: 10.21307/ijanmc-2019-039

Application of Chaotic Encryption in RFID Data Transmission Security

Jianfang Yang/ Baolong Liu/ Huimin Yao

Abstract In order to improve the security performance of data transmission in the RFID system, the sequence generated by the chaotic map is used to encrypt the data transmitted between the reader and the tag in the RFID. Based on the unpredictability, extreme sensitivity to initial conditions, and pseudo-random characteristics of chaotic sequences, the information of each electronic tag is encrypted with a unique chaotic sequence. The same operation mechanism is used to encrypt and decrypt data,(..)

DOI: 10.21307/ijanmc-2019-040

No Record Found..
Page Actions