2019 No. 12

Publish Date:2019-12-06
ISSN:0258-7998
CN:11-2305/TN
Prev

Special Column-Industrial Internet

Key issues in the development of industrial intelligence

DOI:10.16157/j.issn.0258-7998.191062

Author:Li Yaning1,Zhan Tongjie2,Liu Ying1,Yin Yangpeng1,Lou Zhaohui1,Yang Yanran1

Author Affilications:1.China Academy of Information and Communications Technology, The Research Institute of Informatization and Industrialization Integration,Beijing 100191,China; 2.College of Electrical and Information Engineering,Hunan University,Changsha 410012,China

Abstract:With the deepening of the theory and application of artificial intelligence technology, industrial manufacturing is expected to become the key field of its application.In order to provide reference and guidance for formulating industrial intelligence development policies in China,this paper analyses the technical mechanism of industrial (artificial) intelligence in solving industrial problems and establishes an algorithm-application analysis system.Focusing on the representative vertical industries,we also study the application examples and characteristics of industrial intelligence.And finally,our team expound the current situation and development trend of industrial intelligence-related industries.
Key word:
industrial intelligence
algorithmic mechanism
vertical field
industrial trend

Design of temperature acquisition and remote monitoring system for NB-IoT metallurgy node

DOI:10.16157/j.issn.0258-7998.191035

Author:Deng Rendi,Liu Xiong,Wu Chun

Author Affilications:School of Defense Science and Technology,Southwest University of Science and Technology,Mianyang 621000,China

Abstract:Aiming at the complexity and particularity of the production environment of the steel industry, this paper designs a NB-IoT metallurgical node temperature acquisition and remote monitoring system. The system is based on the AD8495 amplifier processing K-type thermocouple cold junction compensation to complete the on-site temperature and other parameters acquisition, STM32 node linearization algorithm processing, communication with remote computer through Modbus and NB-IoT network data transmission, and based on LabVIEW host computer remote monitoring and safety management of blast furnace channel special environment. Experiments show that compared with the traditional single local monitoring, the system makes full use of the advantages of NB-IoT technology, with local and remote synchronous real-time monitoring and low cost, wide coverage, wireless multi-connection and so on.
Key word:
AD8495
linearization
Modbus
NB-IoT
remote monitoring

Embedded authentication technology for industrial control core area based on asymmetric algorithm

DOI:10.16157/j.issn.0258-7998.191208

Author:Liu Jianbing

Author Affilications:Beijing VRV Software Corporation Limited,Beijing 100044,China

Abstract:Embedded authentication technology is the author′s patented technology.The innovative product based on embedded certification is a new method for the protection of the core area of industrial control systems. Following the PKI and IPK cryptosystems, embedded authentication is implemented on the industrial switch, and the SM2 asymmetric algorithm is applied to the terminal access authentication process. This paper with the main source code introduces the implementation method and technical details of the switch embedded authentication server and Windows/Linux authentication client.
Key word:
asymmetric lgorithm
industrial control system core area
embedded authentication
terminal authentication access

Intelligent factory information security protection program

DOI:10.16157/j.issn.0258-7998.191040

Author:Li Shiqi,Han Qingmin,Du Junzhao,Li Mojun

Author Affilications:National Computer System Engineering Research Institute of China,Beijing 100083,China

Abstract:With the rapid development of China′s manufacturing industry, intelligent and networked, a scientific protection program is particularly important. This paper introduces the current situation of network use of a company from the perspectives of risk status, risk identification, communication security hazards, etc., and analyzes its characteristics and existing security risks. A well-designed information security protection scheme is proposed, which makes the network protection of the entire company more secure through the design of a well-established network architecture and a reasonable supervision mechanism.
Key word:
intelligent manufacturing
network security
project design
network architecture

Special Column-5G Vertical Industry Application

Industrial application research based on 5G deterministic network

DOI:10.16157/j.issn.0258-7998.191162

Author:Zhang Lei,Xia Xu,Zhu Xuetian

Author Affilications:China Telecom Intelligent Network and Terminal Research Institute,Beijing 102209,China

Abstract:With the rapid development of communication technology, the "best" service capability provided by traditional network can no longer meet the demands of various vertical industries for high-performance networks such as ultra-low delay, deterministic delay and high reliability, and 5G deterministic network emerges at the historic moment.5G deterministic network builds higher quality network service capability mainly through 5G key technologies such as network slicing, mobile edge computing and time-sensitive network. Starting from the capability of personalization and customization of 5G network, this paper analyzes the requirements of four typical industrial application scenarios on the determination of 5G network performance indicators, puts forward the deterministic network implementation architecture and key technologies, and presents some typical cases.
Key word:
5G deterministic network
network slice
mobile edge computing
time-sensitive network

Edge computing applications and technical architecture of 5G industrial Internet

DOI:10.16157/j.issn.0258-7998.191153

Author:Yang Xin1,Shi Xiaohou1,Shen Yun1,Xiong Xiaomin1,Duan Huibin1,Zhu Xuetian2

Author Affilications:1.China Telecom Strategy and Innovation Research Institute,Beijing 102209,China; 2.China Telecom Intelligent Network and Terminal Research Institute,Beijing 102209,China

Abstract:5G industrial Internet is the hot spot and focus in the development of 5G and industrial Internet in China. Edge computing is introduced in both industrial Internet and 5G, but the concern of it is different. This paper analyzes the industrial Internet application based on 5G edge computing and its development, summarizes the industrial Internet edge computing technical architecture, and presents the cloud edge collaborative technical architecture of 5G industrial Internet edge computing.
Key word:
5G
5G service
industrial Internet
edge computing

Study on 5G V2X communication security service

DOI:10.16157/j.issn.0258-7998.191220

Author:Zhou Wei1,Zhu Xuetian2,Xia Xu2

Author Affilications:1.Datang Mobile Communications Equipment Co.,Ltd.,Beijing 100083,China; 2.China Telecom Intelligent Network and Terminal Research Institute,Beijing 1002209,China

Abstract:The current status and vision of 3GPP V2X communication security technology are briefly introduced. Corresponding security requirements are given based on the security threatens of V2X communication. This paper briefly introduces the principal method of implementing V2X communication security, and proposes the service architecture, PKI architecture and multi-PKI system mutual trust mechanism for V2X communication security. Finally, the status of domestic V2X security standardization and industrial development prospects are introduced.
Key word:
V2X security
communication security
PKI
5G security

Implementation and application of 5G customized network based on the QoS flow

DOI:10.16157/j.issn.0258-7998.191104

Author:Li Kunlun1,Li Kai1,Zhu Xuetian2

Author Affilications:1.China Telecom Corporation Limited Strategy Innovate Research Institute,Beijing 102209,China; 2.China Telecom Corporation Limited Intelligence Network and Terminal Research Institute,Beijing 102209,China

Abstract:This paper presents the Quality of Service(QoS) mechanism and the development process of the mobile network. The ability and deficiency of both 3rd-Generation(3G) gold, silver and cooper and the 4rd-Generation(4G) QoS Class Identifier(QCI) in the implementation of customized network are analyzed, and the QoS design ideas, implementation principles and outstanding advantages of 5rd-Generation(5G) network are also introduced. Combined with the productized experience of 4G QoS capability operation in To B mode, the QoS capability of 5G network is end-to-end productized encapsulating for the industry customers to achieve the 5G customized network capability based on the QoS flow. Meanwhile, combined business characteristics with business requirements, e.g. industrial Internet, augmented reality, autonomous driving, intelligent transportation and other industries and applications, the typical application solutions and productized ideas of 5G QoS mechanism are designed.
Key word:
QoS
policy and charging rules function
guaranteed bit rate

Review and Comment

Secure storage and exchange technology for manufacturing big data

DOI:10.16157/j.issn.0258-7998.190818

Author:Chen Yuxiang1,2,Hao Yao1,2,Zhao Yue1,2,Cheng Lin3,Wu Kaijun1,2,Liao Sijie1

Author Affilications:1.No.30 Institute,China Electronics Technology Group Corporation,Chengdu 610041,China; 2.Science and Technology on Communication Security Laboratory,Chengdu 610041,China; 3.China Information Technology Security Evaluation Center,Beijing 100085,China

Abstract:In order to solve the problem of secure storage and exchange of manufacturing big data, a storage and exchange mode oriented to manufacturing big data is proposed. The security risks in storage and exchange of manufacturing big data are mainly analyzed. Key technologies such as searchable encryption technology, attribute-based access control technology and process measurement method are proposed to solve the leakage risks in data storage and exchange. The current situation and shortcomings of these key technologies are summarized and analyzed, and the future development is prospected.
Key word:
secure storage
sharing and exchange
searchable encryption
attribute-base encryption

Artificial Intelligence

Diagnosis of gearbox faults based on particle swarm optimization BP neural network

DOI:10.16157/j.issn.0258-7998.190668

Author:Zhang Yongchao1,Li Jincai1,Zhao Luhuai2

Author Affilications:1.Xi′an Jiaotong University City College,Xi′an 710018,China; 2.Electrical College,Xi′an Jiaotong University,Xi′an 710048,China

Abstract:Aiming at the problem of low correct recognition rate and relying on experience to select parameters in gear box fault diagnosis by using neural network, a fault diagnosis method of gear box based on particle swarm optimization BP network is proposed. In this paper, a fault model is established by extracting characteristic parameters from gear vibration principle. The model takes eigenvector of gear box as input and fault type as output. The fault diagnosis of gear box is realized by BP neural network, probabilistic neural network and particle swarm optimization BP neural network. The simulation results show that the convergence speed of BP neural network for gear box fault diagnosis is slow, and the recognition rate of fault diagnosis is 82%. The recognition rate of probabilistic neural network model fault diagnosis is determined by selecting spreads based on experience, and the maximum recognition rate is 98%. The recognition rate of BP neural network fault diagnosis based on particle swarm optimization is 100% and adaptive ability is strong.
Key word:
gear box
fault diagnosis
PSO-BP neural network
fault model

Domain knowledge fusion and knowledge co-construction research

DOI:10.16157/j.issn.0258-7998.191130

Author:Yang Wei

Author Affilications:IT Department,State Grid Customer Service Center,Tianjin 300000,China

Abstract:In order to serve the customer service intelligent dialogue system of the State Grid Customer Service Center, it is necessary to extract knowledge from a large number of documents and traditional knowledge base as well as dialog data. This paper proposes a new knowledge graph framework that integrates fact graph and event evolutionary graph, which can be based on multiple sourcea data. The constructed knowledge graph has good performance in the vertical domain of accurate question and answer, customer service system knowledge support, dialogue management guidance, knowledge reasoning and so on. New knowledge graph was put into use in the customer service center question and answer system, which changed the working mode of the customer service and greatly improved efficiency of the customer service.
Key word:
knowledge graph
event evolutionary graph
dialogue system

Image classification search system based on deep learning method

DOI:10.16157/j.issn.0258-7998.190639

Author:Zhang Lin,Yang Fengshang

Author Affilications:School of Opto-Electronic and Communication Engineering,Xiamen University of Technology,Xiamen 361024,China

Abstract:Image classification is to distinguish different types of images based on image information. It is an important basic issue in computer vision, and is also the fundamental for image detection, image segmentation, object tracking and behavior analysis. Deep learning is a new field in machine learning research. Its motivation is to simulate the neural network of the human brain for analytical learning. Like the human brain, deep learning can interpret the data of images, sounds and texts. The system is based on the Caffe deep learning framework. Firstly, the data set is trained and analyzed, and a model based on deep learning network is built to obtain the image feature information and corresponding data classification. Then the target image is expanded based on the bvlc-imagenet training set model. And finally,"search an image with an image" Web application is achieved.
Key word:
image classification
depth learning
Caffe framework
convolution neural network

Microelectronic Technology

A novel rectifying circuit with high efficiency and wide bandwidth

DOI:10.16157/j.issn.0258-7998.190885

Author:Cai Haotian,Chen Xing

Author Affilications:College of Electronics and Information Engineering,Sichuan University,Chengdu 610065,China

Abstract:A novel high-efficiency and wide bandwidth rectifying circuit is proposed. By connecting a microstrip line in series at the front end of the rectifying diode, and adjusting the length of the line within its inductive range, the capacitive reactance generated by the diode at the fundamental frequency can be offset, and thereby a good impedance matching is realized by using the 1/4 wavelength impedance conversion method rather than the single branch matching method. In this way, the circuit is able to achieve a compact structure and meanwhile an enhanced working bandwidth. Moreover, the design of the sector branch in the direct current(DC) filter has been improved, e.g. its length of branch is adjusted according to its effect to the DC voltage waveform, so that the output DC voltage ripple can become more stable, and hence the rectifying efficiency of the circuit can be improved. A rectifying circuit working at 5.8 GHz has been designed. Measurement results show, when the input microwave power is in a range of 0~16 dBm, the rectifying efficiency of the circuit is over 55% with a maximum value up to 78.7%; at an input microwave power of 13 dBm, the circuit realizes a bandwidth of 16.6% for the rectifying efficiency more than 70%.
Key word:
microwave wireless power transmission
wide bandwidth
high efficiency
rectifying circuit

Numeric simulation of NMOS transient dose rate effect based on sub-micro SOI

DOI:10.16157/j.issn.0258-7998.190802

Author:Xue Haiwei1,Zhang Menghua1,Yang Guang′an2

Author Affilications:1.The 58th Institute of China Electronics Technology Group Corp.,Wuxi 214035,China; 2.Southeast University,Nanjing 210001,China

Abstract:For researching the transient dose rate effect of the H-type NMOS based on submicro SOI technology,the 3D modeling and numeric simulation of the 0.13 μm SOI NMOS is processed using TCAD tool. The relationship between the transient dose rate and the currents of drain and body-contact of the NMOS is released by using seven points which the γ-transient dose rate ranges from 1×108 to 1×1010 (Gy(Si)/s). From the simulation results, we can concluded that there is little influence on the device when the γ-transient dose rate is less than 5×109 Gy(Si)/s. The H-type NMOS device has strong ability of anti-transient dose rate radiation. The results of H-type NMOS through 3D numeric simulation provide the reference for rad-hard design in VLSI.
Key word:
transient dose rate effect
3D numeric simulation
submicro SOI
H-type NMOS

Machine learning attack to Glitch PUF based on MLP algorithm

DOI:10.16157/j.issn.0258-7998.190876

Author:Xu Jinfu,Dong Yongxing,Li Junwei

Author Affilications:The PLA Information Engineering University,Zhengzhou 450001,China

Abstract:With the development of attack technology, modeling attacks based on ML, DL and other technologies threaten the security of PUF seriously. In view of the flaw in Glitch PUF static output, this paper first proposes the multilayer perceptron algorithm for Glitch PUF machine learning to analysis nonlinear output data. The experimental results show that the MLP algorithm proposed in this paper can significantly reduce the prediction error rate compared with the logistic regression algorithm and the random forest classification algorithm.
Key word:
information security
Glitch PUF
machine learning
modeling attack

Application of high performance LDO in security monitoring system

DOI:10.16157/j.issn.0258-7998.190903

Author:Ruan Yi,Wang Jia,Zhang Bingbing

Author Affilications:Shanghai Belling Corp.,Ltd.,Shanghai 200233,China

Abstract:With the rapid development of smart city and smart terminal, security monitoring system is widely used, and higher requirements have been raised on power management components. LDO(low dropout linear regulator) is an ideal power management solution with low noise, high PSRR(power supply rejection ratio) and simple peripherals. It can meet the demand of security monitoring system which is very sensitive to noise. This paper introduces the application of high performance LDO in security monitoring, key technical parameters of LDO and its impact on security monitoring system.
Key word:
LDO
security monitoring system
PSRR
noise

Three-level envelope modulator for envelope tracking power amplifier

DOI:10.16157/j.issn.0258-7998.190913

Author:Ou Lixiang,Li Sizhen,Yu Kai,Zhang Guohao

Author Affilications:School of Information Engineering,Guangdong University of Technology,Guangzhou 510006,China

Abstract:In this paper, a three-level(3-level) envelope modulator structure is proposed. The conventional two-level(2-level) switching converter is replaced by the 3-level switching converter. The switching current slew-rate can adapt to the amplitude of the input envelope by the three-level fitting method. The output current of the linear stage can be reduced effectively, and the dynamic power consumption of the linear stage can be reduced, thus the overall efficiency of the system can be improved. The circuit is designed with 55 nm CMOS technology. The simulation results show that the output power of the power amplifier is 27.5 dBm and the efficiency is about 85% under 3.3 V power supply and 10 MHz LTE input signal. Compared with the conventional structure, the efficiency is improved by 2%.
Key word:
envelope modulator
3-level
efficiency improvement

Measurement Control Technology and Instruments

The physical mathematics model and the micro control system of four-rotor aircraft

DOI:10.16157/j.issn.0258-7998.190688

Author:Tian Rui1,2,Sun Difei1

Author Affilications:1.Department of Basic Science,Henan Polytechnic Institute,Nanyang 473000,China; 2.Institute of Physical Science and Engineering,Zhengzhou University,Zhengzhou 450001,China

Abstract:Four-rotor aircraft physical mathematical model is established for the high difficulty in the Four-rotor aircraft flight control. This paper analyzes the shortcomings of several current attitude algorithm schemes, and eliminates the rotation noncommutativity error in the operation by selecting quaternion attitude algorithm. According to predictability of angle data at the next moment, the Kalman filter is designed to eliminate the noise signal caused by environmental electromagnetic interference, temperature drift and high frequency oscillation when motor running in high speed. A micro control system circuit and a cascade PID regulator are built to make the angular velocity of the system returning to its equilibrium position is directly proportional to the angle, it solves the oscillation caused by large angle error and the lack of strength caused by small angle error. The test results outdoors show that the problem of poor stability of aircraft is solved and can meet control requirement under the model of flight, including stable hovering, forward, backward, yawing and so on.
Key word:
four-rotor aircraft
physical mathematical model
quaternion
cascade PID regulation
Kalman filtering

A LiDAR/IMU joint calibration method based on point cloud matching

DOI:10.16157/j.issn.0258-7998.190691

Author:Wu Yuhan,Wang Yunbao,Xue Qingquan,Qie Xiaobin,Li Zhiqiang

Author Affilications:Beijing Institute of Space Launch Technology,Beijing 100076,China

Abstract:In this paper, a calibration method using a corner reflector as the marker is designed for the calibration of the coordinate system of the LiDAR and inertial measurement unit(IMU). Firstly, the pre-processing methods of region segmentation, ground filtering and marker point extraction are used to extract the marker points. And then the three-dimensional point cloud matching method is used to convert the coordinate system joint calibration into the point cloud matching problem, using the iterative closest point(ICP) algorithm to obtain the coordinate transformation matrix of the two coordinate systems. The calibration results are compared with results obtained by the traditional least squares algorithm, which shows that the calibration method using 3D point cloud matching is feasible.
Key word:
coordinate system parameter calibration
3D point cloud matching
vehicle LiDAR

Zero-drift analysis and optimization design of charge conversion circuit in impact test

DOI:10.16157/j.issn.0258-7998.190638

Author:Ren Yongfeng,Huang Qiaofeng,Jia Xingzhong,Xie Lingfang

Author Affilications:National Key Laboratory for Electronic Measurement and Technology,North University of China,Taiyuan 030051,China

Abstract:The zero-drift phenomenon often occurs in piezoelectric accelerometers when performing high-g impact measurements, which seriously affects the accuracy and reliability of test results. In order to solve this problem, the influence of the RC time constant on the zero-drift in the measurement circuit is analyzed by establishing the mathematical response model of the piezoelectric sensor impact measurement. At the same time, a three-op amp differential charge amplifier circuit is designed for the common mode noise of the transmission cable. The test proves that the circuit can detect and amplify the small charge of ±20 pC while suppressing the common mode noise interference. Finally, the contrast shock test before improvement was compared with that after improvement by the Endevco impact table in order to verify that the improved design is effective in suppressing zero-drift in the impact measurement, and provides certain reference value for engineering use.
Key word:
piezoelectric acceleration sensor
zero-drift
RC time constant
common mode noise
differential charge amplifier circuit

Communication and Network

A synchronized detect algorithm for AD9371 broadband burst communications

DOI:10.16157/j.issn.0258-7998.190760

Author:Zhou Hanbing,Li Mingwei,Zhang Chuanyuan,Qian Zhankui,Xie Shiyin,Liang Wei

Author Affilications:Beijing Guodiantong Network Technology Co.,Ltd.,Beijing 100081,China

Abstract:AD9371 is a 5G mobile transceiver system chip which covered all sub-6G frequency bands newly provided by ADI corporation. Because the bandwidth and data rate are very high,when this AD9371 receiver worked under the cross-correlation peak algorithm, if a burst packet reached, for CAZAC synchronize word sequence′s cross-correlation defect, this synchronize detector will output a value jumping,causing the synchronize detected threshold beyond the truly threshold, so that all cross-relation peak detect algorithm lost its synchronize status. To solve this burst problem, this paper provides an unite burst frame edge and bit synchronize detect algorithm based on AD9371 transceiver chip with a independence frame edge detect function added. The practical test result proves it is suitable for AD9371 burst channel.
Key word:
AD9371
burst
frame synchronize
bit synchronize
united synchronize detector

An adaptive switch migration strategy for balancing loads in software-defined networking

DOI:10.16157/j.issn.0258-7998.190631

Author:Zhou Ning,Hu Tao,Hu Yuxiang,Wang Binqiang

Author Affilications:PLA Strategic Support Force Information Engineering University,Zhengzhou 450002,China

Abstract:Aiming at the loading imbalance of subdomain controller in multi-domain deployment in SDN, this paper proposes an adaptive switch migration strategy for balancing controller loads. By detecting the load of controller in each subdomain and choosing the immigration domain and emigration domain based on adaptive general algorithm, this method could achieve the global optimal selection of migration domain. In order to balance the controller load, it implements survival time and elimination mechanism to migrate the high load degree switch from the emigration domain to immigration domain. The simulation shows that the efficiency of migration has increased by 19.7% when compared with the existing migration algorithm. The controller load and the number of switches in each subdomain have been balanced and enhance stability of network.
Key word:
software defined networking(SDN)
switch migration
adaptive genetic algorithm
survival time
elimination mechanism

Computer Technology and Its Applications

Integrated overlapping CD method using existing solutions of non-overlapping CD

DOI:10.16157/j.issn.0258-7998.190704

Author:Chen Jicheng,Chen Hongchang,Li Shaomei

Author Affilications:China National Digital Switching System Engineering & Technological R & D Center(NDSC),Zhengzhou 450002,China

Abstract:To detect overlapping communities more conveniently and accurately, an integrated overlapping community detection(IOCD) algorithm is proposed, which considers inferring overlapping communities from multiple non-overlapping community structures. Firstly, an eigenvector is generated for each vertex according to the results of the basic community detection(CD) algorithm. These features are used to detect the overlapping regions with dense connections in an unsupervised learning manner. That is to say, non-overlapping CD solutions are used to extract the implicit feature information associated with each vertex. Then, some iterations are made to maximize the possibility that each vertex belongs to its own community. Experiments on synthetic network and real community network datasets show that the proposed IOCD algorithm is superior to other similar algorithms under three standard metrics, and is almost unaffected by the basic CD algorithm.
Key word:
community detection
overlapping community
non-overlapping community
vertex
synthetic network

The enterprise marketing analysis based on ECharts

DOI:10.16157/j.issn.0258-7998.190733

Author:Zhou Weiyi

Author Affilications:College of Computer Science and Engineering,Jiangsu University of Science and Technology,Zhenjiang 212000,China

Abstract:Extracting valuable information from a large number of report data is a very important step in the enterprise market analysis. And how to show a large amount of data to the enterprise managers in the short time with the form of diagramming is the significance of this study. With the support of Ajax, the page uses the graphical reporting technology ECharts, making the rigid report data become clear and visualized to the enterprise managers, and provide them a solid foundation for their precise market judgment.
Key word:
ECharts
the enterprise market analysis
Ajax
diagram

A synchronous and listening guard strategy design based on dual-machine hot standby

DOI:10.16157/j.issn.0258-7998.190731

Author:Zhang Junyong,Liu Ronglin,Li Yihan

Author Affilications:Tianjin 712 Communication & Broadcasting Co.,Ltd.,Tianjin 300140,China

Abstract:A design method based on dual-machine hot standby is proposed. The dual-machine hot standby master-slave working mode is adopted, and a full-duplex working mode of dual-system hot standby is simulated by a certain voting algorithm. The two-machine hot standby design is carried out from the aspects of fault detection, control voting, data synchronization and listening guard. On the basis of not increasing hardware, the system reliability is improved as much as possible to ensure the uninterrupted operation of the system. It has been verified that the standby computer can perform function control quickly and "seamlessly" when all or part of the main control computer functions fail.
Key word:
hot standby
fault detection
control voting
data synchronization
listening guard

Power Management

The development of the miniaturizing processing board in IR imaging module

DOI:10.16157/j.issn.0258-7998.190831

Author:Li Haiting,Hu Xin,Zeng Shuang,She Junchao,Lu Qiang,Sui Jun

Author Affilications:Southwest Institute of Technical Physics,Chengdu 610041,China

Abstract:The processing board is the core of the miniaturizing IR imaging module. Every task in the designing process of the miniaturizing processing board is introduced, including the designing of overall scheme,the selection of main components, the measures in the designing of power-distributed-system(PDS),signal integrality(SI) and power integrality(PI). The institution of wiring constraint rules of the interfacing signals between the LPDDR2 and FPGA is also introduced.The calculation method of the memory interfacing bandwidth and the improving in memory interfacing bandwidth by hard memory controllers in Cyclone V FPGA is discussed.
Key word:
IR imaging
processing board
miniaturizing
interfacing bandwidth

Design and implementation of a power controller for wearable system

DOI:10.16157/j.issn.0258-7998.190825

Author:Song Jinhua,Wu Lin,Xie Qishao,Lu Zhirong

Author Affilications:Tongfang Electronic Science and Technology Co.,Ltd.,Jiujiang 332002,China

Abstract:A power controller for wearable system is designed based on MCU control. It has charge/power supply management of double batteries; built-in single chip computer: soft control of power switch and remote shutdown; real-time monitoring and indicating the working status of the controller, which can indicate the battery power information; communication with the host computer to upload the working status and battery power information; full protection, over-current protection, short circuit protection, input reverse protection, parallel operation of double batteries and other protective work. The utility model has the advantages of high efficiency, small size, simple operation, full function, flexible configuration of double batteries, good electromagnetic compatibility of metal case and high reliability. Solar power or hand-driven generator can be used to charge the battery through the controller to improve its field adaptability.
Key word:
controller
lithium battery
charging
8051F330
equalization

Study on control strategy of full bridge buck-boost converter based on wide input voltage

DOI:10.16157/j.issn.0258-7998.190887

Author:Wang Shaobin,Su Shujing,Ren Ting

Author Affilications:Key Laboratory of Instrumentation Science and Dynamic Measurement,North University of China,Taiyuan 030051,China

Abstract:A multi-mode control strategy for full-bridge buck-boost(FBBB) converter is proposed to solve the problems of high heat dissipation requirement, low efficiency and poor reliability in wide input voltage range. This strategy determines the working mode of the converter according to the relationship between the input voltage and the output voltage. By combining the average current control with dual-edge modulation and phase-shifting control, the FBBB converter can achieve a smooth transition between step-down, step-up and step-down modes. The converter works in the effective duty cycle region and conducts inductive current. Effective control is taken to ensure the safe and reliable operation of the converter. Type-III compensation network is used to improve the control loop and achieve high precision output and fast dynamic response. Finally, a simulation model is built to verify its correctness and effectiveness.
Key word:
full bridge buck-boost converter
wide input voltage
average current control
dual-modulation
compensation network

High step-up low-voltage stress boost converter with single-switch

DOI:10.16157/j.issn.0258-7998.190897

Author:Ding Jie,Zhao Shiwei,Wen Chuqiang

Author Affilications:Electric Power College,South China University of Technology,Guangzhou 510640,China

Abstract:In order to convert the low-voltage direct current of photovoltaic panels and fuel cells in distributed power generation system into high-voltage direct current,a high step-up DC/DC converter with pump-up capacitor based on switch capacitor and switch inductance network is proposed. This converter further increases the voltage gain and reduces the voltage stress of the power device.Using magnetic integration technology, two inductors are wound on the same magnetic core to form coupled inductor, which improves the power density of the converter.Finally, the basic working principle of the topology is analyzed, and a prototype with input voltage of 30 V, output voltage of 380 V and rated power of 200 W is made. The experimental results verify the correctness of the theoretical analysis.
Key word:
high step-up
boost converter
pump-up capacitor
switched network

Key Technologies of 5G and Its Evolution

Key Technologies of 5G and Its Evolution

High Performance Computing

Processing and Application of Marine Target Characteristic Data

Smart Power

Antenna Technology and Its Applications

Smart Agriculture

5G-Advanced and 6G

5G Vertical Industry Application

Microelectronics in Medical and Healthcare

Key Technologies for 6G

Application of Edge Computing in IIoT

Deep Learning and Image Recognization

6G Microwave Millimeter-wave Technology

Radar Processing Technology and Evaluation

Space-Ground Integrated Technology

Industrial Ethernet Network

5G Vertical Industry Application

High Performance Computing

Innovation and Application of PKS System

FPGA and Artificial Intelligence

5G Network Construction and Optimization

RF and Microwave

Edge Computing

Network and Business Requirements for 6G

5G and Intelligent Transportation

5G R16 Core Network Evolution Technology

Satellite Nevigation Technology

5G R16 Evolution Technology

5G Wireless Network Evolution Technology

5G Network Planning Technology

5G Indoor Coverage Technology

5G MEC and Its Applications

5G Co-construction and Sharing Technology

Expert Forum

5G and Emergency Communication

5G Slicing Technology and Its Applications

Industrial Internet

5G Terminal Key Realization Technology

5G and Artificial Intelligence

5G and Internet of Vehicles

Terahertz Technology and Its Application

Signal and Information Processing

Artificial Intelligence

5G Communication

Internet of Things and the Industrial Big Data

Electronic Techniques of UAV System

Power Electronic Technology

Medical Electronics

Aerospace Electronic Technology

Robot and Industrial Automation

ADAS Technique and Its Implementation

Heterogeneous Computing

2016 IEEE International Conference on Integrated Circuits and Microsystems

ARINC859 Bus Technology

FC Network Technology

Measurement and Control Technology of Bus Network

GJB288A Bus

Key Techniques of 5G and Algorthm Implement

IEEE-1394 Bus

Signal Conditioning Technology of Sensors

AFDX Network Technology

Discrete Signal Processing

Energy-Efficient Computing

Motor control

2012 Altera Electronic Design Article Contest