2021 No. 04

Publish Date:2021-04-06
ISSN:0258-7998
CN:11-2305/TN
Prev Next

Expert Forum

Empirical study on urban data governance based on “one database & two chains”

DOI:10.16157/j.issn.0258-7998.218401

Author:Lu Zhipeng

Author Affilications:China Electronics Corporation,Beijing 100190,China

Abstract:As a new production factor, data plays an important role in urban economic and social development. It is urgent to implement Data Governance Project more scientifically and systematically due to the difficulty in releasing data value. China Electronics Corporation(CEC) implements the strategy of Digital China and Cyberpower . It proposes a three-level model system of data elements, which is composed of data element model, application model, pricing and security audit model, and designs the project implementation path of "one database, two chains" and "three-level market", so as to promote the "three sublimation" of data resources, assets and capitalization, and build a new city engine of high-quality development to make the city more wonderful and the people happier.
Key word:
data governance
one database & two chains
data element
data factor

Special Column-Edge Computing

Research on cloud edge coordination technology of demand side resources participating in system control within Energy Internet

DOI:10.16157/j.issn.0258-7998.201475

Author:Pan Mingming1,Tian Shiming1,Liu Zongjie2,Yuan Jindou1,Chen Songsong1

Author Affilications:1.Beijing Key Laboratory of Demand Side Multi-Energy Carriers Optimization and Interaction Technique, China Electric Power Research Institute,Beijing 10092,China; 2.State Grid Shandong Electric Power Company,Jining 272000,China

Abstract:Energy Internet technology can realize the information fusion of demand side adjustable power load resources, transmission and distribution resources, power generation resources, and play the value benefits of demand side adjustable power load in peak load and frequency regulationof power grid. In this paper, by integrating the advantages and disadvantages of different control modes for demand side resources, a framework and method of decentralized collaborative control within demand side resource cluster and regional grid coordinated control is proposed, which can effectively improve the flexibility and rapidity of adjustable resource response grid frequency regulation.
Key word:
Energy Internet
adjustable load
grid regulation
load aggregation
edge computing

Research of alarm correlation technique for edge cloud computing in power communication network

DOI:10.16157/j.issn.0258-7998.201269

Author:Li Jixuan1,Wu Zichen1,Guo Tao1,Zhu Pengyu2,Wu Jihua3

Author Affilications:1.Information and Communication Branch of State Grid Jiangsu Electric Power Co.,Ltd,Nanjing 210000,China; 2.State Grid Electric Power Research Institute Co.,Ltd,Nanjing 210012,China; 3.State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications, Beijing 100876,China

Abstract:The demand for electric power and the coverage of power communication network has been gradually expanding, which brings the challenges that need to be addressed in the operation and maintenance of the domain. The deployment of edge nodes provides the availability of data collection, information filtering and computational support, which can heavily alleviate the pressure of management. Alarm analysis is a key and difficult problem in operation and maintenance. The traditional alarm analysis first uses rules to merge alarms, so as to reduce the workload of subsequent processing. However, the completeness of rules requires a lot of expert knowledge and human resources investment, and there are limitations. This paper proposed a novel and lightweight algorithm. In this paper, Unsupervised clustering is introduced into the alarm merging process of power communication network edge cloud computing, and the density based clustering method is combined with the existing merging rules. The experimental results show that the effect of alarm merging can be significantly improved by adding unsupervised learning, which is helpful to improve the accuracy and completeness of subsequent defect location.
Key word:
unsupervised learning
DBSCAN
alarm correlation
edge computing

Research and application on agile intelligent system named “SWIFT”

DOI:10.16157/j.issn.0258-7998.201331

Author:Fang Ke1,Ning Kun2,Pan Ling1

Author Affilications:1.Sichuan Key Laboratory of Agile Intelligent Computing,Chengdu 610036,China; 2.Dongfang Electric Wind Power Co.,Ltd.,Deyang 618000,China

Abstract:In view of the lack of sufficient computing, storage and communication network resources for computing equipment at the edge of inclement industrial environments, and the requirement for ms-level data processing response, the agile intelligent system named “SWIFT” was introduced from the general architecture, hardware and software composition and key technology. This system has been verified in wind power equipment, which improves the user′s ability to optimize wind turbine operation and maintenance detection, and reduces downtime loss and operation cost. At the same time, it also discussed that the agile intelligent cluster computing technology could be applied in not only intelligent operation and maintenance of single wind turbine,but also the intelligent operation of large-scale wind farm.
Key word:
edge computing
operations and maintenance
intelligent clustering
wind power

Exploration of OLT converged edge computing for industrial internet

DOI:10.16157/j.issn.0258-7998.201072

Author:Gan Yuying,Sun Hui,Liang Zhenming

Author Affilications:Chinatelecom Corporation Shanghai Research Institute,Shanghai 210043,China

Abstract:The industrial internet site has the complexity brought by a large number of heterogeneous devices and networks, as well as the real-time and reliability problems of industrial production. If data analysis and control logic are all implemented in the cloud, it is difficult to meet the network requirements of industrial scenarios. However, edge computing can meet the development needs of the industrial internet in terms of service real-time and reliability. This paper proposes three technical solutions for optical line terminal(OLT) converged edge computing for industrial internet,mainly through the edge computing and OLT business connection, route forwarding and management functions and other aspects of the analysis. Comparing the differences among the three solutions of OLT built-in edge computing with value-added functions, OLT built-in edge computing with general functions, and OLT external edge computing, according to their differences, the scene requirements applicable to different factories are proposed.
Key word:
edge computing
optical line termina
built-in resource board

Research of fault diagnosis of power communication network in edge cloud computing

DOI:10.16157/j.issn.0258-7998.201347

Author:Zhu Pengyu1,Cai Xinzhong1,Xu Shiyuan1,Wu Jihua2,Wang Jingyu2

Author Affilications:1.State Grid Electric Power Research Institute Co.,Ltd.,Nanjing 210012,China; 2.State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications, Beijing 100876,China

Abstract:The expansion of the power communication network and the deployment of smart grids have brought massive amounts of data and calculation pressure to the operation and maintenance center. Edge computing can alleviate the pressure on the grid management platform to process massive amounts of data, reduce computing overhead, and assist operation and maintenance personnel efficiently complete fault diagnosis and maintenance. This paper proposed a power communication network fault diagnosis technical solution based on the edge computing architecture combined with the knowledge graph technology, will focus on the new ecology of edge computing in the power communication network. For improving the traditional rule-based technology and enhancing the reliability and efficiency, the system integrates a variety of intelligent methods to realize fault diagnosis under the edge computing architecture, and realizes timely detection of faults and dispatch maintenance through analysis of equipment alarms and network topology.
Key word:
fault diagnosis
knowledge graph
anomaly detection
edge computing

Review and Comment

Research on intergenerational and development of hybrid integration technology

DOI:10.16157/j.issn.0258-7998.200869

Author:Zhu Yusheng1,Shi Jing2,Chen Cheng1

Author Affilications:1.The 43rd Research Institute of CETC,Anhui Key Laboretory of Microsystems,Hefei 230088,China; 2.Army Artillery Air Defense Academy,Hefei 230039,China

Abstract:Hybrid integration technology is a kind of high-end packaging technology that directly encapsulates zero level devices into 1-3 level modules or systems to meet the requirements of small volume, light weight, strong function, high reliability, wide frequency, high precision and good stability for aerospace, electronic and weapon equipment. Since the 1970s, hybrid integration technology has gone through the stages from thick/thin film assembly to multi chip module(MCM), system level packaging(SIP), micro system integration and so on. It always focuses on the connection between micro-devices and macro-devices, which is a continuous innovation technology of multi-disciplinary integration for design,material,technics,project,experiment. In this paper, by analyzing and studying the process characteristics, key points and typical products of hybrid integration technology in different periods, the development of hybrid integration technology is divided into four generations by induction and summary. Meanwhile, according to the technical characteristics and trends of different generations, it also tries to predict the development direction of the next generation of hybrid integration technology.
Key word:
hybrid integrated circuit
hybrid integration technology
thick/thin film
system in package
generations

Survey of anonymous communication system

DOI:10.16157/j.issn.0258-7998.200995

Author:Chen Huan1,Su Majing1,Wang Xuebin2,Song Dong1

Author Affilications:1.National Computer System Engineering Research Institute of China,Beijing 100083,China; 2.Institute of Information Engineering,Chinese Academy of Sciences,China

Abstract:Anonymous communication system refers to a network that is built on the network application layer and combines data forwarding, content encryption, traffic obfuscation and other technologies to realize the association between communication entities and the hidden content of the communication content from third parties. In the usage scenarios of business secret transmission and electronic voting, it is an important evaluation standard to ensure that the user′s personal identity and behavior are not recognized by eavesdroppers. Anonymous communication system is to solve the above problems. Anonymous communication system has the characteristics of untraceable message and communication cannot be monitored by a third party. On the one hand, from the perspective of hidden data transmission, anonymous communication systems can enhance the security of the system. On the other hand, due to the abuse of anonymous communication technology, illegally constructed private hidden services are numerous and endless, bringing network security and social stability.Sorting out the current anonymous communication systems and technologies is helpful to understand the development status of anonymous communication technologies, and then use anonymous communication technologies more reasonably to build anonymous communication systems to achieve safe and reliable transmission of information.
Key word:
anonymous communication system
evolution
principle
threat
evaluation

Artificial Intelligence

A method for identifying Tor hosts based on machine learning techniques

DOI:10.16157/j.issn.0258-7998.200759

Author:Zhang Ling1,Wei Chuanzheng1,Lin Zhenbiao1,Duan Linlin2

Author Affilications:1.Beijing Cyber XingAn Technology Co.,Ltd.,Beijing 102200,China; 2.School of Information Engineering,Zhengzhou University,Zhengzhou 450001,China

Abstract:Tor is an anonymous Internet communication system based on onion routing network protocol. Network traffics generated by normal applications become hard to trace when they are delivered by Tor system. However, an increasing number of cyber criminals are utilizing Tor to remain anonymous while carrying out their crimes or make illegal transactions. As a countermeasure, this paper presents a method able to identify Tor traffics and thereby recognize related Tor hosts. The method proposes several groups of features extracted from network traffic and resort to machine learning algorithm to evaluate feature effectiveness. Experiments in real world dataset demonstrate that the proposed method is able to distinguish Tor flows from normal traffics as well as recognize the kind of activity in Tor generated by different normal applications.
Key word:
darknet detection
Tor
communication entity recognition
machine learning

Sentiment analysis of Weibo based on TFIDF-NB algorithm

DOI:10.16157/j.issn.0258-7998.200748

Author:Yang Ge1,2,Yang Lutao1

Author Affilications:1.Key Laboratory of Intelligent Multimedia Technology,Beijing Normal University(Zhuhai Campus),Zhuhai 519087,China; 2.Engineering Lab on Intelligent Perception for Internet of Things(ELIP),Shenzhen Graduate School,Peking University, Shenzhen 518055,China

Abstract:In view of the large amount of public opinion information on Weibo, irregular and random changes, this paper proposes a Weibo sentiment analysis method based on TFIDF-NB(Term Frequency Inverse Document Frequency-Naive Bayes) algorithm. By coding a Weibo comment crawler based on the Scrapy framework, several Weibo comments on a hot event are crawled and stored in the database. Then text segmentation and LDA(Latent Dirichlet Allocation) topic clustering are performed. And finally the TFIDF-NB algorithm is used for sentiment classification. Experimental results show that the accuracy of the algorithm is higher than that of the standard linear Support Vector Machine algorithm and the K-Nearest Neighbor algorithm, and it is higher than the K-Nearest Neighbor algorithm in terms of accuracy and recall, and it has a better effect on sentiment classification.
Key word:
Weibo public opinion
web crawler
sentiment classification

Microelectronic Technology

Design of a BP neural network SoC based on domestic embedded CPU

DOI:10.16157/j.issn.0258-7998.200949

Author:Xu Wenliang

Author Affilications:School of Electronic Information,Hangzhou Dianzi University,Hangzhou 310018,China

Abstract:The paper designs a Back Propagation(BP)neural network system on chip(SoC) based on the domestic embedded Central Processing Unit(CPU) CK803S and its SoC design platform. The design structure of SoC and the design scheme of BP neural network hardware accelerator are given, and for the non-linear BP activation functions Sigmod and Guass, a method that can save hardware resources while not affect the speed is selected to implement them,and optimize accelerator′s performance and power consumption.The verification results show that the design can meet the requirements.
Key word:
BP neural network
domestic embedded processor CK803S
SoC design platform
FPGA implement

Design of GaN-based input harmonic control RF power amplifier

DOI:10.16157/j.issn.0258-7998.201247

Author:Shao Yuwei,Tao Hongqi

Author Affilications:Science and Technology on Monolithic Integrated Circuits and Modules Laboratory,Nanjing Electronic Devices Institute, Nanjing 210016,China

Abstract:The influence of input harmonic control theory on the performance of power amplifier efficiency is qualitatively analyzed. At the same time, the 0.25 ?滋m GaN HEMT device from Nanjing Institute of Electronic Devices was selected, and the load pull test and harmonic balance simulation of the GaN HEMT device were carried out. According to the test results, it is found that the efficiency of the RF power amplifier can be effectively improved through the input harmonic control, and an efficiency improvement at 3~10%can be obtained in band. Based on this, an X-band single-stage monolithic microwave integrated circuit(MMIC) power amplifier was designed. After testing, the power amplifier chip has a maximum PAE at 52.88% in the range of 9.2 to 11.3 GHz.
Key word:
power amplifier
input harmonic control
high efficiency
monolithic microwave integrated circuit

Measurement Control Technology and Instruments

Text classification of railway safety fault based on TF-IDF evolutionary integrated classifier

DOI:10.16157/j.issn.0258-7998.200284

Author:Gao Fan1,Wang Fuzhang1,Zhang Ming1,Zhao Junhua2,Li Gaoke1

Author Affilications:1.China Academy of Railway Science,Beijing 100081,China; 2.Beijing Jingwei Information Technologies Co.,Ltd.,Beijing 100081,China

Abstract:Railway safety is the core of railway transportation guarantee. The unstructured text data of railway safety problems is large, and the content of the text has no specific rules, which makes it very difficult to comprehensively analyze and solve the safety problems. Aiming at the intelligent classification of railway safety data, an evolutionary ensemble classifier model is proposed. By analyzing the characteristics of the catenary security issues of data, TF-IDF model is adopted to realize the feature extraction. Bagging ensemble classifier which uses Decision Tree as the base classifier classifies the text data, in the process of classification of Bagging, for the combined solution set of base classifier generated by Bagging Algorithm, Genetic Algorithm is proposed to optimize it to generate the combined solution set of base classifier with better classification results. Based on the safety problem of power supply contact network of a railway bureau, the experimental analysis shows that the TF-IDF+Bagging+Genetic Algorithm=Evolutionary Ensemble Classifier model has a high classification index in the text classification of railway safety problems.
Key word:
software railway safety problems
TF-IDF
base classifier
integrated classifier
evolutionary integration classifier

Research on distributed I/O redundancy method based on domestic PLC

DOI:10.16157/j.issn.0258-7998.200588

Author:Liu Xuefei1,Su Shishi2,Kuai Liang1,Han Qingmin1,Wang Shuai1,Wu Yunfeng1

Author Affilications:1.The 6th Research Institute of China Electronics Corporation,Beijing 102209,China; 2.CS&S.Information System Engineering Co.,Ltd.,Beijing 102209,China

Abstract:In order to improve the reliability of the acquisition/output link in the PLC control system, the design principle of the redundant system is analyzed, combined with the field application environment and actual needs, a distributed I/O redundancy method based on domestic PLC is developed. The article introduces the digital input/output and analog input/output redundancy schemes respectively for the type of data collected. This method takes the self-diagnosis results of the self-diagnosis periodically during operation as the basis for redundant diagnosis, combined with the user-configured redundancy scheme to improve accuracy of collecting/outputting data. It can be known from experiments and on-site base application that this method improves the reliability of the PLC control system and can ensure that the PLC system operates stably, efficiently and safely for a long time.
Key word:
programmable logic controller(PLC)
reliability
I/O redundancy
fault diagnosis

Traffic flow parameter detection technology based on RFID and video monitoring

DOI:10.16157/j.issn.0258-7998.200515

Author:Liu Haiyan,Li Junmin

Author Affilications:Nanjing University of Science and Technology Zijin College,Nanjing 210023,China

Abstract:This paper presents a traffic flow parameter measurement method based on RFID and video monitoring technology. It introduces the composition of detection system, key technology of vehicle electronic license plate based on radio frequency(RFID), image processing technology of road video, etc. The detection system reads the electronic license plate information from the RFID terminals installed on the supports on both sides of the road. Master control unit adjusts the signal acquisition rate of video terminal, RFID data and video data for processing in time to get the traffic data such as license plate,vehicle characteristics, speed and effective traffic flow parameters, etc. These data also can be compressed and sent to the server through the cloud network. The server can remote monitoring the road traffic, and can get more detailed information afer further processing. It provides reliable and accurate data support for traffic guidance, illegal monitoring and speed monitoring.
Key word:
RFID
electronic license plate
video monitoring
speed monitoring
traffic flow

Communication and Network

Cryptanalysis of NBC-128

DOI:10.16157/j.issn.0258-7998.201005

Author:Yang Jiangshuai1,Chen Huaifeng1,Bao Jinfeng2,Kang Xiaowen3

Author Affilications:1.The 6th Research Institute of China Electronics Corporation,Beijing 100083,China; 2.The Institute of Tourism,Beijing Union University,Beijing 110101,China;3.61428 Military,Beijing 100097,China

Abstract:NBC is a family of block ciphers using Generalized Feistel structure, designed by Xu Hong et al. There are three block and key sizes,i.e.,128/128, 128/256 and 256/256. A 16-bit Sbox is involved in the cipher as the non-linear component. This paper makes improved cryptanalysis on the two NBC versions with block size 128.Using impossible differential cryptanalysis, the corrected results are given which cover 17-round NBC-128/256 and 15-round NBC-128/128. The attack rounds of multi-dimensional zero-correlation linear cryptanalysis are expanded, which covers 19-round NBC-128/256 and 16-round NBC-128/128. The 19-round attack is the longest as far as we know. Also, new 12-round integral distinguishers are proposed, which require less data compared to the existing integral attacks.
Key word:
NBC-128
impossible differential cryptanalysis
zero-correlation linear cryptanalysis
integral cryptanalysis

Research on a method of center of spreading spectrum testing deception jamming

DOI:10.16157/j.issn.0258-7998.201107

Author:An Qiaojing1,Sun Zhicheng1,Ma Lili1,Wang Lei1,Gao Xijun2,Hu Ailan3

Author Affilications:1.Unit 63861,PLA,Baicheng 137000,China;2.Ordnance Engineering College,Shijiazhuang 050003,China; 3.The 6th Research Institute of China Electronics Corporation,Beijing 100083,China

Abstract:According to the problem of performance reduction even losing lock for the MIMO system threatened by deception jamming with pseudo-command, this paper presents a technology can test the deception jamming based on central part of spreading spectrum. And this method realizes the deception interference prevention. Finally it verifies the feasibility by experiment, which is importance to promote the capacity of resisting deception jamming.
Key word:
MIMO
pseudo-command
deception jamming
center of spreading spectrum

Computer Technology and Its Applications

Fault diagnosis for quayside container crane reducer based on EEMD decomposition and PCA-FCM clustering

DOI:10.16157/j.issn.0258-7998.200418

Author:Gu Nenghua1,Hou Yinyin2,Han Xuelong1

Author Affilications:1.College of Electrical and Information Engineering,Quzhou University,Quzhou 324000,China; 2.Zhejiang Quzhou Power Supply Company State Grid,Quzhou 324000,China

Abstract:Aiming at the feature extraction and fault diagnosis issue of quayside container crane(quayside crane) reducer, a combination method of reducer fault diagnosis based on ensemble empirical mode decomposition(EEMD) and principal component analysis(PCA)-fuzzy C-means(FCM) clustering is proposed. Firstly, the nonlinear and non-stationary vibration signals of the reducer are decomposed into several intrinsic mode functions(IMF) by EEMD decomposition, and the multi-dimensional fault characteristics of each IMF component are extracted. Then, the principal component analysis method is used to visually reduce the dimension of the fault feature, the relationship between the characteristic value of the vibration signal of the reducer and the fault mode is analyzed, and the state of the reducer is identified by the fuzzy C-means clustering algorithm. The experimental results show that EEMD-PCA-FCM method has high recognition accuracy for the three states of the reducer, which indicates that the method is an accurate and effective reducer fault diagnosis method.
Key word:
fault diagnosis
quayside container crane reducer
ensemble empirical mode decomposition(EEMD)
fuzzy C-means clustering
principal component analysis(PCA)

Research on a soft PLC system architecture based on industrial cloud

DOI:10.16157/j.issn.0258-7998.200451

Author:Chen Hai1,2

Author Affilications:1.Intelligence Technology of CEC Co.,Ltd.,Beijing 102209,China; 2.National Computer System Engineering Research Institute of China,Beijing 100083,China

Abstract:In the field of industrial automation, factory control is often performed by Pro-grammable Logic Controller(PLC).With the application of automation becoming more and more miniaturized and flexible, it is uneconomical to use, design and maintain a full hardware-based PLC in these fields. The software PLC based on industrial cloud can become a Control-as-a-Service solution. This paper introduces a multi-instance and scalable soft-PLC system architecture based on industrial cloud.Furthermore,the real-time and scalability of the architecture based on industrial cloud are evaluated. Finally, an outlook to the prospect of cloud-based control scene in future industrial applications is given.
Key word:
industrial control
cloud
soft PLC

Design and implementation of face attribute recognition system

DOI:10.16157/j.issn.0258-7998.200354

Author:Wang Gaosheng

Author Affilications:National Computer System Engineering Research Institute of China,Beijing 100083,China

Abstract:At present, accurate face recognition has been widely used in real scenes, such as monitoring, access control, etc., and recognition only for face attributes is also widely used in entertainment, security and social media. Therefore, the paper is based on deep convolutional neural network MTCNN for face detection and Resnet50 network for face attribute recognition. At the same time, it uses Python language to design and develop a system that implements face attribute recognition application interface. Through data experiments, the system uses a face attribute recognition model based on deep convolutional neural networks to achieve 97.32%, 71.64% and 92.13% accuracy in identifying gender, age and ethnic attributes, respectively. At the same time, the face attribute recognition application system can run stably and has certain application value.
Key word:
deep learning
convolutional neural network
face detection
face attributes recognition
application system development

An optimization method of observation matrix based on QR decomposition

DOI:10.16157/j.issn.0258-7998.200413

Author:Zhou Qibin1,Wu Jing1,2,Yu Bo1

Author Affilications:1.School of Information Engineering,Southwest University of Science and Technology,Mianyang 621000,China; 2.Sichuan Key Laboratory of Special Environmental Robotics,Southwest University of Science and Technology,Mianyang 621000,China

Abstract:In compressed sensing theory, the most critical issue is the construction of the observation matrix. The factors that affect the image reconstruction quality include the independence between the observation matrix column vectors and the cross-correlation between the observation matrix and the sparse basis. Based on this, an optimization algorithm is proposed. The algorithm uses QR decomposition to increase the independence of the observation matrix columns, and at the same time optimizes the Gram matrix contracted using an equiangular tight frame(ETF). By updating the direction of each gradient descent, the convergence rate is accelerated to reduce The cross-correlation between the small observation matrix and the sparse basis. Simulation experiment results show that the method of optimizing the observation matrix in this paper has certain advantages in improving the quality and stability of image reconstruction under the same signal sparsity or observation times.
Key word:
compressed sensing
observation matrix
QR decomposition
Gram matrix
cross-correlation

A smoothing algorithm based on machine vision contour extraction

DOI:10.16157/j.issn.0258-7998.200689

Author:Li Jianxin1,Chen Hong2,Wang Jinqi1

Author Affilications:1.School of Instrument and Electronics,North University of China,Taiyuan 030051,China; 2.Shanghai Radio Equipment Research Institute,Shanghai 201109,China

Abstract:In the process of extracting the outline date of eyeglass lens by machine vision, ambient light interference causes errors and affects the smoothness and accuracy of the outline. To solve the error, a new fitting algorithm is proposed. Firstly, it removes the contour part disturbed by ambient light. Then, it performs shape-preserving interpolation based on cubic B-spline curve for the removed part. The experimental results show that after processing by the fitting algorithm, the least squares circle fitting mean square deviation of the standard circle contour data extracted by the machine vision-based contour extraction system is reduced by 80% to 90%, and the roundness error is reduced by 70% to 80%, indicating that the fitting algorithm significantly improves the smoothness and accuracy of the contour data extracted by the system.
Key word:
smooth processing
curve fitting
B-spline curve
shape preserving interpolation
feature extraction

Circuits and Systems

Low input voltage small form factor solar power charging module

DOI:10.16157/j.issn.0258-7998.200898

Author:Yang Yang1,2,Liu Qing2,Wang Zicai1,Zhang Hua2

Author Affilications:1.Harbin Institute of Technology,Harbin 150001,China; 2.Shenzhen Academy of Aerospace Technology,Shenzhen 518057,China

Abstract:This paper analyzes the characteristics of solar array illumination in mobile and portable solar power generation applications and its impact on output power. It is pointed out that in such applications, the number of solar cells in series should be reduced as much as possible, and the number of parallel connections should be increased to reduce partial shading or non-unified illumination. In response to this demand, the LT8490 controller is used to design a Buck-Boost solar charging module with Maximum Power Point Tracking(MPPT) function. A method to extend the lower limit of the input voltage is proposed to make it better to solve the problem of lower array output voltage caused by reducing the number of solar cells in series. Experimental tests show that the method is feasible and effective. The proposed solar power charging module can meet the requirements of fewer solar cells in series and lower output voltage in mobile and portable applications.
Key word:
portable solar power charging
maximum power point tracking
Buck-Boost topology

High-speed implementation of ANT series block cipher algorithm on FPGA

DOI:10.16157/j.issn.0258-7998.200931

Author:Wang Jianxin,Liu Ruian,Xiao Chaoen,Zhang Lei

Author Affilications:Department of Electronic,Beijing Electronics Science and Technology Institute,Beijing 100070,China

Abstract:ANT series block cipher algorithm is suitable for lightweight implementation and convenient for side channel protection. For ANT-128/128 algorithm, Verilog HDL is used to implement the key expansion module and encryption module in Quartus II 15.0, and a 46-level pipeline structure is adopted for high-speed optimization. Further, the pipeline structure was used for high-speed optimization. The comprehensive results in chip 5CGXFC7D6F31C7ES of Cyclone V show that the implementation results are consistent with the standard vector value. The logic utilization ratio of the two modules only accounts for 3% and 7% of the total resources respectively. The working frequency of the encryption and decryption module based on pipeline structure can reach up to 339 MHz and the data throughput rate can reach up to 43 Gbps.
Key word:
ANT
block cipher
Verilog HDL
pipeline structure

Research on 1 GS/s,16-bit data acquisition system based on JESD204B

DOI:10.16157/j.issn.0258-7998.200867

Author:Li Haitao1,2,Li Binkang1,2,Tian Geng1,2,Ruan Linbo1,2,Zhang Yanxia1,2

Author Affilications:1.Northwest Institute of Nuclear Technology,Xi′an 710024,China; 2.State Key Lab of Intense Pulsed Radiation Simulation and Effect,Xi′an 710024,China

Abstract:The paper adopts the architecture of "ADC+FPGA", designs and develops a 1 GS/s, 16-bit high-speed and high-precision data acquisition system(DAS), which realized the purpose of using a single channel to measure large dynamic range(DR>1 000) signals. The study uses two sysref modes, which are periodic sysref mode and pulse sysref mode, to establishe a stable JESD204B link with a deterministic delay. The differences in the sampled data spectrum between the two modes is presented, and the considerations of hardware design and firmware design are given. The paper recommends that the periodic sysref mode be used to establish JESD204B link. By analyzing the time-domain waveform and frequency spectrum of the sampled data, the conclusion that the ADC chip contains 4 on-chip ADC channels is verified.
Key word:
data acquisition system
JESD204B
deterministic delay
period sysref
pulse sysref

Radar and Navigation

Research on jamming technology of frequency-stepping millimeter-wave guided seeker

DOI:10.16157/j.issn.0258-7998.201002

Author:Xiang Zhengshan

Author Affilications:Guilin Changhai Development Co.,Ltd.,Guilin 541001,China

Abstract:Aiming at the problem of how to implement effective countermeasures against frequency-stepping millimeter-wave precision guided weapons, this paper analyzes the working principle of two-dimensional imaging of frequency-stepping millimeter-wave guided seekers, constructs the two-dimensional imaging scene of frequency-stepping millimeter-wave guided seekers, and carries out systematic and comprehensive simulation on imaging processing of frequency-stepping millimeter-wave guided seekers and various jamming techniques. The simulation results show that no matter whether the jamming source is located in the range of antenna beam coverage of the seeker or not, both incoherent and coherent jamming can jam frequency-stepping millimeter-wave guided seekers. The energy of incoherent jamming is more dispersed, and the energy of coherent jamming is more concentrated. Therefore, a compound jamming strategy of inverse gain and active jamming is proposed in this paper, which can realize jamming of frequency-stepping millimeter-wave guided seeker and simultaneously realize self -protection of the jamming source.
Key word:
frequency-stepping
millimeter-wave guided seeker
noise modulation
coherent jamming

High Speed Wired Communication Chip

High Performance Computering

Information Flow and Energy Flow in Industrial Digital Transformation

Special Antenna and Radio Frequency Front End

Radar Target Tracking Technology

Key Technologies of 5G-A and 6G

Key Technologies of 5G and Its Evolution

Key Technologies of 5G and Its Evolution

Processing and Application of Marine Target Characteristic Data

Smart Power

Antenna Technology and Its Applications

5G-Advanced and 6G

Smart Agriculture

5G Vertical Industry Application

Microelectronics in Medical and Healthcare

Key Technologies for 6G

Application of Edge Computing in IIoT

Deep Learning and Image Recognization

6G Microwave Millimeter-wave Technology

Radar Processing Technology and Evaluation

Space-Ground Integrated Technology

Industrial Ethernet Network

5G Vertical Industry Application

Innovation and Application of PKS System

FPGA and Artificial Intelligence

5G Network Construction and Optimization

RF and Microwave

Edge Computing

Network and Business Requirements for 6G

5G and Intelligent Transportation

5G R16 Core Network Evolution Technology

Satellite Nevigation Technology

5G R16 Evolution Technology

5G Wireless Network Evolution Technology

5G Network Planning Technology

5G Indoor Coverage Technology

5G MEC and Its Applications

5G Co-construction and Sharing Technology

Expert Forum

5G and Emergency Communication

5G Slicing Technology and Its Applications

Industrial Internet

5G Terminal Key Realization Technology

5G and Artificial Intelligence

5G and Internet of Vehicles

Terahertz Technology and Its Application

Signal and Information Processing

Artificial Intelligence

5G Communication

Internet of Things and the Industrial Big Data

Electronic Techniques of UAV System

Power Electronic Technology

Medical Electronics

Aerospace Electronic Technology

Robot and Industrial Automation

ADAS Technique and Its Implementation

Heterogeneous Computing

2016 IEEE International Conference on Integrated Circuits and Microsystems

ARINC859 Bus Technology

FC Network Technology

Measurement and Control Technology of Bus Network

GJB288A Bus

Key Techniques of 5G and Algorthm Implement

IEEE-1394 Bus

Signal Conditioning Technology of Sensors

AFDX Network Technology

Discrete Signal Processing

Energy-Efficient Computing

Motor control

2012 Altera Electronic Design Article Contest