Special Column-Network and Business Requirements for 6G

Trustworthy requirements and application scenarios in 6G network

DOI:10.16157/j.issn.0258-7998.211361

Author:Liu Qiuyan1,Li Mingxuan1,Lv Xuan2,Li Jiajun3,Zhang Zhonghao1,Li Fuchang1,Zhu Xuetian1

Author Affilications:1.China Unicom Research Institute,Beijing 100048,China; 2.China Unicom Beijing Branch,Beijing 100031,China;3.China Unicom Huasheng Co.,Ltd.,Beijing 100031,China

Abstract:In this paper, trusted networking is proposed as one of the most important technologies trend in 6G network according to the status of services and applications in 5G network. In 6G network, network trust is proposed as a complementary concept of network security. Compared with network security based on the presumption of guilt, network trust is designed based on the presumption of innocence to prove itself without network attack of threat. Finally, trust requirements in next generation network are analyzed with the trend of higher frequency spectrum, capital expenditure, operational expenditure, and multi-domain integrated, including random access network sharing, space-ground integrated network and massive connection Internet of Things.
Key word:
wireless network
6G
trusted network
requirement analysis

Discussion of requirement,version and application scenarios toward 6G communications

DOI:10.16157/j.issn.0258-7998.211374

Author:Wang Yuxin1,2,3,Zhang Xiuyin1,Xu Hanqing2,3,Tang Jie1,Chen Zhen1

Author Affilications:1.School of Electronics and Information,South China University of Technology,Guangzhou 510641,China; 2.ZTE Corporation,Shenzhen 518055,China; 3.State Key Laboratory of Mobile Network and Mobile Multimedia Technology,Shenzhen 518055,China

Abstract:While 5G network is currently being deployed around the world, number of reserchers and organizations have begun to study 6G. This paper analyzes the challege of 5G network firstly, and then discusses the requirements, version and application scenarios toward 6G, and predicts the key performance indicators of 6G.
Key word:
B5G/6G
requirement
version
AI

The sixth-generation mobile communication network with endogenous intelligence: architectures,use cases and challenges

DOI:10.16157/j.issn.0258-7998.211392

Author:Sun Yaohua,Wang Zeyu,Yuan Shuo,Peng Mugen

Author Affilications:State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications, Beijing 100876,China

Abstract:In order to meet the growing demand of new services and facilitate the application of communication technology in vertical industries, mobile communication networks will gradually evolve with more intelligence, finally resulting in endogenous intelligence in the 6G era. However, most of the current research focuses on artificial intelligence(AI) based transmission and network optimization methods and rarely discusses how to support AI efficiently in the perspective of network architecture design. To fill this gap, this paper introduces the advances in wireless network architectures with endogenous intelligence proposed by both industry and academia and then discusses two use cases as well as related challenges.
Key word:
6G
wireless network architecture
artificial intelligence

Expert Forum

Empirical study on urban data governance based on “one database & two chains”

DOI:10.16157/j.issn.0258-7998.218401

Author:Lu Zhipeng

Author Affilications:China Electronics Corporation,Beijing 100190,China

Abstract:As a new production factor, data plays an important role in urban economic and social development. It is urgent to implement Data Governance Project more scientifically and systematically due to the difficulty in releasing data value. China Electronics Corporation(CEC) implements the strategy of Digital China and Cyberpower . It proposes a three-level model system of data elements, which is composed of data element model, application model, pricing and security audit model, and designs the project implementation path of "one database, two chains" and "three-level market", so as to promote the "three sublimation" of data resources, assets and capitalization, and build a new city engine of high-quality development to make the city more wonderful and the people happier.
Key word:
data governance
one database & two chains
data element
data factor

Review and Comment

Driving effect of big data on 5G network and service optimization

DOI:10.16157/j.issn.0258-7998.201191

Author:Kan Yifu1,Zhang Tuo2

Author Affilications:1.Engineering College of Yanbian University,Yanbian 133002,China;2.63850 Army,Baicheng 137000,China

Abstract:5G network itself belongs to the mobile communication network. After the comprehensive upgrading and transformation of network transmission mode, 5G network can ensure shorter communication delay effect, improve the quality of mobile communication and create a new fast communication network operation mode. Specifically, in the current practice of overall optimization and transformation of network service mode, the basic measure is to integrate the important driving technical means of big data, fully rely on big data means and platform to optimize the overall implementation effect of network service, and create the best mobile communication experience for network users.
Key word:
big data
5G network
service optimization
driving role

Special Column-Edge Computing

Research on cloud edge coordination technology of demand side resources participating in system control within Energy Internet

DOI:10.16157/j.issn.0258-7998.201475

Author:Pan Mingming1,Tian Shiming1,Liu Zongjie2,Yuan Jindou1,Chen Songsong1

Author Affilications:1.Beijing Key Laboratory of Demand Side Multi-Energy Carriers Optimization and Interaction Technique, China Electric Power Research Institute,Beijing 10092,China; 2.State Grid Shandong Electric Power Company,Jining 272000,China

Abstract:Energy Internet technology can realize the information fusion of demand side adjustable power load resources, transmission and distribution resources, power generation resources, and play the value benefits of demand side adjustable power load in peak load and frequency regulationof power grid. In this paper, by integrating the advantages and disadvantages of different control modes for demand side resources, a framework and method of decentralized collaborative control within demand side resource cluster and regional grid coordinated control is proposed, which can effectively improve the flexibility and rapidity of adjustable resource response grid frequency regulation.
Key word:
Energy Internet
adjustable load
grid regulation
load aggregation
edge computing

Research of alarm correlation technique for edge cloud computing in power communication network

DOI:10.16157/j.issn.0258-7998.201269

Author:Li Jixuan1,Wu Zichen1,Guo Tao1,Zhu Pengyu2,Wu Jihua3

Author Affilications:1.Information and Communication Branch of State Grid Jiangsu Electric Power Co.,Ltd,Nanjing 210000,China; 2.State Grid Electric Power Research Institute Co.,Ltd,Nanjing 210012,China; 3.State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications, Beijing 100876,China

Abstract:The demand for electric power and the coverage of power communication network has been gradually expanding, which brings the challenges that need to be addressed in the operation and maintenance of the domain. The deployment of edge nodes provides the availability of data collection, information filtering and computational support, which can heavily alleviate the pressure of management. Alarm analysis is a key and difficult problem in operation and maintenance. The traditional alarm analysis first uses rules to merge alarms, so as to reduce the workload of subsequent processing. However, the completeness of rules requires a lot of expert knowledge and human resources investment, and there are limitations. This paper proposed a novel and lightweight algorithm. In this paper, Unsupervised clustering is introduced into the alarm merging process of power communication network edge cloud computing, and the density based clustering method is combined with the existing merging rules. The experimental results show that the effect of alarm merging can be significantly improved by adding unsupervised learning, which is helpful to improve the accuracy and completeness of subsequent defect location.
Key word:
unsupervised learning
DBSCAN
alarm correlation
edge computing

Research and application on agile intelligent system named “SWIFT”

DOI:10.16157/j.issn.0258-7998.201331

Author:Fang Ke1,Ning Kun2,Pan Ling1

Author Affilications:1.Sichuan Key Laboratory of Agile Intelligent Computing,Chengdu 610036,China; 2.Dongfang Electric Wind Power Co.,Ltd.,Deyang 618000,China

Abstract:In view of the lack of sufficient computing, storage and communication network resources for computing equipment at the edge of inclement industrial environments, and the requirement for ms-level data processing response, the agile intelligent system named “SWIFT” was introduced from the general architecture, hardware and software composition and key technology. This system has been verified in wind power equipment, which improves the user′s ability to optimize wind turbine operation and maintenance detection, and reduces downtime loss and operation cost. At the same time, it also discussed that the agile intelligent cluster computing technology could be applied in not only intelligent operation and maintenance of single wind turbine,but also the intelligent operation of large-scale wind farm.
Key word:
edge computing
operations and maintenance
intelligent clustering
wind power

Exploration of OLT converged edge computing for industrial internet

DOI:10.16157/j.issn.0258-7998.201072

Author:Gan Yuying,Sun Hui,Liang Zhenming

Author Affilications:Chinatelecom Corporation Shanghai Research Institute,Shanghai 210043,China

Abstract:The industrial internet site has the complexity brought by a large number of heterogeneous devices and networks, as well as the real-time and reliability problems of industrial production. If data analysis and control logic are all implemented in the cloud, it is difficult to meet the network requirements of industrial scenarios. However, edge computing can meet the development needs of the industrial internet in terms of service real-time and reliability. This paper proposes three technical solutions for optical line terminal(OLT) converged edge computing for industrial internet,mainly through the edge computing and OLT business connection, route forwarding and management functions and other aspects of the analysis. Comparing the differences among the three solutions of OLT built-in edge computing with value-added functions, OLT built-in edge computing with general functions, and OLT external edge computing, according to their differences, the scene requirements applicable to different factories are proposed.
Key word:
edge computing
optical line termina
built-in resource board

Research of fault diagnosis of power communication network in edge cloud computing

DOI:10.16157/j.issn.0258-7998.201347

Author:Zhu Pengyu1,Cai Xinzhong1,Xu Shiyuan1,Wu Jihua2,Wang Jingyu2

Author Affilications:1.State Grid Electric Power Research Institute Co.,Ltd.,Nanjing 210012,China; 2.State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications, Beijing 100876,China

Abstract:The expansion of the power communication network and the deployment of smart grids have brought massive amounts of data and calculation pressure to the operation and maintenance center. Edge computing can alleviate the pressure on the grid management platform to process massive amounts of data, reduce computing overhead, and assist operation and maintenance personnel efficiently complete fault diagnosis and maintenance. This paper proposed a power communication network fault diagnosis technical solution based on the edge computing architecture combined with the knowledge graph technology, will focus on the new ecology of edge computing in the power communication network. For improving the traditional rule-based technology and enhancing the reliability and efficiency, the system integrates a variety of intelligent methods to realize fault diagnosis under the edge computing architecture, and realizes timely detection of faults and dispatch maintenance through analysis of equipment alarms and network topology.
Key word:
fault diagnosis
knowledge graph
anomaly detection
edge computing

Artificial Intelligence

Research on the design and optimization method of CNN accelerator based on HLS tools

DOI:10.16157/j.issn.0258-7998.200841

Author:Cheng Jiafeng,Wang Hongliang

Author Affilications:National Key Laboratory for Electronic Measurement Technology,North University of China,Taiyuan 030051,China

Abstract:Based on the idea of software and hardware co-design, this article uses HLS tools to design and implement a convolutional neural network accelerator on the PYNQ-Z2 platform, and uses the matrix cutting optimization method for convolution operations to balance resource consumption and computing resources , so that the performance of the accelerator is optimized. This article uses the MNIST data set to test the performance of the accelerator IP core. The experimental results show that: for a single image test, the accelerator achieves an acceleration effect of 5.785 compared with the ARM platform, and an acceleration of 9.72 for a 1000 image test. As a result, as the number of test images continues to increase, the performance of the accelerator will become better and better.
Key word:
convolutional neural network(CNN)
PYNQ-Z2
HLS tool
accelerator

GSDCPeleeNet:efficient lightweight convolutional neural based on PeleeNet

DOI:10.16157/j.issn.0258-7998.200844

Author:Ni Weijian,Qin Huibin

Author Affilications:Institute of New Electronic Devices and Applications,School of Electronic Information,Hangzhou Dianzi University, Hangzhou 310018,China

Abstract:Convolutional neural network plays an important role in various fields, especially in the field of computer vision, but its application in mobile devices is limited by the excessive number of parameters and computation. In view of the above problems, a new convolution algorithm, Group-Shard-Dense-Channle-Wise, is proposed in combination with the idea of grouping convolution and parameter sharing and dense connection. Based on the PeleeNet network structure, an efficient lightweight convolutional neural network, GSDCPeleeNet, is improved by using the convolution algorithm. Compared with other convolutional neural networks, this network has almost no loss of recognition accuracy or even higher recognition accuracy under the condition of fewer parameters. In this network, the step size s in the channel direction of convolution kernel in the 1×1 convolutional layer is selected as the super parameter. When the number of network parameters is smaller, better image classification effect can be achieved by adjusting and selecting the super parameter appropriately.
Key word:
image classification
convolutional neural network
lightweight
dense connectivity
parameter sharing

Review and Comment

Research on intergenerational and development of hybrid integration technology

DOI:10.16157/j.issn.0258-7998.200869

Author:Zhu Yusheng1,Shi Jing2,Chen Cheng1

Author Affilications:1.The 43rd Research Institute of CETC,Anhui Key Laboretory of Microsystems,Hefei 230088,China; 2.Army Artillery Air Defense Academy,Hefei 230039,China

Abstract:Hybrid integration technology is a kind of high-end packaging technology that directly encapsulates zero level devices into 1-3 level modules or systems to meet the requirements of small volume, light weight, strong function, high reliability, wide frequency, high precision and good stability for aerospace, electronic and weapon equipment. Since the 1970s, hybrid integration technology has gone through the stages from thick/thin film assembly to multi chip module(MCM), system level packaging(SIP), micro system integration and so on. It always focuses on the connection between micro-devices and macro-devices, which is a continuous innovation technology of multi-disciplinary integration for design,material,technics,project,experiment. In this paper, by analyzing and studying the process characteristics, key points and typical products of hybrid integration technology in different periods, the development of hybrid integration technology is divided into four generations by induction and summary. Meanwhile, according to the technical characteristics and trends of different generations, it also tries to predict the development direction of the next generation of hybrid integration technology.
Key word:
hybrid integrated circuit
hybrid integration technology
thick/thin film
system in package
generations

Survey of anonymous communication system

DOI:10.16157/j.issn.0258-7998.200995

Author:Chen Huan1,Su Majing1,Wang Xuebin2,Song Dong1

Author Affilications:1.National Computer System Engineering Research Institute of China,Beijing 100083,China; 2.Institute of Information Engineering,Chinese Academy of Sciences,China

Abstract:Anonymous communication system refers to a network that is built on the network application layer and combines data forwarding, content encryption, traffic obfuscation and other technologies to realize the association between communication entities and the hidden content of the communication content from third parties. In the usage scenarios of business secret transmission and electronic voting, it is an important evaluation standard to ensure that the user′s personal identity and behavior are not recognized by eavesdroppers. Anonymous communication system is to solve the above problems. Anonymous communication system has the characteristics of untraceable message and communication cannot be monitored by a third party. On the one hand, from the perspective of hidden data transmission, anonymous communication systems can enhance the security of the system. On the other hand, due to the abuse of anonymous communication technology, illegally constructed private hidden services are numerous and endless, bringing network security and social stability.Sorting out the current anonymous communication systems and technologies is helpful to understand the development status of anonymous communication technologies, and then use anonymous communication technologies more reasonably to build anonymous communication systems to achieve safe and reliable transmission of information.
Key word:
anonymous communication system
evolution
principle
threat
evaluation

Microelectronic Technology

Design of dedicated DMA applied to navigation SoC

DOI:10.16157/j.issn.0258-7998.200909

Author:Qin Shuang1,2,Li Jian1,Yang Ying1,Chen Jie1

Author Affilications:1.Institute of Microelectronics of the Chinese Academy of Sciences,Beijing 100029,China; 2.University of Chinese Academy of Sciences,Beijing 100049,China

Abstract:The rapid development of satellite navigation technology and society has made the demand for high-precision positioning increasingly large. With the increase of navigation systems and frequency points, the amount of data that needs to be processed in the navigation module is increasing. The general DMA(Direct Memory Access)controller cannot complete the transmission of a large number of channels, and the transmission using the CPU requires a lot of CPU time. The dedicated DMA applied to the navigation system on chip(SoC) supports the data movement of the navigation channel of the whole system and the whole frequency point. After testing and verification, the clock cycle required by the DMA to move the same channel number of data is one-third of the CPU One, effectively improving the efficiency of the CPU. Low-power optimization technology is used in the design, after optimization, the dynamic power consumption of the DMA module is reduced to 15% of the original.
Key word:
navigation
SoC
DMA

Artificial Intelligence

A method for identifying Tor hosts based on machine learning techniques

DOI:10.16157/j.issn.0258-7998.200759

Author:Zhang Ling1,Wei Chuanzheng1,Lin Zhenbiao1,Duan Linlin2

Author Affilications:1.Beijing Cyber XingAn Technology Co.,Ltd.,Beijing 102200,China; 2.School of Information Engineering,Zhengzhou University,Zhengzhou 450001,China

Abstract:Tor is an anonymous Internet communication system based on onion routing network protocol. Network traffics generated by normal applications become hard to trace when they are delivered by Tor system. However, an increasing number of cyber criminals are utilizing Tor to remain anonymous while carrying out their crimes or make illegal transactions. As a countermeasure, this paper presents a method able to identify Tor traffics and thereby recognize related Tor hosts. The method proposes several groups of features extracted from network traffic and resort to machine learning algorithm to evaluate feature effectiveness. Experiments in real world dataset demonstrate that the proposed method is able to distinguish Tor flows from normal traffics as well as recognize the kind of activity in Tor generated by different normal applications.
Key word:
darknet detection
Tor
communication entity recognition
machine learning

Sentiment analysis of Weibo based on TFIDF-NB algorithm

DOI:10.16157/j.issn.0258-7998.200748

Author:Yang Ge1,2,Yang Lutao1

Author Affilications:1.Key Laboratory of Intelligent Multimedia Technology,Beijing Normal University(Zhuhai Campus),Zhuhai 519087,China; 2.Engineering Lab on Intelligent Perception for Internet of Things(ELIP),Shenzhen Graduate School,Peking University, Shenzhen 518055,China

Abstract:In view of the large amount of public opinion information on Weibo, irregular and random changes, this paper proposes a Weibo sentiment analysis method based on TFIDF-NB(Term Frequency Inverse Document Frequency-Naive Bayes) algorithm. By coding a Weibo comment crawler based on the Scrapy framework, several Weibo comments on a hot event are crawled and stored in the database. Then text segmentation and LDA(Latent Dirichlet Allocation) topic clustering are performed. And finally the TFIDF-NB algorithm is used for sentiment classification. Experimental results show that the accuracy of the algorithm is higher than that of the standard linear Support Vector Machine algorithm and the K-Nearest Neighbor algorithm, and it is higher than the K-Nearest Neighbor algorithm in terms of accuracy and recall, and it has a better effect on sentiment classification.
Key word:
Weibo public opinion
web crawler
sentiment classification

Measurement Control Technology and Instruments

Research on the design scheme of high reliability fairing air conditioning system

DOI:10.16157/j.issn.0258-7998.200550

Author:Liu Xuefei1,Liu Hong1,Kuai Liang1,Su Shishi2,Wang Shuai1,Min Xiaoshuang1

Author Affilications:1.The 6th Research Institute of China Electronics Corporation,Beijing 102209,China; 2.CS&S Information System Engineering Co.,Ltd.,Beijing 102209,China

Abstract:Aiming at the requirements of the design parameters temperature, humidity and air volume of the fairing air conditioner in a launch site, the implementation plan of the traditional fairing air conditioning system was investigated. In this paper, from the aspects of information security and reliability, a redundant automatic control system for air conditioning with fairing based on domestic PLC was proposed. In this regard, the article introduces the functions of domestic super Yu PLC components, redundant unit system scheme, and builds the system architecture and control scheme from the hardware and software aspects. Through on-site experimental debugging, the feasibility and stability of the fairing air conditioning control system are verified, and it has obvious advantages such as safety and reliability. It solves the problem of zero application of domestic PLC in the fairing air conditioning system and is a high reliability fairing air conditioning system design plan.
Key word:
fairing
air-conditioning control system
PLC
independent safety

SOC estimation of lithium battery based on extended Kalman filter algorithm

DOI:10.16157/j.issn.0258-7998.200607

Author:Cui Gengtao,Jiang Weihua,Tu Wei

Author Affilications:School of Electrical Information,Wuhan Institute of Technology,Wuhan 443000,China

Abstract:In the battery management system, the accurate estimation of State of Charge(SOC) has an important position, its impor- tance is not only to the user prompt battery remaining power, more is that it is the basis of the battery charge and discharge management and balanced control management.And SOC is affected by many factors, such as temperature and current size,direction,etc,so it is difficult to predict it accurately.In this paper, an extended Kalman filter(EKF) algorithm is proposed to estimate the SOC of lithium battery.The battery model was established, and the parameter identification was carried out through the Hybrid Pulse Power Characteristic(HPPC) test.The SOC estimation error of the model is about 2.1% under constant discharge,it shows that the model is effective and easy to apply.
Key word:
the lithium battery
EKF algorithm
HPPC test
SOC estimation

Microelectronic Technology

Design of a BP neural network SoC based on domestic embedded CPU

DOI:10.16157/j.issn.0258-7998.200949

Author:Xu Wenliang

Author Affilications:School of Electronic Information,Hangzhou Dianzi University,Hangzhou 310018,China

Abstract:The paper designs a Back Propagation(BP)neural network system on chip(SoC) based on the domestic embedded Central Processing Unit(CPU) CK803S and its SoC design platform. The design structure of SoC and the design scheme of BP neural network hardware accelerator are given, and for the non-linear BP activation functions Sigmod and Guass, a method that can save hardware resources while not affect the speed is selected to implement them,and optimize accelerator′s performance and power consumption.The verification results show that the design can meet the requirements.
Key word:
BP neural network
domestic embedded processor CK803S
SoC design platform
FPGA implement

Design of GaN-based input harmonic control RF power amplifier

DOI:10.16157/j.issn.0258-7998.201247

Author:Shao Yuwei,Tao Hongqi

Author Affilications:Science and Technology on Monolithic Integrated Circuits and Modules Laboratory,Nanjing Electronic Devices Institute, Nanjing 210016,China

Abstract:The influence of input harmonic control theory on the performance of power amplifier efficiency is qualitatively analyzed. At the same time, the 0.25 ?滋m GaN HEMT device from Nanjing Institute of Electronic Devices was selected, and the load pull test and harmonic balance simulation of the GaN HEMT device were carried out. According to the test results, it is found that the efficiency of the RF power amplifier can be effectively improved through the input harmonic control, and an efficiency improvement at 3~10%can be obtained in band. Based on this, an X-band single-stage monolithic microwave integrated circuit(MMIC) power amplifier was designed. After testing, the power amplifier chip has a maximum PAE at 52.88% in the range of 9.2 to 11.3 GHz.
Key word:
power amplifier
input harmonic control
high efficiency
monolithic microwave integrated circuit

Communication and Network

Binary space partition-based anomaly detection algorithm in wireless sensor networks

DOI:10.16157/j.issn.0258-7998.200872

Author:Zhou Wanli1,Wang Ziqian2,Xie Wanli1,Tan Anzu1,Yu Jieyue3

Author Affilications:1.Information Management Office,Eye Hospital, Wenzhou Medical University,Wenzhou 325000,China; 2.Testing Department,Zhejiang Fangyuan Testing Group Co.,Ltd.,Hangzhou 310000,China; 3.College of Digital Media, Hangzhou University of Electronic Science and Technology,Hangzhou 310000,China

Abstract:The performance of wireless sensor networks(WSNs) depends on the quality of the data collected. At first, the data sensed by the node is rough, and an effective data detection algorithm should be used to distinguish abnormal data from normal data. Therefore, binary space partition-based anomaly detection(BSP-AD) algorithm is proposed in this paper. The BSP-AD algorithm trains and tests data through binary space partition(BSP) trees. Firstly, the range of normal data is obtained through the training data, and then some abnormal parts in the test data are detected through this range. Simulation results show that the proposed BSP-AD algorithm can accurately detect abnormal data, and the cost of calculation and storage is lower than IDLO algorithm.
Key word:
wireless sensor networks(WSNs)
anomaly detection
binary space partition(BSP)
mass estimation
split point

A way of decreasing the reliability of new OFDM data link

DOI:10.16157/j.issn.0258-7998.200561

Author:Su Yuhang,Chen Zhao,Zhai Nuo,Jing Shiqi

Author Affilications:School of Mechanical and Electronic Information,China University of Geosciences Wuhan,Wuhan 430000,China

Abstract:A new OFDM data link model based on OCML is proposed to solve the problem of reliability of data link of air-to-ground radar. The above model uses OCML spatiotemporal chaotic sequence to improve CCSK soft spread spectrum, and simulates with coding and modulation techniques. Simulation analysis shows that the new OFDM data link model based on OCML can effectively improve the reliability of pseudorandom sequences in CCSK due to poor autocorrelation, significantly improve the bit error rate of the system and effectively improve the reliability of air-to-ground radar data chain.
Key word:
air-ground radar data link
RS coding
CCSK
OCML
OFDM

Measurement Control Technology and Instruments

Text classification of railway safety fault based on TF-IDF evolutionary integrated classifier

DOI:10.16157/j.issn.0258-7998.200284

Author:Gao Fan1,Wang Fuzhang1,Zhang Ming1,Zhao Junhua2,Li Gaoke1

Author Affilications:1.China Academy of Railway Science,Beijing 100081,China; 2.Beijing Jingwei Information Technologies Co.,Ltd.,Beijing 100081,China

Abstract:Railway safety is the core of railway transportation guarantee. The unstructured text data of railway safety problems is large, and the content of the text has no specific rules, which makes it very difficult to comprehensively analyze and solve the safety problems. Aiming at the intelligent classification of railway safety data, an evolutionary ensemble classifier model is proposed. By analyzing the characteristics of the catenary security issues of data, TF-IDF model is adopted to realize the feature extraction. Bagging ensemble classifier which uses Decision Tree as the base classifier classifies the text data, in the process of classification of Bagging, for the combined solution set of base classifier generated by Bagging Algorithm, Genetic Algorithm is proposed to optimize it to generate the combined solution set of base classifier with better classification results. Based on the safety problem of power supply contact network of a railway bureau, the experimental analysis shows that the TF-IDF+Bagging+Genetic Algorithm=Evolutionary Ensemble Classifier model has a high classification index in the text classification of railway safety problems.
Key word:
software railway safety problems
TF-IDF
base classifier
integrated classifier
evolutionary integration classifier

Research on distributed I/O redundancy method based on domestic PLC

DOI:10.16157/j.issn.0258-7998.200588

Author:Liu Xuefei1,Su Shishi2,Kuai Liang1,Han Qingmin1,Wang Shuai1,Wu Yunfeng1

Author Affilications:1.The 6th Research Institute of China Electronics Corporation,Beijing 102209,China; 2.CS&S.Information System Engineering Co.,Ltd.,Beijing 102209,China

Abstract:In order to improve the reliability of the acquisition/output link in the PLC control system, the design principle of the redundant system is analyzed, combined with the field application environment and actual needs, a distributed I/O redundancy method based on domestic PLC is developed. The article introduces the digital input/output and analog input/output redundancy schemes respectively for the type of data collected. This method takes the self-diagnosis results of the self-diagnosis periodically during operation as the basis for redundant diagnosis, combined with the user-configured redundancy scheme to improve accuracy of collecting/outputting data. It can be known from experiments and on-site base application that this method improves the reliability of the PLC control system and can ensure that the PLC system operates stably, efficiently and safely for a long time.
Key word:
programmable logic controller(PLC)
reliability
I/O redundancy
fault diagnosis

Traffic flow parameter detection technology based on RFID and video monitoring

DOI:10.16157/j.issn.0258-7998.200515

Author:Liu Haiyan,Li Junmin

Author Affilications:Nanjing University of Science and Technology Zijin College,Nanjing 210023,China

Abstract:This paper presents a traffic flow parameter measurement method based on RFID and video monitoring technology. It introduces the composition of detection system, key technology of vehicle electronic license plate based on radio frequency(RFID), image processing technology of road video, etc. The detection system reads the electronic license plate information from the RFID terminals installed on the supports on both sides of the road. Master control unit adjusts the signal acquisition rate of video terminal, RFID data and video data for processing in time to get the traffic data such as license plate,vehicle characteristics, speed and effective traffic flow parameters, etc. These data also can be compressed and sent to the server through the cloud network. The server can remote monitoring the road traffic, and can get more detailed information afer further processing. It provides reliable and accurate data support for traffic guidance, illegal monitoring and speed monitoring.
Key word:
RFID
electronic license plate
video monitoring
speed monitoring
traffic flow

Computer Technology and Its Applications

Controlling the laser foreign matter remover device by smart terminals

DOI:10.16157/j.issn.0258-7998.200441

Author:Yang Bo,Liu Chuanli,Wu Yingdi,Cai Yafen

Author Affilications:CTTL-Systems,China Academy of Information and Communications Technology,Beijing 100045,China

Abstract:Using laser to remove foreign matters on overhead high-voltage transmission lines has already become a mainstream method in recent years. In this paper, by analyzing the procedures of the removing operation as well as its demand on the control system of the remover device, a novel design of control system is proposed, in which the calculation are mainly performed in a generic smart terminal device connecting wirelessly to the actuator-driving part. The complete hardware design and software flow are also introduced. Comparing to the conventional integrated control system, this design is more flexible, easier to maintain and upgrade, and is of lower cost. Experiments show that, remover device controlled by this system can perform the removing operation accurately and reliably.
Key word:
laser foreign matter remover
smart terminal device
wireless control
modularization

Side-channel analysis in frequency domain with clustering

DOI:10.16157/j.issn.0258-7998.200300

Author:Cai Juesong,Yan Yingjian,Zhu Chunsheng,Guo Pengfei

Author Affilications:PLA Information Engineering University,Zhengzhou 450002,China

Abstract:The alignment of power traces is one of the key factors affecting the success of side-channel analysis. Frequency-domain side-channel analysis can effectively solve the alignment of power traces in the time domain. However, frequency-domain side-channel analysis usually requires more power traces. In order to improve this problem, this paper proposes a frequency-domain side-channel analysis method based on clustering. After the effective signal frequencies are separated through the clustering algorithm in machine learning, side-channel analysis is carried out to reduce the number of power traces. Experiments show that this method can reduce the number of power traces required for frequency-domain side-channel analysis in different degrees.
Key word:
side-channel analysis
frequency domain
machine learning
clustering
power traces

Design and implementation of food traceability system based on Hyperledger Fabric

DOI:10.16157/j.issn.0258-7998.200303

Author:Duan Ranyang,Zhou Wenhui,Wei Xiao,Wang Long

Author Affilications:National Computer System Engineering Research Institute of China,Beijing 100083,China

Abstract:In the traditional food safety traceability systems, there are many problems such as lack of shared data, centralization and islanding of information storage. Since blockchain systems have the characteristics of decentralization, tamper-resistance, and trustworthiness, this paper proposes a food traceability system based on Hyperledger Fabric blockchain.Then Hyperledger Fabric was described in detail. The technical principles and characteristics of Hyperledger Fabric blockchain technology was clarified. Comprehensive practical use of food safety traceability system and detailed design of food traceability system based on Hyperledger Fabric blockchain were expounded. Finally, the food traceability system based on the Hyperledger Fabric blockchain was set up,and the related functional test and performance test of the system verified the feasibility and effectiveness of the plan properly.
Key word:
blockchain
food traceability
Hyperledger Fabric

A morphological filtering algorithm research for neighbor noise

DOI:10.16157/j.issn.0258-7998.200294

Author:Wen Fulin1,Zhang Kai2,Pu Feng1,Tang Suli1

Author Affilications:1.Department of Electronics,Sichuan Aerospace Vocational College,Guanghan 618300,China; 2.School of Mechanical Engineering,Sichuan University,Chengdu 610065,China

Abstract:The suspicious noise points are taken as center to construct a certain size neighborhood in this paper. Morphological close filtering is performed by pepper noise neighborhood. Then, morphological open filtering is applied by neighborhood salt noise point. The gray values of suspected noise points are replaced by filtered gray value of neighborhood center point. During the transforming process, gray values of non-suspicious noise points remain unchanged. Experiments show that this scheme is practical and plausible. The filtered image has advantages of less mean square error and high peak signal-to-noise ratio. Compared with the median filtering algorithm, the morphological open-close filtering algorithm,and the adaptive filtering algorithm, this proposed improved algorithm provides a better filtering property.
Key word:
salt-and-pepper noise
morphology
filter
structuring elements

Calibration algorithm of contact contour scanner system

DOI:10.16157/j.issn.0258-7998.200654

Author:Gao Tong1,Chen Hong1,Zhang Liang2,Wang Jinqi3

Author Affilications:1.State Key Laboratory of Electronic Test Technology,Key Lab of Instrument Science and Dynamic Measurement, North University of China,Taiyuan 030051,China; 2.College of Transportation and Logistics,Taiyuan University of Science and Technology,Taiyuan 030051,China; 3.Shanghai Radio Equipment Research Institute,Shanghai 201109,China

Abstract:The principle of the contact contour scanner is to use the length sequence returned by the encoder and the rotation angle of the rotating platform to determine the contour coordinates of the object to be measured. Since the starting point of the detection hook does not coincide with the center of the rotating platform,it leads to the contour drawn directly from the measured data is not accurate. In order to solve this error, this paper proposes a method that does not need to establish the precise error model of the system, but to obtain system parameters by using the data obtained from the square calibration plate with known measurement size, and then calibrates the contour coordinates online. The measurement process was simulated through programming and the parameters obtained were compared with the ideal parameter values. The simulation data showed that the algorithm could control the measurement error below 0.5 mm and the angle error below 0.1°, which met the accuracy requirements of the equipment and could restore the real contour of the graph under test.
Key word:
contact measurement
coordinate calibration
least squares
fitting
the calibration model

Communication and Network

Cryptanalysis of NBC-128

DOI:10.16157/j.issn.0258-7998.201005

Author:Yang Jiangshuai1,Chen Huaifeng1,Bao Jinfeng2,Kang Xiaowen3

Author Affilications:1.The 6th Research Institute of China Electronics Corporation,Beijing 100083,China; 2.The Institute of Tourism,Beijing Union University,Beijing 110101,China;3.61428 Military,Beijing 100097,China

Abstract:NBC is a family of block ciphers using Generalized Feistel structure, designed by Xu Hong et al. There are three block and key sizes,i.e.,128/128, 128/256 and 256/256. A 16-bit Sbox is involved in the cipher as the non-linear component. This paper makes improved cryptanalysis on the two NBC versions with block size 128.Using impossible differential cryptanalysis, the corrected results are given which cover 17-round NBC-128/256 and 15-round NBC-128/128. The attack rounds of multi-dimensional zero-correlation linear cryptanalysis are expanded, which covers 19-round NBC-128/256 and 16-round NBC-128/128. The 19-round attack is the longest as far as we know. Also, new 12-round integral distinguishers are proposed, which require less data compared to the existing integral attacks.
Key word:
NBC-128
impossible differential cryptanalysis
zero-correlation linear cryptanalysis
integral cryptanalysis

Research on a method of center of spreading spectrum testing deception jamming

DOI:10.16157/j.issn.0258-7998.201107

Author:An Qiaojing1,Sun Zhicheng1,Ma Lili1,Wang Lei1,Gao Xijun2,Hu Ailan3

Author Affilications:1.Unit 63861,PLA,Baicheng 137000,China;2.Ordnance Engineering College,Shijiazhuang 050003,China; 3.The 6th Research Institute of China Electronics Corporation,Beijing 100083,China

Abstract:According to the problem of performance reduction even losing lock for the MIMO system threatened by deception jamming with pseudo-command, this paper presents a technology can test the deception jamming based on central part of spreading spectrum. And this method realizes the deception interference prevention. Finally it verifies the feasibility by experiment, which is importance to promote the capacity of resisting deception jamming.
Key word:
MIMO
pseudo-command
deception jamming
center of spreading spectrum

Embedded Technology

Optimization of beam pointing algorithm based on PowerPC

DOI:10.16157/j.issn.0258-7998.200944

Author:Lei Shulan,Wu Huixiang,Li Wenxue

Author Affilications:The fifty-eighth Research Institute of China Electronic Technology Group Corporation,Wuxi 214063,China

Abstract:Based on PowerPC architecture, this paper proposes an optimization strategy of beam pointing algorithm, which is realized from the trigonometric function calculation optimization, floating point arithmetic optimization, loop nesting optimization, and PowerPC instruction optimization. Through the optimization algorithm proposed in this paper, the processing time of the algorithm is reduced to one tenth of the original. At the same time, the optimization strategy proposed in this paper also has certain guidance and reference for the algorithm development and optimization of other platforms.
Key word:
beam pointing
PowerPC architecture
CORDIC algorithm
instruction set

Design of vocieprint recognition system based on CNN-LSTM neural network

DOI:10.16157/j.issn.0258-7998.200960

Author:Mu Junjie,Yao Gang,Sun Tao

Author Affilications:Coastal Defense College,Naval Aviation University,Yantai 264001,China

Abstract:For warning of cardiovascular disease,in order to early detect the change of heart and lung voice representing the signs of danger,the vocieprint recognition system based on CNN-LSTM is designed. Using the Internet of Things technology coalescing the heart rate sensor chip, single-chip computer, electronic stethoscope, such as equipments,it can monitor the heart rate in real-time, early warn.And the cardiopulmonary sound recognition model based on the CNN-LSTM algorithm is trained, results show that the loss value is 0.082, accuracy rate of 0.908. The system is forward-looking and has a complete structural framework, which can effectively avoid the waste of medical resources, preposite the countermeasures for cardiovascular diseases.It has a broad application prospect in the market, and plays a significant role in promoting smart medical treatment.
Key word:
CNN
LSTM
features extraction
MFCC
cardiovascular disease
vocieprint recognition

Design and analysis of the control system of a fully automatic screw feeder

DOI:10.16157/j.issn.0258-7998.200313

Author:Zhao Jiati,San Hongjun

Author Affilications:School of Mechanical and Electrical Engineering,Kunming University of Science and Technology,Kunming 650550,China

Abstract:In order to realize the efficient supply and delivery of screws in the production line, then apply to the automatic product assembly line, this paper designs a screw feeder control system based on STC12C5410 single chip microcomputer. STC12C5410 is the hardware core controller of the system, including the function of material shortage alarm, arranging and conveying screws and so on. The system mainly realizes feeding by the photoelectric switch and solenoid valves, which effectively improves the efficiency and stability of screw conveying. In addition, the circuit of adjusting the torque of the electric batch and controlling the brake of the motor is designed, and the simulation and experiment are carried out to provide the technical preparation for the later integration of this function into the matching electric batch.
Key word:
STC12C5410
screw feeder
torque control
motor brake control

Computer Technology and Its Applications

Fault diagnosis for quayside container crane reducer based on EEMD decomposition and PCA-FCM clustering

DOI:10.16157/j.issn.0258-7998.200418

Author:Gu Nenghua1,Hou Yinyin2,Han Xuelong1

Author Affilications:1.College of Electrical and Information Engineering,Quzhou University,Quzhou 324000,China; 2.Zhejiang Quzhou Power Supply Company State Grid,Quzhou 324000,China

Abstract:Aiming at the feature extraction and fault diagnosis issue of quayside container crane(quayside crane) reducer, a combination method of reducer fault diagnosis based on ensemble empirical mode decomposition(EEMD) and principal component analysis(PCA)-fuzzy C-means(FCM) clustering is proposed. Firstly, the nonlinear and non-stationary vibration signals of the reducer are decomposed into several intrinsic mode functions(IMF) by EEMD decomposition, and the multi-dimensional fault characteristics of each IMF component are extracted. Then, the principal component analysis method is used to visually reduce the dimension of the fault feature, the relationship between the characteristic value of the vibration signal of the reducer and the fault mode is analyzed, and the state of the reducer is identified by the fuzzy C-means clustering algorithm. The experimental results show that EEMD-PCA-FCM method has high recognition accuracy for the three states of the reducer, which indicates that the method is an accurate and effective reducer fault diagnosis method.
Key word:
fault diagnosis
quayside container crane reducer
ensemble empirical mode decomposition(EEMD)
fuzzy C-means clustering
principal component analysis(PCA)

Research on a soft PLC system architecture based on industrial cloud

DOI:10.16157/j.issn.0258-7998.200451

Author:Chen Hai1,2

Author Affilications:1.Intelligence Technology of CEC Co.,Ltd.,Beijing 102209,China; 2.National Computer System Engineering Research Institute of China,Beijing 100083,China

Abstract:In the field of industrial automation, factory control is often performed by Pro-grammable Logic Controller(PLC).With the application of automation becoming more and more miniaturized and flexible, it is uneconomical to use, design and maintain a full hardware-based PLC in these fields. The software PLC based on industrial cloud can become a Control-as-a-Service solution. This paper introduces a multi-instance and scalable soft-PLC system architecture based on industrial cloud.Furthermore,the real-time and scalability of the architecture based on industrial cloud are evaluated. Finally, an outlook to the prospect of cloud-based control scene in future industrial applications is given.
Key word:
industrial control
cloud
soft PLC

Design and implementation of face attribute recognition system

DOI:10.16157/j.issn.0258-7998.200354

Author:Wang Gaosheng

Author Affilications:National Computer System Engineering Research Institute of China,Beijing 100083,China

Abstract:At present, accurate face recognition has been widely used in real scenes, such as monitoring, access control, etc., and recognition only for face attributes is also widely used in entertainment, security and social media. Therefore, the paper is based on deep convolutional neural network MTCNN for face detection and Resnet50 network for face attribute recognition. At the same time, it uses Python language to design and develop a system that implements face attribute recognition application interface. Through data experiments, the system uses a face attribute recognition model based on deep convolutional neural networks to achieve 97.32%, 71.64% and 92.13% accuracy in identifying gender, age and ethnic attributes, respectively. At the same time, the face attribute recognition application system can run stably and has certain application value.
Key word:
deep learning
convolutional neural network
face detection
face attributes recognition
application system development

An optimization method of observation matrix based on QR decomposition

DOI:10.16157/j.issn.0258-7998.200413

Author:Zhou Qibin1,Wu Jing1,2,Yu Bo1

Author Affilications:1.School of Information Engineering,Southwest University of Science and Technology,Mianyang 621000,China; 2.Sichuan Key Laboratory of Special Environmental Robotics,Southwest University of Science and Technology,Mianyang 621000,China

Abstract:In compressed sensing theory, the most critical issue is the construction of the observation matrix. The factors that affect the image reconstruction quality include the independence between the observation matrix column vectors and the cross-correlation between the observation matrix and the sparse basis. Based on this, an optimization algorithm is proposed. The algorithm uses QR decomposition to increase the independence of the observation matrix columns, and at the same time optimizes the Gram matrix contracted using an equiangular tight frame(ETF). By updating the direction of each gradient descent, the convergence rate is accelerated to reduce The cross-correlation between the small observation matrix and the sparse basis. Simulation experiment results show that the method of optimizing the observation matrix in this paper has certain advantages in improving the quality and stability of image reconstruction under the same signal sparsity or observation times.
Key word:
compressed sensing
observation matrix
QR decomposition
Gram matrix
cross-correlation

Circuits and Systems

Research on high-output-voltage power supply with wide input voltage range for electric propulsion system

DOI:10.16157/j.issn.0258-7998.200880

Author:Shi Kaimin1,2,Zhang Donglai3,Wang Zicai2,Zhang Hua3,Lv Wenqi3

Author Affilications:1.School of Astronautics,Harbin Institute of Technology,Harbin 150001,China; 2.Shenzhen Academy of Aerospace Technology,Shenzhen 518057,China; 3.School of Mechanical Engineering and Automation,Harbin Institute of Technology(Shenzhen),Shenzhen 518055,China

Abstract:Power Processing Unit(PPU) is the central part of the xenon ion electric propulsion system, and its size, weight, and key technical difficulties usually exceed the thruster itself. The high-power and high-output-voltage power supplies, such as beam supply and anode supply, are the main parts of the electric propulsion power system. In this paper, a two power stage beam supply topology is proposed to meet the requirement of multi-mode electric propulsion system. The front stage is an interleaved boost converter, which is adopted to adjust the total output voltage. The second stage is based on a full-bridge resonant converter able to provide very high output voltage, which operates the fixed optimum switching frequency. The power converter control strategy and design principles of magnetic components are studied and finally the corresponding experimental results are given to validate feasibility of the proposed converter in this paper.
Key word:
PPU
beam supply
interleaved boost
resonant

Design of small high-gain array antenna based on genetic algorithm

DOI:10.16157/j.issn.0258-7998.200883

Author:Dai Xinhua1,Su Xinyan1,Yao Jinjie1,Jiang Rundong1,Tang Qiang2

Author Affilications:1.The Key Laboratory of Information Detection and Processing of Shanxi Province,North University of China,Taiyuan 030051,China; 2.Xi′an Institute of Electromechanical Information Technology,Xi′an 710065,China

Abstract:Aiming at the needs of miniaturized millimeter wave radar for large detection range and long-distance detection, a Ka-band series-parallel hybrid-fed microstrip array antenna is proposed. The antenna array adopts a modular design, and the beam width and gain are controlled by using genetic algorithms to optimize and adjust the relative position of the sub-array. Simulation and processing measurements show that the E and H plane beam widths of the antenna at the center frequency of 36 GHz are 28°, 15°, and the maximum gain is 15 dBi. The test and simulation results are basically consistent, indicating that the antenna array is suitable for small millimeter wave radars.
Key word:
array antenna
high gain
genetic algorithm

Design of multi-channel low phase noise synchronous frequency source

DOI:10.16157/j.issn.0258-7998.200921

Author:Xu Wei,Pan Minghai,Zhang Yanjing

Author Affilications:School of Electronic Information Engineering,Nanjing University of Aeronautics and Astronautics,Nanjing 211106,China

Abstract:In order to meet the requirement of high stability frequency source when DRFM(Digital Radio Frequency Memory) system collects external input signals, a design method of multi-channel, low phase noise synchronous frequency source based on two-stage PLL is proposed in this paper. Six channels of arbitrary frequency signal output in the range of 2.26~2 600 MHz are realized. Through the method of linear superposition, the phase noise model of PLL is analyzed theoretically, and the optimal design is carried out according to the source of phase noise. Finally, the spurious and phase noise of the frequency source circuit are tested. The test results show that the spurious suppression is better than -60 dBc and the phase noise suppression is better than-104.91 dBc/Hz@500kHz when the frequency source circuit outputs 1.25 GHz frequency.
Key word:
frequency source
phase locked loop
phase noise
spurious

Radar and Navigation

The research of radar intercepted distance by equivalent test

DOI:10.16157/j.issn.0258-7998.200882

Author:Zeng Xiaodong

Author Affilications:The 10th Research Institute of China Electronics Technology Group Corporation,Chengdu 610036,China

Abstract:Aiming at the problem that it is difficult to directly test the intercepted distance between radar and specific ESM reconnaissance equipment, the equivalent test method of radar intercepted distance by ESM reconnaissance equipment is studied. Firstly, the equivalent model of intercepted distance under the expected test condition and the substitute test condition is deduced. Then, according to different test scenarios, the equivalent model is subdivided into four different types. Finally, the equivalent model is verified by the measured data. The data is from the intercepted distance of a certain radar in the outfield flight test. The test results show that the error of the equivalent model is 7.26%, which meets the requirement that the error of the test outline is less than 10%.
Key word:
radar
ESM reconnaissance equipment
intercepted distance
equivalent model

Research on infrared small target detection technology based on 3D filtering

DOI:10.16157/j.issn.0258-7998.200970

Author:Fan Hua1,2,Wu Wenbo2,Jiao Zhi2,Tan Chaobin2

Author Affilications:1.School of Electronic Control,University of North China Institute of Aerospace Technology,Langfang 065000,China; 2.Beijing Institute of Space Mechanics & Electricity,Beijing 100094,China

Abstract:To improve the detection effect of frame difference method on low SNR target in complex environment,in this paper, based on the principle that moving targets have continuity in time, the tracking algorithm before detection is used to accurately screen targets through the design combining 3d filtering preprocessing and target trajectory judgment, so as to achieve the effect of reducing false alarm on the premise of maintaining a high detection rate, which is of significant significance for dim small targets detection.
Key word:
dim small targets detection and tracing
frame difference detection method
3-D wavelet filter
tracing before detect