2015 No. 03

Publish Date:2015-03-06
ISSN:0258-7998
CN:11-2305/TN
Prev Next

Review and Comment

Several challenges and countermeasures face by big data wireless communication

DOI:10.16157/j.issn.0258-7998.2015.03.001

Author:Wang Fei,Xu Kui,Xu Youyun,Zhang Dongmei

Author Affilications:College of Communications Engineering, PLA University of Science and Technology,Nanjing 210007,China

Abstract:With the vigorous development of the social network and the Internet of Things(IoT), the huge amounts of information interaction of physical entity in the field of cross-industry, geographical and interdisciplinary have brought about the geometric progression growth of the digital information. Big data era has arrived. In one aspects, the explosive growth of the total data not only has given rise to profound impact on the society and people′s way of life, but also, it has brought many new challenges for transmission and processing these data. For these challenges, this paper studies the following aspects of efficient wireless transmission of the big data, dynamic resource allocation of the M2M system and automatic retransmission request of the finite set of network coding based on partial feedback in the environment of large-scale wireless terminals. It provides a thought to improve the performance of the big data wireless communication network.
Key word:
big data service
cellular network
upstream access
data broadcasting
resource allocation
network coding

EMI problem research of high speed PCB design

DOI:10.16157/j.issn.0258-7998.2015.03.002

Author:Lian Longgang,Xu Wenkuan,Wang Baocheng

Author Affilications:Academy of Opto-Electronics, Chinese Academy of Science,Beijing 100094,China

Abstract: It gives relevant solutions for the EMI problems in high speed PCB design, and puts forward the corresponding EMI design principles and techniques in such aspects as layout, routing and filtering respectively. Along with that, matters needing attention are pointed out based on these methods. At the same time, the EMI problem must be addressed by test, and EMI test is an integral part of the circuit design. By attention to these matters, it can effectively reduce the PCB EMI phenomenon.
Key word:
EMI
layout
routing
grounding

Study on software and hardware integrated reliability evaluation method

DOI:10.16157/j.issn.0258-7998.2015.03.003

Author:Feng Erqiang,Zheng Jun,Lan Xinsheng

Author Affilications:China Aero-Polytechnology Establishment,Beijing 100028,China

Abstract:The concept and characteristics of hardware and software reliability testing are introduced and analyzed. Prevalent hardware and software reliability integrated evaluation methods can be broadly classified into three categories, named, fault data fusion based, models combination based and micro-fabric fusion based. The research achievements and development in hardware and software reliability integrated evaluation methods are mainly analyzed, summarized and discussed. And the conclusions are that the models combination based approach don’t solve the problem that a fundamental difference in the nature of the failure processes of hardware and software and the others solve the problem partly. Based on this the principle of hardware and software reliability integrated evaluation methods was studied, and the research direction in the future is proposed.
Key word:
integrated reliability evaluation
evaluation method
software reliability
hardware reliability
combined hardware/software

Embedded Technology

Design on multiple backup and recovery in embedded Linux system

DOI:10.16157/j.issn.0258-7998.2015.03.004

Author:Ding Yuanzhou,Luo Xiaoqiao,Ye Liansong,Chen Yu

Author Affilications:Institute of Physical Science and Technology, Central China Normal University,Wuhan 430079,China

Abstract:In this paper, one of multiple backup and restore mechanism is put forward in embedded Linux system. Division of a number of system image area(including the kernel and file system) on a NAND Flash using this design, multiple backup and recovery mechanism are added in the U-Boot and the system image area. When running image area fails, triggering mechanism of watchdog restarts and activates the automatic backup and recovery mechanism, ensuring one of the available system operation at any time. The method is simulated in the S5PV210 processor and Linux system platform and it is well verified. When a failure occurs, it also can guarantee normal starting system, and automatic recover system image which goes wrong. Test results prove the feasibility of this method.
Key word:
embedded
U-Boot
Linux
UBIFS
backup
restore

Multicore program loading research and improve based on TMS320C6678

DOI:10.16157/j.issn.0258-7998.2015.03.006

Author:Li Feiping,Qing Lingbo,Teng Qizhi,Shu Jun,He Xiaohai

Author Affilications:School of Electronics and Information Engineering,Sichuan University,Chengdu 610064,China

Abstract:Program loading for multicore DSP system is very complex, this paper takes a research on that issue based on TMS320C6678. According to the first level bootloader, this paper designs and improves one kind of multicore program data storage format. Since the first level bootloader can only recognize the c_int00 entry address of master core which causes the slave core′s c_int00 entry address missing, one secondary bootloader is designed to solve that problem. In order to generate the specified format multicore program for the Flash fastly, multiple utilities is designed to help adding SPI boot parameter table, DDR3 boot table, slave cores′ program entry address as well as changing program data format. SPI Flash multicore program loading and Nand Flash multicore program loading based on I2C master mode are realized in this paper.
Key word:
multicore program loading
multicore program data storage format
boot configuration table
c_int00 address
second level bootloader

The design of gateway layer of IoT

DOI:10.16157/j.issn.0258-7998.2015.03.007

Author:Yang Jiandong1,2,Si Nong1,Chen Daoxin2,Wang Pu1,Yang Hao2

Author Affilications:1.School of Electronic Information and Control Engineering,Beijing University of Technology,Beijing 100124,China; 2.Capinfo Compay Limited,Beijing 100080,China

Abstract: A service oriented middleware gateway design is proposed in this paper, which sets up the application route and control management through the identification of sensors, receives the data that send from perception layer, conducts the data cleaning and event analysis, then transfers the data or event information that has been cleaned and filtered to the upper layers, and constructs a transparent and standard model of conversation between perception equipment components. The underlying equipment unification management is described from equipment management, engine operation, logic engine and other technical aspects in detail, so that when changes occur in the sensing devices or backend database software, the application client could handle the change without modifying or do simple modification, which will save the maintenance complexity problem of the many-to-many connection, and solve the unified standard problem between numerous products.
Key word:
IoT
gateway
middleware

Research of mine-used stress monitoring system based on ZigBee

DOI:10.16157/j.issn.0258-7998.2015.03.008

Author:Zhang Baotong,Cheng Yongqiang

Author Affilications:College of Information Engineering,Taiyuan University of Technology, Taiyuan 030024,China

Abstract:This paper presents a new monitoring method of mine tunnels, namely timing monitoring the changes of stress at the top of the deep tunnel by using bolt dynamometer. This system includes three parts which are sensor nodes, data stations and upper computers. The sensor nodes collect and upload data. Data stations manage sensor nodes , stroage data and upload data. And it is the duty of upper computers to aggregate data from sensors and then analyze and process the acquired data.
Key word:
stress
bolt dynamometer
ZigBee
security detection
mine tunnels

NuttX-based control system design for multi-rotor unmaned aerial vehicle

DOI:10.16157/j.issn.0258-7998.2015.03.009

Author:Huang Shuichang1,Li Pan2,Sun Shengjuan1,Zhang Yongjian1,Zhang Zhipan1

Author Affilications:1.School of Information and Electrical Engineering,Hebei University of Engineering,Handan 056038,China; 2.School of Electrical Engineering, Guizhou University,Guiyang 550025,China

Abstract: According to the requirements of multi-rotor unmanned aerial vehicle for multitasking and secutiry, this paper presents a kind of flight control system adding a failsafe coprocessor based on NuttX real-time operation system,to reduce the probability of crash risk and enhance the capacity of task of the main processor. Experimental results show that this platform can meet the flight with great stability,significantly reduce the development effort and shorten the development cycle. It retains adequate resources for the subsequent algorithm development also.
Key word:
multi-rotor uav
NuttX
multitask
fail safe

A scheme of firmware upgrade of STM32 based on CPUID and AES algorithm

DOI:10.16157/j.issn.0258-7998.2015.03.005

Author:Cao Yuxiao1,Han Dong2,Xu Jinbao1

Author Affilications:1.School of Computer Engineering,Nanjing Institute of Technology,Nanjing 211167,China; 2.Department of Automation,Tsinghua University,Beijing 100084,China

Abstract: For the shortage that the unique upgrade file is easy to be illegal used,a kind of firmware upgrade scheme is proposed and implemented,that one STM32 system uses one unique upgrade file. When upgrading firmware,the server generates different bin file for different STM32 system.The server uses AES algorithm to encrypt original bin file with every STM32′s CPUID as encryption key. STM32 decrypts the bin file with its CPUID as the key. If the CPUID as decryption key is not same as the CPUID as encryption key,the program decrypted by STM32 can′t run. After decryption STM32 uses IAP technology to write new firmware to Flash. The actual test proves that the method given by this paper can achieve "one chip one key" and prevent illegal use.
Key word:
STM32
CPUID
AES algorithm
encryption
decryption
In Application Programing(IAP)

Microelectronic Technology

A fifth-order sigma-delta modulator applied in accelerometer

DOI:10.16157/j.issn.0258-7998.2015.03.010

Author:Cheng Lei,Chen Zhongliang

Author Affilications:Huanghuai University,Zhumadian 463000,China

Abstract: A single-loop fifth-order sigma-delta(ΣΔ) modulator circuit applied in accelerometer is designed using CHRT 0.35 μm CMOS process. The modulator is modeled and analyzed in MATLAB/Simulink and parameters are optimized to achieve a stable high-order system. The system stability is analyzed based on the root locus. The power dissipation of the circuit is about 3.4 mW with sampling frequency 250 kHz at a 3.3 V power supply. The post-simulation result indicates that the signal-to-noise -ratio(SNR) is 108.6 dB with 18-bit resolution over a signal bandwidth of 1 kHz, which meets the accelerometer′s demand for subsequent stage high-precision modulator.
Key word:
low-pass ΣΔ modulator
modeling
high-order
root locus

Design of a 12V,3A current mode synchronous buck DC-DC converter power stage

DOI:10.16157/j.issn.0258-7998.2015.03.011

Author:Zheng Hao,Liu Yan,Wang Daoping,Yao Peng

Author Affilications:The Second Artillery Engineering University,Xi′an 710025,China

Abstract: A power stage design of the current mode buck DC-DC converter in 0.35 ?滋m 18 V DPTM BCD process is proposed in this paper, the power stage can supply 3 A load current, and has a peak power efficiency of 94.5%. The paper proposes the power stage design that is most important block in the buck converter, including design synchronous switch power transistors, on-chip inductor current sensor, synchronous driver circuits of the power transistors, and the layout considers of the power stage in the converter. The results of the work are also presented.
Key word:
current mode
synchronous buck DC-DC converter
power stage
BCD

Design of a bandgap reference voltage with low power consumption and high-accuracy

DOI:10.16157/j.issn.0258-7998.2015.03.012

Author:Li Rui,Feng Quanyuan

Author Affilications:Institute of Microelectronics, Southwest Jiaotong University, Chengdu 611756,China

Abstract: A new bandgap reference voltage with low consumption and high-accuracy performance, which is based on UMC 0.25 μm BCD process and the traditional bandgap reference construct. It uses the exponential response curve between leakage current and grid voltage when the N type MOS-FET is working in the sub-threshold region to compensate the temperature characteristic curve. The simulation shows that quiescent current is 3.16 μA when power supply is 5 V. The change amplitude of reference voltage is 53 μV when the power supply is from 2.5 V to 5.5 V. The temperature coefficient is 0.86×10-6/℃ from -40 ℃ to 130 ℃. The PSRR is lower than-60 dB at the three process corner.
Key word:
bandgap reference
power consumption
curvature-compensation
low temperature drift

Design of a low-power high-speed CMOS LVDS receiver

DOI:10.16157/j.issn.0258-7998.2015.03.013

Author:Ding Yanling

Author Affilications:School of Automation,Nanjing Institute of Mechatronics Technology,Nanjing 211135,China

Abstract:Aiming at the need of high speed data transmission, a low-power high-speed CMOS LVDS(Low Voltage Differential Signaling) receiver is designed. The circuits are implemented in SMIC 0.13 μm CMOS technology using thick(3.3 V) and thin(1.2 V) gate oxide devices,and support the input common mode voltage range of 0.05 V to 2.4 V and the input differential voltage range of 100 mV to 400 mV as specified by LVDS I/O standard. The chip has the advantages of low power consumption, fast transmissional speed and low cost.
Key word:
low voltage differential signaling
LVDS I/O
low power chip
high speed integrated circuit

Measurement Control Technology and Instruments

The application of an improved islanding detection strategy in photovoltaic grid connected power system

DOI:10.16157/j.issn.0258-7998.2015.03.014

Author:Li Fei,Shu Xinmei,He Jianping,Miao Miao

Author Affilications:College of Electrical and Information,Xihua University,Chengdu 610039,China

Abstract:In modern power system, the application and development of photovoltaic grid connected power system(PV) may be limited by islanding effect to a certain degree,so islanding detection is a necessary function of photovoltaic system.The traditional method of slip-mode frequency shift(SMS) has shortcomings of low detection efficiency,poor power quality and so on,therefore a islanding detection strategy is presented in this paper which is combined with traditional SMS and voltage positive feedback mechanism.The working principle of the improved method is analyzed,and the separation of the active voltage,reactive voltage,and active current,reactive current can be realized by using dq transformation.The difference value with reference can be a feedback to destroy the balance of power,then the islanding can be detected rapidly.The simulation and experimental results verify the feasibility and effectiveness of the method,and it also has certain reference value for engineering application.
Key word:
photovoltaic grid connected power system
islanding effect
islanding detection
slip-mode frequency shift
dq transform
feedback mechanism

Design of smart vehicle anti-theft system based on vehicle networking

DOI:10.16157/j.issn.0258-7998.2015.03.015

Author:Zhao Ting

Author Affilications:School of Electrical Engineering and Automation,Shanghai University,Shanghai 200072,China

Abstract:Aiming at the shortcomings and deficiencies that existed in vehicle anti-theft system,an intelligent anti-theft system based vehicle networking is designed,which can realize intelligent anti-theft warning and theft tracking. The systems uses multi-sensor fusion technology to identify whether forcibly entered the vehicle to start the anti-theft system. With the mobile platform and Internet technology, it realizes camera,GPS tracking, transmitting data to the network, mobile remote control and emergency button to start the anti-theft system and other functions.It is to create a system diagram using PROTUES and simulating,which achieves better results,building a hardware test platform to verify the stability and reliability of the system. The experimental results show that alarm accuracy of the system is 90%, positioning accuracy is up to 5 meters,which has a high social value.
Key word:
SCM
vehicle networking
mobile platform
GPS electronic map
GSM

Research of methane monitoring system based on ZigBee

DOI:10.16157/j.issn.0258-7998.2015.03.016

Author:Gu Qiang1,Zhang Yi2,Liu Binbin1,Zhao Li1,Yin Fanjiao1

Author Affilications:1.College of Electrical Engineering and Automation,Shandong University of Science and Technology,Qingdao 266590,China; 2.College of Mechanical and Electronic Engineering,Shandong University of Science and Technology,Qingdao 266590,China

Abstract: To overcome the shortage of traditional gas monitoring systems, a monitoring system based on ZigBee is designed. In this paper, a gas signal acquisition terminal device is presented. After the principle is introduced, the wireless communication network with ZigBee module is set up, then the real-time monitoring of mine gas concentration is realized. When the gas concentration overruns, alarm and SMS notification management can be timely notified to the personnel. Final test results show that the detection system is of high precision and reliable data transmission and has a wide application prospect.
Key word:
methane
ZigBee
CC2530
catalytic sensor

Design of wireless intelligent transportation monitoring system

DOI:10.16157/j.issn.0258-7998.2015.03.017

Author:Zhu Xiangqing,Chen Junhong,Zhang Weiliang,Huang Kuohui,Qiu Richun

Author Affilications:School of Electronic & Information Engineering,Jiaying University,Meizhou 514015,China

Abstract: This paper proposes a design scheme of wireless intelligent transportation monitoring system, this system adopts the inductive loop and the single chip microcomputer to measure the traffic at the crossroads, and it transmits measured data via the short distance wireless communication modules to the embedded main controller, which is able to adjust the intersection traffic lights dynamically. Through the embedded system, the operation can remote video monitor the crossroads, and use active RFID technology to detect the vehicle at the crossroads, then open the green channel for them when necessary. It can set the blind reminder sound, uses different frequency tones to inform the blind person the traffic light status, and adjust the non crossroads traffic lights dynamically by the number of pedestrians crossing the road. The system power supply can be easily switched between the solar energy and the city electricity. The experiment proves that this system can realize safe transportation, efficient transportation, people's livelihood transportation and green transportation, and it has certain reference value to construct the actual transportation system.
Key word:
intelligent transportation
traffic flow detection
RFID technology
video surveillance

Design of the ball mill running state monitoring system based on STM32

DOI:10.16157/j.issn.0258-7998.2015.03.018

Author:Cai Gaipin,Xiong Yang,Xu Qin

Author Affilications:School of Mechanical and Electrical Engineering,Jiangxi University of Science and Technology,Ganzhou 341000,China

Abstract: This paper designed an intelligent monitoring system based on STM32 + ET100, in view of the mill run state maintenance for the enterprise in traditional working condition, dependent on the characteristics of the human experience judgment. The acquisition of 14 road dates consist of motor stator temperature, bearing temperature, reducer lubricating oil temperature and vibration signal, transmited to the main control node by taking advantage of networking with CAN bus, and achieving the communication between STM32 and PC, using ET100 as development platform, through the Modbus RTU protocol . The system is stable, reliable and has strong expansibility, which satisfies the requirement of working field.
Key word:
condition monitoring
CAN bus
Modbus protocol

The design of wireless determining system of dissolved oxygen of water in aquiculture

DOI:10.16157/j.issn.0258-7998.2015.03.019

Author:Wang Yuqing1,Hu Huimin2,Shi Jianhua3

Author Affilications:1.Mechanical and Electrical Engineering,Henan Radio and Television University,Zhengzhou 450046,China; 2.College of Computer and Information Engineering,Henan University of Economics and Law,Zhengzhou 450046,China; 3.Henan Dickson Occupational Health Technical Advisory Services LTD.,Zhengzhou 450042,China

Abstract: Based on the studies on physical structures and determination principles of polar graphic dissolved oxygen concentration sensor, the hardware and software were designed, with CC2530 as the core modules and application of ZigBee wireless communications technology, which included sample nodes of dissolved oxygen concentration, aquaculture aerators controller and coordinator. Automatic network between the nodes and data transmission capabilities were enabled. It could complete wireless monitoring of dissolved oxygen in the water of aquaculture.
Key word:
CC2530
ZigBee
wireless sensor
intelligent monitoring

A multi-objective optimization-based autonomic dissemination method in VANET

DOI:10.16157/j.issn.0258-7998.2015.03.020

Author:Hu Yi,Wang Linna,Zhu Gongsheng

Author Affilications:College of Telecom Engineering,Beijing Polytechnic,Beijing 100015,China

Abstract:Aiming at the broadcasting used in Vehicular Ad hoc Network(VANET),this paper introduces a novel autonomic dissemination method(ADM) which delivers messages in accordance with given priority and density levels. The proposed approach is based on two steps:an offline optimization process and an online adaptation to the network characteristics. Simulation results show that the ADM can increase the efficiency of the broadcasting process in terms of message delivery ratio, latency and interference reduction.
Key word:
Broadcasting
priority level
network density
optimization
vehicular Ad hoc Networks

Network flow predicting model based on cuckoo search algorithm optimizing neural network

DOI:10.16157/j.issn.0258-7998.2015.03.021

Author:Du Zhenning

Author Affilications:School of Information Technology,Yangling Vocational and Technical College,Yangling 712100,China

Abstract: In order to improve the predicting precision, a novel network flow predicting model based on cuckoo search algorithm optimizing neural network was proposed in this paper. Firstly, the learning samples were obtained by phase space reconstruction. Secondly, the samples were input to BP neural network to learn, and the parameters were encoded as cuckoo, the optimal parameters were obtained by simulating the cuckoo’s finding the nest and producing eggs. Finally, the network flow predicting model was built and the simulation experiments were carried out on network flow data. The results show that the proposed model had solved the parameters optimization problem of BP neural network and obtained good predicting results of network flow.
Key word:
cuckoo search algorithm
network low
neural network
parameters optimizing

Optical and acoustic hybrid architecture of underwater sensor networks for distributed area coverage

DOI:10.16157/j.issn.0258-7998.2015.03.022

Author:Liu Yachuang1,Zhang Juwei1,2,Li Shiwei1,Yang Ting3

Author Affilications:1.School of Computer,Henan University of Science and Technology, Luoyang 471003,China; 2.School of Computer,Xian Jiaotong University,Xian 710049,China; 3.School of Computer,TianJin University,Tianjin 300072,China

Abstract:For underwater sensor networks, combined with the advantages of underwater acoustic communication and optical communication, we designed a new structure of underwater senor networks. Based on prior probability model of underwater targets distribution, a hybrid underwater sensor network deployment algorithm(HNDA) is proposed to achieve efficient high-speed transmission of underwater data and coverage of underwater target area. Simulation results showed that HNDA can reduce the number of nodes of network and the data transmission delay, reduce energy consumption and prolong the life of the network aspects.
Key word:
underwater sensor networks
hybrid networks
optical communication

Research of dynamic spectrum allocation algorithm for multi-radio multi-channel VANET

DOI:10.16157/j.issn.0258-7998.2015.03.023

Author:Sun Zhile1,2,Li Demin1,2,Tao Bing1,2,Liu Xiao1,2

Author Affilications:1.School of Information Science & Technology,Donghua University,Shanghai 201620,China; 2.Engineering Research Center of Digitized Textile & Fashion Technology,Ministry of Education Donghua University, Shanghai 201620,China

Abstract: In order to achieve dynamic allocation of communication spectrums between the vehicle nodes in multi-radio VANET, a dynamic spectrum allocation algorithm based on channel feedback is proposed. This paper analyzed the quality of channel,defined channel feedback matrix. The vehicle nodes could select available channel according to the values in channel feedback matrix. So as to realize the maximization of channel utilization.Through software simulation, it can be seen that this algorithm reduces time overhead significantly under the precondition of the maximize system total revenue and significantly improves the network performance of multi-radio multi channel VANET.
Key word:
multi-radio
VANET
graph coloring
channel feedback
dynamic spectrum allocation

Preceding technique for MIMO based on PSO-LR

DOI:10.16157/j.issn.0258-7998.2015.03.024

Author:Zhang Chunkai

Author Affilications:Department of Computer Applications,Jiangsu Food and Pharmaceutical Science College,Huai′an 223003,China

Abstract:In order to obtain better communication results and reduce error rate of multi input multi output wireless system, a novel preceding technique for multi input multi output based on particle swarm algorithm optimizing lattice reduction algorithm was proposed to solve the problem of lattice reduction algorithm(PSO-LR). In our approach, the initial lattice was scrambled to get a set of lattice, and taken as initial particle, and then the optimal lattice was obtained by particle swarm optimization algorithm. Finally, the performance of the algorithm was tested by simulation experiments. The results show that compared with other methods, our method can effectively reduce the error rate of multi input multi output communication.
Key word:
multi input multi output
pre-coding
genetic algorithm
lattice reduction

A smart card and dynamic identity based user authentication scheme

DOI:10.16157/j.issn.0258-7998.2015.03.025

Author:Shi Yajuan,Huang Huihui,Chen Jianhua

Author Affilications:School of Mathematics and Statistics,Wuhan University,Wuhan 430072,China

Abstract:Authentication protocol is a crucial technique to ensure the secure communication between remote server and users in the open network. In 2013 Pi et al. proposed an improved remote asynchronous authentication scheme with smart card. However, we investigate the scheme is inability to user′s anonymity and vulnerable to denial of service(DoS) attack. In order to overcome the pitfalls in Pi et al.’s scheme, a smart card and dynamic identity based authentication scheme is proposed. The proposed scheme can resist all kinds of mentioned attacks as well as maintain efficient performance.
Key word:
authentication scheme
anonymity
DoS attack
dynamic identity
elliptic curve cryptography(ECC)

Algorithm to determine the satellite side beam center

DOI:10.16157/j.issn.0258-7998.2015.03.027

Author:Xue Yongjiao1,Wang Demin2,Qi Chundong1,Huang Hanyue1

Author Affilications:1.School of Information and Electronics, Beijing Institute of Technology, Beijing 100081,China; 2.School of Electronics and Information Engineering, Changchun University of Science and Technology, Changchun 130022,China

Abstract: This paper introduces an algorithm to determine the satellite side beam center by the rotation angle offset east direction and side swing angle. The core of the algorithm is determining a cone by the side swing angle in geodetic coordinate system firstly, then by the rotation angle, determining the only element of the cone as satellite beam center in earth-fixed coordinate system. Node of satellite beam center and the earth is the point of beam center on the earth, based on it, the region of the satellite coverage is determined.
Key word:
point beam
side view
beam center
coverage region

A weighted enhauced underdetermined mixtures separation method

DOI:10.16157/j.issn.0258-7998.2015.03.026

Author:Li Zhentao,Li Hongyan

Author Affilications:College of Information Engineering,Taiyuan University of Technology,Taiyuan 030024,China

Abstract: To solve the problem of the underdetermined blind source separation, this paper proposes a algorithm for blind identification of underdetermined mixtures based on parallel factor decomposition of covariance matrix of the observed signal and weight enhanced alternating least squares, without the need of the sources are quite sparse. Because the parallel factor decomposition still satisfied unique identifiability in underdetermined situation, the proposed algorithm can solve the underdetermined blind source separation problem successfully. Simulation results demonstrate that the performance and effectiveness of the proposed algorithm is very better for underdetermined mixed. The algorithm is relatively simple, which can satisfy the demand of engineering application.
Key word:
underdetermined mixtures
blind identification
enhanced line search
least squares

A selective encryption on medical images data

DOI:10.16157/j.issn.0258-7998.2015.03.028

Author:Lin Yangfei1,Ye Shaozhen1,2

Author Affilications:1.College of Mathematics and Computer Science,Fuzhou University,Fuzhou 350108,China; 2.Fujian Key Laboratory of Medical Instrumentation & Pharmaceutical Technology,Fuzhou 350002,China

Abstract:With the development of cloud computing and big data technology, in order to meet the sharing service security requirements of the medical image data in the domestic area caused by the expensive medical imaging equipments, considering multimedia features especially the huge data character of medical digital images,this paper proposes a selective encryption algorithm based on SCAN language, combined with the data itself HASH value as bit encryption cycle sequence to achieve the privacy and security protection of personal medical image data. The security analysis and simulation results show that the algorithm has good scrambling effects.
Key word:
medical images
selective encryption
regions of interest
SCAN

Incorporating ad similarity network for sponsored search ad recommendation

DOI:10.16157/j.issn.0258-7998.2015.03.030

Author:Zhu Zhibei,Li Bin,Liu Xuejun,Hu Ping

Author Affilications:College of Electronics and Information Engineering,Nanjing Technology University,Nanjing 211816,China

Abstract: In the present collaborative filtering based recommendation methods of sponsored search, the neighborhood based collaborative filtering method is unable to handle the sparse data. And although the matrix factorization based collaborative filtering method can infer the missing data, it lacks coordination from neighborhood. The paper proposes a recommendation algorithm of sponsored search named ASN-MF. The algorithm can get the similarity relationship of the advertisements through the establishment of the similarity network of advertisements and add this relationship into the loss function of matrix factorization to make the decomposed characteristic matrix of the advertisements has a similar nature of neighbors. The experiment is based on real data sets from KDD Cup 2012-Track2, which can prove the feasibility and validity of this method.
Key word:
computational advertising
click-through rate
collaborative filtering
matrix factorization

Implementation of printed character recognition system based on perceptron artificial neural network

DOI:10.16157/j.issn.0258-7998.2015.03.031

Author:Yang Ge1,2,Zhang Weiqiang1,Huang Jing1

Author Affilications:1.College of Information Technology,Beijing Normal University(Zhuhai Campus),Zhuhai 519087,China; 2.Key Laboratory of Engineering Lab on Intelligent Perception for Internet of Things(ELIP),Shenzhen Graduate School, Peking University,Shenzhen 518055,China

Abstract: For English print characters,a character recognition system based on perception artificial neural network is designed and realized in this paper. To achieve the purpose of recognizing printed character,the program which inputs printed character “L” & “I” to the character recognition system is trained. 4000 experimental data sets show that the character recognition system can efficiently and accurately identify the English printing character. The learning times are 6.95 and using time is 0.006 812 56 seconds. These show that it is acceptable and available in practical uses.
Key word:
artificial neurons
perceptron
MATLAB

Cloud computing-based hybrid parallel genetic algorithm for solving shortest path problem

DOI:10.16157/j.issn.0258-7998.2015.03.032

Author:Zhang Wenjin,Xu Aijun

Author Affilications:Education Technology Center, Guangzhou Institute of Railway Technology,Guangzhou 510430,China

Abstract:The shortest path problem plays an important role in many application research areas. In order to improve the efficiency of solving shortest path problem, a cloud computing-based hybrid parallel genetic algorithm was proposed in this paper. The MapReduce parallel programming model of Hadoop distributed computing platform in cloud computing was used to improve the coding efficiency. Based on the combination of fine grained parallel genetic algorithm and tabu search algorithm, the computing speed and search ability of the optimal algorithm were also improved, and thus the efficiency of solving shortest path problem was enhanced. The simulation results show that the computation speed and performance of the proposed algorithm were better than classical genetic algorithm and parallel genetic algorithm, and presented method is an effective shortest path solving method.
Key word:
cloud computing
genetic algorithm
tabu search algorithm
shortest path

Study on security risk assessment for technology of cloud computing

DOI:10.16157/j.issn.0258-7998.2015.03.029

Author:Jiang Rong1,2,Ma Zifei2,Li Tong2,Zhang Qiujin2

Author Affilications:1.School of Information, Yunnan University of Finance and Economics,Kunming 650221,China; 2.School of Software,Yunnan University,Kunming 650091,China

Abstract: Based on the open Internet, cloud computing faces many problems about security risk. In order to keep the risk within an acceptable range, it is very necessary to assess it. This paper uses Delphi method to establish a risk assessment indexes system for cloud computing technology security as well as condenses the main technical risk factors in cloud computing environment, and uses fuzzy set and entropy weight theory to evaluate the risk. The case analysis proves the feasibility and effectiveness of this method.
Key word:
cloud computing
Delphi
fuzzy set
entropy weight
technology risk assessment

Power Supply Technology and Its Application

Analysis and research on intermittent oscillatory of RCC circuit

DOI:10.16157/j.issn.0258-7998.2015.03.033

Author:Jiang Junhua,Hou Weizhou

Author Affilications:Physics and Electronics College, Henan University,Kaifeng 475004,China

Abstract:RCC circuit is a kind of high efficient working circuit by use of several devices, but excessive control current will cause the occur of intermittent oscillation,and the oscillation frequency of the circuit changes in the large scope from hundreds of hertz to several thousand hertz. The output power is more likely to make the transformer device to produce abnormal noise. But this phenomenon are not completely useless,after improving the RCC circuit,it can be concluded that the circuit can start in applying a pulse signal if the output power is small. The switch circuit operates in low-power state by means of intermittent oscillation. The result is that RCC circuit has high performance price ratio and low cost ,so it is widely popular in high performance power supply equipment.
Key word:
RCC
intermittent oscillation
low-power

Simulation and research on PV system of MPPT control based on the improved incremental conductance method

DOI:10.16157/j.issn.0258-7998.2015.03.034

Author:An Yunpeng,Liu Jinning,Zhao Jincheng,Liu Hongwen

Author Affilications:Department of Vehicle and Electrical Engineering,Ordnance Engineering College,Shijiazhuang 050003,China

Abstract: Based on PV typical equal circuit of single diode, this paper builds the mathematical model and develops a general simulation model which can imitate random illumination intensity and temperature and battery parameter with MATLAB. Moreover, an independent PV system is developed based on the foundation of MPPT control function of improved incremental conductance method, and simulates under the different conditions when the environment factors change or loads change. The simulation results show the effect of MPPT control method and the correctness of the independent PV system in power supply.
Key word:
photovoltaic
MPPT control
incremental conductance method
MATLAB simulation

Effect of quality factor and resonant frequency on wireless energy transfer system

DOI:10.16157/j.issn.0258-7998.2015.03.035

Author:Dong Yan,Yu Liang,Li Lin,Liang Qi

Author Affilications:School of Electronic Science & Applied Physics,Hefei University of Technology,Hefei 230026,China

Abstract:Wireless energy transfer based on resonant has been an emerging power transmission technology, increasing its transmit power and efficiency is the bottleneck for its practical application. This paper investigates the effect of quality factor(Q) of the circle and the circuit on transmission efficient and power through simulation and experiments. The results show that high Q circuit can markedly increase the energy transfer distance and decrease the maximum transfer power, but not obviously affect the transfer efficiency. High Q circle could greatly increase the maximum transfer power, however not distinctly affect the transfer efficiency and transfer distance. The transfer power would be sharply decreased when the input frequency slightly departs from the resonant frequency of the system. Simulation and experiments show that the resonant frequency would be split when the coupling of the emission coil and the receiver coil is larger than a certain value, and simultaneously the transfer power would be decreased.
Key word:
magnetic resonant coupling
quality factor
frequency response
frequency splitting

Design of self power based on high voltage transmission lines

DOI:10.16157/j.issn.0258-7998.2015.03.036

Author:He Xiaoyang1,2,Wang Xiaoying1,Wang Zheng3

Author Affilications:1.School of Electrical and Automation,Changshu Institute of Technology,Changshu 215500,China; 2.School of Information and Electrical Engineering,China University of Mining and Technology,Xuzhou 221116,China; 3.Changshu Huangchao Technology Co.,Ltd.,Changshu 215500,China

Abstract: This paper introduces a kind of power supply scheme to take power electricity from high voltage transmission lines, through the mutual self power directly receive electrical energy from the transmission lines. Rely on the charging and discharging technology of lithium battery and super capacitor joint power,the power supply design successfully resolves the night bus small current state for the small output power, and the equipment have no electricity problems. By the energy release circuit of the rectification circuit post stage,it reduces the rectifier bridge induction voltage and limits the transformer output current,solving the impact of bus high current state for post stage circuit. The result show that a hybrid energy storing system can play a better performance than single entire energy storing device.
Key word:
mutual self-created power technology
self-power supply
high voltage transmission line
lithium battery
super capacitor

Lithium battery key parameter detection method study based on moving average

DOI:10.16157/j.issn.0258-7998.2015.03.037

Author:Wang Shunli1,Shang Liping1,Li Zhanfeng2,Deng Hu1,Hu Xiaomin1

Author Affilications:1.School of Information Engineering, Southwest University of Science and Technology, Mianyang 621010,China; 2.School of Manufacturing Science and Engineering, Southwest University of Science and Technology, Mianyang 621010,China

Abstract: A novel method is proposed based on moving average approach to detect the key process parameters of the airborne lithium batteries, aiming to solve its security application issues. The method is realized by constructing moving average model, which realizes its real-time security inspection. The experimental results show that this method can achieve 20 ms cycle real-time key parameter detection. The cell voltage detection accuracy is higher than 1‰FS. The total voltage detection accuracy is higher than 5‰FS. The heating and discharging current detection accuracy is 5‰FS and the real-time protecting execution time is 50 ms. This proposed key parameter real-time detection method has high stability advantages, which can effectively guarantee the application reliability for lithium battery packs. The proposition of this method can provide reliable application techniques and reference methods for lithium batteries.
Key word:
lithium battery pack
security
key parameters
real-time detection
signal estimation

Design of high-power pulsed diode-pumped laser array power supply

DOI:10.16157/j.issn.0258-7998.2015.03.038

Author:Sun Bin,Chu Hua,Li Wei,Cao Haiyuan,Ding Fangzheng,Wei Shangfang

Author Affilications:Optoelectronics Facility, Wuhan Ordnance Non-commissioned Officer Academy,Wuhan 430075,China

Abstract:To meet special needs of the high power pulsed diode-pumped laser coherent synthesis, this paper designs six simultaneous output power arrays to achieve the high-voltage and high-current pulse output with adaptive working voltage 0~400 V,current 0~1 200 A,pulse width 200 ?滋s~1 000 ?滋s and repetition frequency 1 Hz~20 Hz,which can be adjusted. It ensures technical indicators,and focuses on solving the array power synchronous output voltage and reliability of adaptive protection and other issues at the same time. The results showed that, the array power synchronization consistency can achieve 99% and output current accuracy is of 0.1 A. It has been applied in the "six-way laser coherent synthesis" study.
Key word:
array power
sync output
adaptive voltage
pulse power

Computer Technology and Its Applications

Modeling and simulation for radar new menace signal environment in complex electromagnetic environment

DOI:10.16157/j.issn.0258-7998.2015.03.039

Author:Ouyang Zhihong,Li Xiuhe,Ding Feng

Author Affilications:Dept.of Tactics,Electronic Engineering Institute,Hefei 230037,China

Abstract: Because of better coherence and covertness, the environment made up of new radar jamming signals shows greater menace than the traditional radar menace signal environment. In order to researching on it systematically, the elements of the environment and interference mechanism were analyzed firstly, and then the representations were modeled. Finally, a simulation system for radar signal environment was designed. Meanwhile, the simulations of the representations were carried out on this system. The results show the validity and effectiveness of the models.
Key word:
radar menace signal environment
new
modeling
simulation

Battery management system of electric vehicles based on embedded secure access module

DOI:10.16157/j.issn.0258-7998.2015.03.040

Author:Zhu Jingying,Jiang Fan,Wang Fengdi

Author Affilications:Beijing South Ruizhi Core Microelectronics Technology Co.,LTD,Beijing 100192,China

Abstract: The smart grid construction of the national being vigorously pursued,around the embedded secure access module implemented in smart grid,and combined with the handset for wireless transmission using RF transceiver,the battery management system of electric vehicles is introduced based on ESAM(Enbedded Secure Access Module).The system uses ESAM security module and RF module in the device combination and turns into the higher security RF transceiver. At the same time, safety certification system and the read head matching the ESAM module are used on handset side,maintaining the safety and convenience of the system equipment.
Key word:
embedded secure access module(ESAM)
battery management system of electric vehicles
encryption and decryption
handset

Development of phase-analysis techniques

DOI:10.16157/j.issn.0258-7998.2015.03.041

Author:Sui Ran1,Zhang Zheng2,Zhang Weihua3

Author Affilications:1.PLA Logistics Information Center,Beijing 100084,China; 2.State Key Laboratory of Mathematical Engineering and Advanced Computing, The PLA Information Engineering University,Zhengzhou 450001,China; 3.Parallel Processing Institute,Fudan University,Shanghai 201203,China

Abstract: There are many loops and recursions in applications, which leads to a lot of phase behavior. Different instances of a phase have the similar architectural behaviors, such as cache characteristics and CPI. These similarities also provide the opportunities for various optimizations. This paper discusses the key issues, mainstream techniques and applications for phase analysis techniques. Then the trend of phase analysis techniques is analyzed.
Key word:
phase
dynamic optimization
sampling simulation

Multi-channel video signal with long distance and time division transmission

DOI:10.16157/j.issn.0258-7998.2015.03.042

Author:Luo Xu,Lian Xiaoqin,Wang Tao,Li Kangfei,Zhang Xiaoli,Duan Zhengang

Author Affilications:College of Information Engineering,Beijing Technology and Business University,Beijing 100048,China

Abstract: Multi-channel video signal transmission method is designed with time division and long distance using a single cable in this paper. This method can be used to initiate a video surveillance to multiple objects by one device. It describes the hardware composition and its theory of the system,shows the idea of video signal transmitter/receiver through electronic switching circuit,and developes a communication protocol between host computer and microchip STC15F2K61S2.According to the actual effect and signal waveform observations,the system uses a differential twisted pair drive transmission of video signals,combined with multi-channel electronic switch,to achieve a good feasibility in signal on or off and its transmission without distortion.
Key word:
multi-channel video signal transmission
time division multiplexing
differential twisted-pair drivers
485 bus
electronic switchs

Feature extraction of multi-sensor images based on geometric invariant feature on the edge

DOI:10.16157/j.issn.0258-7998.2015.03.043

Author:Xie Jing,Tuo Xianguo,Fang Xiao

Author Affilications:School of Information Engineering,Southwest University of Science and Technology,Mianyang 621002,China

Abstract:This paper proposes an algorithm of feature extraction based on geometric invariant feature on the edge, which is mainly research on the feature extraction for the optical and infrared images among the multi-sensor images. Using spatial filtering and gray-scale processing method for processing the noise of the background, the Canny operator is used to extract the edge of the target, then corrosion and expansion, which are two basic operations of binary morphology are also used on edge thinning fill. The circular template matching method is used to extract the edge feature points, the different triangular area characteristics are formed through the screening and combination of effective points, at last the geometric characteristics of these triangular regions are calculated. The expriment results show that this method can effectively extract the common feature of multi-sensor images.
Key word:
Canny edge
feature extraction
geometric invariant
multi-sensor images

Key Technologies of 5G and Its Evolution

Key Technologies of 5G and Its Evolution

High Performance Computing

Processing and Application of Marine Target Characteristic Data

Smart Power

Antenna Technology and Its Applications

Smart Agriculture

5G-Advanced and 6G

5G Vertical Industry Application

Microelectronics in Medical and Healthcare

Key Technologies for 6G

Application of Edge Computing in IIoT

Deep Learning and Image Recognization

6G Microwave Millimeter-wave Technology

Radar Processing Technology and Evaluation

Space-Ground Integrated Technology

Industrial Ethernet Network

5G Vertical Industry Application

High Performance Computing

Innovation and Application of PKS System

FPGA and Artificial Intelligence

5G Network Construction and Optimization

RF and Microwave

Edge Computing

Network and Business Requirements for 6G

5G and Intelligent Transportation

5G R16 Core Network Evolution Technology

Satellite Nevigation Technology

5G R16 Evolution Technology

5G Wireless Network Evolution Technology

5G Network Planning Technology

5G Indoor Coverage Technology

5G MEC and Its Applications

5G Co-construction and Sharing Technology

Expert Forum

5G and Emergency Communication

5G Slicing Technology and Its Applications

Industrial Internet

5G Terminal Key Realization Technology

5G and Artificial Intelligence

5G and Internet of Vehicles

Terahertz Technology and Its Application

Signal and Information Processing

Artificial Intelligence

5G Communication

Internet of Things and the Industrial Big Data

Electronic Techniques of UAV System

Power Electronic Technology

Medical Electronics

Aerospace Electronic Technology

Robot and Industrial Automation

ADAS Technique and Its Implementation

Heterogeneous Computing

2016 IEEE International Conference on Integrated Circuits and Microsystems

ARINC859 Bus Technology

FC Network Technology

Measurement and Control Technology of Bus Network

GJB288A Bus

Key Techniques of 5G and Algorthm Implement

IEEE-1394 Bus

Signal Conditioning Technology of Sensors

AFDX Network Technology

Discrete Signal Processing

Energy-Efficient Computing

Motor control

2012 Altera Electronic Design Article Contest