2021 No. 12

Publish Date:2021-12-06
ISSN:0258-7998
CN:11-2305/TN
Prev

Special Column-Key Technologies for 6G

Integrated sensing and communications for cloud radio access network: applications and challenges

DOI:10.16157/j.issn.0258-7998.212356

Author:Zou Jiaqi1,2,3,Liu Yuyang1,2,3,Zou Zixuan1,2,3,Cui Yuanhao1,2,3,Sun Songlin1,2,3

Author Affilications:1.School of Information and Communication Engineering,Beijing University of Posts and Telecommunications, Beijing 100876,China; 2.National Engineering Laboratory for Mobile Network Security,Beijing 100876,China; 3.Key Laboratory of Trustworthy Distributed Computing and Service,Beijing 100876,China

Abstract:As one of the key technologies in 6G, the integrated sensing and communication combined with cloud radio access network is a hot topic. This paper briefly introduces this two technologies. Then, the integrated sensing and communication technology for cloud wireless access network is discussed and analyzed in three aspects: network architecture, signal design and network protocol design. Finally, the challenges in future are summarized.
Key word:
integrated and sensing communication
cloud radio access network
network architecture

Review of research on 6G Terahertz propagation model

DOI:10.16157/j.issn.0258-7998.212297

Author:Zhang Junmin

Author Affilications:China Telecom Corporation Limited Zhejiang Branch,Hangzhou 310040,China

Abstract:6G would expand to higher frequency bands and make efficient use of low, medium and high full spectrum resources. The low-frequency spectrum will still be a key strategic resource for the development of 6G. Compared with present, Millimeter wave will play a more important role in the 6G era. Terahertz and other higher frequency bands will focus on meeting the short-range and high-capacity needs of specific scenes. At present, the propagation model for Terahertz is in the blank stage. Starting from the vision of 6G service and combined with the characteristics of Terahertz frequency band, this paper will discuss and review the research of communication propagation model in Terahertz frequency band.
Key word:
6G
Terahertz
coverage
propagation model

Research on the trend and application of 6G technology

DOI:10.16157/j.issn.0258-7998.212322

Author:Jin Xinxin1,2

Author Affilications:1.Shenzhen CESI Information Technology Co.,Ltd.,Shenzhen 518057,China; 2.China Electronics Standardization Institute,Beijing 100176,China

Abstract:6G will bring new technical perspectives, disruptive technological innovation, full-time and panoramic technology application,and also, extensive and in-depth technology integration. Based on the trends of 6G in network connection, network performance, technology integration, data value transformation and application empowerment, super transportation, immersive experience and interaction(XR/holographic technology),twin medical treatment, twin factory and other future applications are introduced from the aspects of evolution rhythm, architecture and application value in this paper.And also, 6G performance requirements in different scenarios are put forward to provide reference for the industry.
Key word:
6G
technology trends
application scenario

Prospect of 6G indoor coverage and considerations on application of key technologies

DOI:10.16157/j.issn.0258-7998.212352

Author:Liu Haitao1,Liu Yang1,Feng Xiaoli2,Zong Jiaying1

Author Affilications:1.China Telecom Research Institute,Beijing 102209,China;2.China Telecom Co.,Ltd.,Beijing 100031,China

Abstract:As the commercialization of 5G continues to accelerate, the network construction for indoor coverage has gradually become a hot topic. At the same time, the development of 6G network, cloud native, artificial intelligence and other emerging technologies also affect the pattern of future indoor networks. Exploring a more open and intelligent wireless access network for 6G network through the need for indoor scenarios is helpful to promote the deep integration of cloud and networks at the edge. This paper firstly introduces the current situation of 5G indoor coverage, including main solutions, and analyzes its possible evolution direction in the short term according to the requirements of 6G network. Then, the relevant 6G key technologies are sorted out for indoor coverage, and the vision of the network and possible technological evolution direction for future indoor scenarios are forecasted.
Key word:
6G
indoor coverage
pico site
radio access network

Research on 6G microservice-based wireless network architecture

DOI:10.16157/j.issn.0258-7998.212317

Author:Zong Jiaying,Liu Yang,Liu Haitao,Yang Fengyi

Author Affilications:5G R&D Center, China Telecom Research Institute,Beijing 102209,China

Abstract:With the development of cloud native, artificial intelligence, big data and other information technologies and the advancement of the trend of cloud-network integration, 6G-oriented wireless networks are moving towards software, intelligence, openness and servitization, achieving in-depth integration of communication and computing, perception and control. Servitization is an important feature of wireless networks to realize the deep fusion of the cloud and networks in services and to empower the endogenous intelligent characteristics of the wireless network. Based on the analysis of the driving force of microservice-based wireless access network, this paper proposes the logical architecture of 6G microservice-oriented wireless access network by drawing support from the existing concepts of 5G core network. And then the paper analyzes the possible future technological evolution directions.
Key word:
6G
service based architecture(SBA)
radio access network(RAN)
service based interface(SBI)

Special Column-FPGA and Artificial Intelligence

A realization of frame detector in real-time spectrum analyzer based on FPGA

DOI:10.16157/j.issn.0258-7998.212124

Author:Guo Jing,He Peng

Author Affilications:The 41st Institute of CETC,Qingdao 266555,China

Abstract:For coping with transmission and display problem caused by the huge amount of seamless spectrum data in real-time spectrum analyzer, this article designed a FIFO-based frame detector of real-time spectrum analyzer in FPGA. It combines multiple frames of spectrum data into one frame for transmission and refresh while retaining signal characteristics. By simulation and actual testing,results show that the detector has four types of detection: peak value, negative value, mean value and real-time sample value. It also can cut off the spectrum data outside the analysis bandwidth while detecting. Compared with the traditional RAM-based frame detector, the detector does not need to control RAM read and write addresses, is easy to implement, occupies less logic resources, and has been applied in real-time spectrum analyzers.
Key word:
real-time spectrum analyzer
detector
frame detect
FPGA

Design and analysis of cardiac scans use dose of modulation control system based on FPGA

DOI:10.16157/j.issn.0258-7998.212022

Author:Zhu Jiong,Li Kang,Xu Yifei

Author Affilications:Minfound Medical Co.,Ltd.,Shaoxing 312000,China

Abstract:When applying a cardiac scan, the image reconstruction only needs the expose data that sampled in the cardiac diastolic phase, and other periods sampled data are discarded. Therefore, the forward-looking scan pattern can be used in order to reduce the radiation dose. Due to the different cross sections of the scanning plane, the dose of modulation(DOM) can be used to reduce the radiation dose further. According to the attenuation difference of the cross section of the scanned object at different angles, the DOM adjusts the mA value based on the angles in real time, so the DOM can improve the xray efficiency and reduce the radiation dose. By combining the characteristics of the two, a forward-looking automatic tube current modulation control system for cardiac scanning is designed, which realizes the effect of reducing cardiac scanning radiation and getting good image quality.
Key word:
FPGA
cardiac scan
DOM

Design of digital channelized broadband receiver for high speed frequency hopping signal

DOI:10.16157/j.issn.0258-7998.212183

Author:Wang Jie

Author Affilications:Southwest China Institute of Electronic Tecnology,Chengdu 610036,China

Abstract:As a new type of communication system,FH communication has strong characteristics of anti-interception,anti-search,ant-interference and anti-antagonism. FH communication system is adopted in the tactical information distribution system,ground and shipborne and airborne FH radio stations and identification friend or Foe systems of the United states and NATO countries,which has high confidentiality and anti-interference performance.In view of the characteristics of high speed FH signal with wide frequency band,many frequency points and fast frequency hopping speed,this paper proposes to use two pieces of ADRV9009 RF agility chip to transform the high speed FH signal into zero IF signal,and then send it to PFGA through polyphase filtering digital channelization to complete the signal receiving and processing.The design not only simplifies the whole signal front-end wideband reception process,reduces the volume of the front-end analog channel receiving equipment,and reduces the power consumption of the system,but also greatly increases the flexibility of the syetem,and improves the detection and identification probability of high-speed frequency hopping signal in the end.
Key word:
high speed FH signal
wideband digital receiver
ADRV9009l
poly-phase filtering process

Design and implementation of SoPC secure startup model

DOI:10.16157/j.issn.0258-7998.212073

Author:Su Zhenyu,Xu Zheng,Liu Yanming

Author Affilications:Security Technology Department,Inspur Electronic Information Industry Company Limited,Jinan 250101,China

Abstract:Concerning the security threats such as firmware tampering and malicious code implanting in the startup process of system on a programmable chip(SoPC), a secure startup model is proposed. The model takes boot ROM as the trust root, and the public key algorithm and symmetric cipher algorithm are used to sign the firmware in each phase of the startup process. The digital signature value of each firmware image is verified in turn after SoPC is powered on, so as to establish a complete trust chain. In the implementation stage, the model is designed and verified by using Intel field programmable gate array(FPGA) development platform, and two secure boot modes are realized. The results show that the model can be applied to chip development to meet the requirement of secure startup.
Key word:
system on a programmable chip
secure startup
field programmable gate array
digital signature
firmware

Special Column-Innovation and Application of PKS System

Research on network technology exploration and solutions for independent cloud data centers of large domestic enterprises

DOI:10.16157/j.issn.0258-7998.212280

Author:Zhang Huahong

Author Affilications:Maipu Communication Technology Co.,Ltd.,Chengdu 610094,China

Abstract:Based on the development of China′s Internet and the policy orientation of the country′s new infrastructure, data centers are booming, and data center networks are also transitioning from 10G and 40G networks to 25G and 100G networks. Even some leading companies are already experimenting with 100G and 400G networks. At the same time, with the escalating trade friction between China and the United States, the phenomenon of neck stuck is becoming more and more serious. Whether it is possible to build a cloud data center network based on fully autonomous chips and technology is an important issue. Cloud data center networks usually include SDN controllers, switches, security devices, network offloading devices, virtual switches vSwitch, smart network cards and other related components. The hardware and software of these components need to be domestically independent to get rid of the dependence on foreign technology. This article focuses on the technical characteristics of the autonomous data center, the feasibility of the autonomous layout of related components, and the choice of autonomous methods and solutions.
Key word:
cloud data center network
independent innovation
independent plan selection

The solution of network security host machine based on PKS system

DOI:10.16157/j.issn.0258-7998.212248

Author:Lu Zubao,Tian Zhongmi,Zhang Yakun,Yu Shiyong

Author Affilications:Beijing Gemotech Intelligent Technology Co.,Ltd.,Beijing 102206,China

Abstract:In order to solve the problem that traditional network security hosts commonly use foreign CPUs and OS as solutions, which have important hidden dangers such as backdoor, loopholes and interrupted supply, a solution of network security hosts based on PKS system is presented, and the network security hosts of different architectures are compared and tested. The result shows that the PKS system network security host can meet the function and performance requirements of network security products, and realize trusted computing of network security host.
Key word:
PKS system
network security
network security host machine

Research on the exploration and solution of terminal management technology for large domestic enterprises

DOI:10.16157/j.issn.0258-7998.212279

Author:Lu Liangwei,Yue Zhijun,Yuan Yi

Author Affilications:Maipu Communication Technology Co.,Ltd.,Chengdu 610094,China

Abstract:With the rapid development of the network and the transformation of network digitization, the number of terminals in the access network is explosively growing, how to carry out intelligent, safe management terminal is particularly important. Combined with the current situation of enterprise terminal management,from the perspective of security risks and terminal access risk control, the paper designs a method of intelligent identification of terminal types through automatic learning terminal characteristics, and realizes terminal intelligent identification and secure access network terminal management system through perfect terminal access function, so as to ensure enterprise network security.
Key word:
automatic learning
intelligent recognition
scheme design
network security

Review and Comment

Development trend of integrated circuit cutting-edge technology and its enlightenment to Beijing

DOI:10.16157/j.issn.0258-7998.211777

Author:Zhu Jing1,2

Author Affilications:1.Beijing International Engineering Consulting Company,Beijing 100055,China; 2.Beijing Semiconductor Industry Association,Beijing 100191,China

Abstract:Integrated circuit is a basic, leading and strategic industry related to national economic and social development. At present, integrated circuits are fully entering the post-Moore era, and innovations in cutting-edge technology are active. It is a critical period for the historical intersection of industrial revolution and technological revolution. The new path of breakthrough innovation with cutting-edge technology is expected to give China to the world through "changing lanes and overtaking" a major opportunity for an integrated circuit innovation power. This article combs through the cutting-edge technology routes released by internationally renowned R&D and market institutions, as well as the strategic layout and major scientific research plans of advanced countries and regions in integrated circuit technology, to study and judge the development trend of integrated circuit cutting-edge technology in the post-Moore era.Combined with the current Beijing integrated circuit research resources and innovation leading advantages, relevant suggestions are put forward.
Key word:
integrated circuit
innovation
cutting-edge technology
disruptive technology
enlightenment

Artificial Intelligence

Research on application of improved DSSD algorithm in road damage detection

DOI:10.16157/j.issn.0258-7998.211684

Author:Su Ke1,Guo Xuejun2,Yang Ying3,Chen Zehua2

Author Affilications:1.College of Electrical and Power Engineering,Taiyuan University of Technology,Taiyuan 030024,China; 2.College of Data Science,Taiyuan University of Technology,Jinzhong 030600,China; 3.Shanxi Transportation Technology Research and Development Co.,Ltd.,Taiyuan 030006,China

Abstract:In the automatic detection, the road damage data set has the problems of difficult detection of small target damage and imbalance of categories, resulting in low accuracy and high false rate of road damage detection. For this reason, based on the DSSD(deconvolutional single shot detector) network model, a road damage detection algorithm combining attention mechanism and Focal loss is proposed. First of all, ResNet-101 with higher recognition accuracy is used as the basic network of the DSSD model. Secondly, an attention mechanism is added to the ResNet-101 backbone network, and the channel domain attention and spatial domain attention are combined to achieve the weighting of features in the channel dimension and the focus on the spatial dimension, and improve the detection effect of small target road damage. Finally, in order to reduce the weight of simple samples and increase the weight of difficult-to-classify samples, Focal loss is used to improve the overall detection effect. It is verified on the data set provided by the Global Road Damage Detection Challenge competition. The experimental results show that the average accuracy of the model is 83.95%, which is more accurate than the road damage detection method based on SSD and YOLO network.
Key word:
road damage detection
DSSD target detection algorithm
small target detection
attention mechanism
category imbalance problem

Relevance analysis technology of software industry policy based on nature language understanding

DOI:10.16157/j.issn.0258-7998.212224

Author:Sun Lu1,Xue Qiang2,Zhang Jinyan3,Liu Wei1,Sui Guobin3,Cao Yang2,Li Xiang2

Author Affilications:1.National Industrial Information Security Development Research Center,Beijing 100040,China; 2.CETC Big Data Research Institute Co.,Ltd.,Guiyang 550022,China; 3.Global Tone Communication Technology Co.,Ltd.,Beijing 100040,China

Abstract:The analysis of public policy is vitally significant in administrative study. With the wide application of deep learning and knowledge graph, any effort to improve technique method in this area is likely to be of great benefit. Therefore, applying nature language understanding and other technology in industrial policy research is conducive, and will be critical to policy formulation and management. This article proposes a set of technical analysis method for software industry policy, aiming at constructing the relational relationship network among policies to assist government decision-making.
Key word:
policy correlation analysis
knowledge graph
nature language understanding

Measurement Control Technology and Instruments

The measurement system of dimension and shape of non-contact object based on STM32

DOI:10.16157/j.issn.0258-7998.211745

Author:Xu Xianwei,Guo Lvbao,Liu Ziguo,Xia Kun

Author Affilications:School of Mechanical Engineering,University of Shanghai for Science and Technology,Shanghai 200093,China

Abstract:At present, workpiece size detection mainly depends on mechanical measurement or manual measurement, which is difficult to detect and low efficiency. Aiming at that situation, this paper designs a set of non-contact object dimension and shape measurement system. The system uses STM32 as the core processor. OpenMV and laser ranging sensor are used as the non-contact detection unit to realize the function of measuring the color, shape, size and distance of the target object. At the same time, the direction of the laser tube in the system is controlled by the steering gear, so as to achieve the purpose of fast tracking the target object center. The experimental results show that the device can accurately measure the color and shape of the target object, obtain the size and distance of the object with high precision, and quickly track the center position of the target object.
Key word:
non-contact measurement
STM32
steering gear head
OpenMV

Research on fairing air-conditioning control system based on new PID algorithm

DOI:10.16157/j.issn.0258-7998.201156

Author:Liu Xuefei1,Su Shishi2,Kuai Liang1,Wang Shuai1,Min Xiaoshuang1

Author Affilications:1.The 6th Research Institute of China Electronics Corporation,Beijing 102209,China; 2.CS&S. Information System Engineering Co.,Ltd.,Beijing 102209,China

Abstract:In view of the complex working conditions of the fairing air conditioning unit, the nonlinearity, hysteresis, time variability, and strong coupling of temperature and humidity control, the structure of the fairing air conditioning control system and the air treatment process when the unit is working are described. In the control algorithm, by analyzing the interference factors of temperature and humidity control, the traditional PID, expert PID and fuzzy adaptive PID control principles are studied, and a new PID algorithm is proposed. The new PID algorithm is applied to the domestically-made PLC-based fairing air-conditioning unit. The operation results show that the unit can achieve real-time online control with high efficiency, high precision, and adjustable parameters to meet the requirements of mission support.
Key word:
fairing
air conditioning unit
PID
PLC

Research on key technologies of situation awareness and intelligent early warning of electricity theft on customer side

DOI:10.16157/j.issn.0258-7998.211614

Author:Chen Wenying1,Long Yue1,Fu Hong2,Yang Fuli2,Zhou Chuan2

Author Affilications:1.State Grid Chongqing Electric Power Company,Chongqing 400010,China; 2.State Grid Chongqing Electric Power Company Marketing Service Center,Chongqing 400010,China

Abstract:The customer side electricity stealing behavior not only causes the massive loss of power resources, but also causes the overload of line load, leading to fire and other major safety accidents. Aiming at the diversity and concealment characteristics of the current electricity stealing behavior in the side toilets, the key technologies of situation awareness and intelligent early warning of electricity stealing on the customer side are studied for the purpose of restraining the electricity stealing behavior on the customer side. Considering the diversity and concealment of customer side power stealing behavior, six customer side power stealing situation awareness indicators are selected, including rated voltage deviation, voltage imbalance rate and current imbalance rate,etc. The RBF neural network is used to build the customer side power stealing situation awareness model. The selected six indicators and related data are used as the model inputs, and the dynamic K-means clustering algorithm is used to optimize the model. The output of the model is the customer side power stealing situation awareness result. Based on the sensing results, intelligent early warning is realized by sound light alarm device and intelligent device. The experimental results show that the technology can effectively suppress the customer side electricity stealing behavior.
Key word:
customer side
electricity theft
situation awareness
intelligent early warning
perception index

Communication and Network

Versatile video coding rate control algorithm based on content feature value

DOI:10.16157/j.issn.0258-7998.211453

Author:Yu Donghang,Li Qiang,Nie Jun

Author Affilications:School of Communication and Information Engineering,Chongqing University of Posts and Telecommunications, Chongqing 400065,China

Abstract:Aiming at the problem that the VVC rate control algorithm does not comprehensively consider the actual texture characteristics of the coded frame, and its rate-distortion performance and visual experience need to be improved, a rate control algorithm based on video content-related feature values is proposed. By introducing the gray level co-occurrence matrix, the relevant feature values reflecting the texture complexity of the encoded frame are calculated, which are used to adjust the image weight of the frame layer; based on the R-λ model, the λ parameter of the LCU layer is recalculated to improve the bit allocation of the LCU layer Accuracy. After testing, compared with the adaptive bit allocation algorithm in the low-delay configuration, the algorithm in this paper is closer to the target bit rate, the rate-distortion performance is improved by 0.86%, and the subjective quality of video coding is significantly improved.
Key word:
versatile video coding
rate control
gray-level co-occurrence matrix
R-λ model
bit allocation

Morphological filtering and time-spectrogram cancellation based parameters estimation algorithm of multi FH signals

DOI:10.16157/j.issn.0258-7998.211459

Author:Liu Jiamin1,Zhao Zhijin1,2,Ye Xueyi1,Wang Lijun2

Author Affilications:1.School of Communication Engineering,Hangzhou Dianzi University,Hangzhou 310018,China; 2.State Key Lab of Information Control Technology in Communication System, The 36th Research Institute of China Electronics Technology Group Corporation,Jiaxing 314001,China

Abstract:Aiming at estimating the parameters of multi-frequency hopping signals in complex electromagnetic environment, a blind estimation algorithm of signals parameters based on multi-scale morphological filtering and time-spectrogram cancellation is proposed. Firstly, considering the characteristic differences of frequency hopping signals, interference signals and noise, multi-scale morphological filtering is used to eliminate the noise, frequency sweep signals and burst signals, the time-spectrogram cancellation is used to remove the fixed-frequency signals. Then the position information of the frequency hopping signals is obtained through the eight-connected domain mark, and then the all-speed frequency hopping signals are separated by the improved K-means clustering algorithm. Finally, the period, hopping time and frequency of multiple frequency hopping signals are estimated according to the parameters of each class cluster. The simulation results show that compared with the estimation algorithm that uses morphological filtering and extracts the time-frequency ridge, the proposed algorithm has higher estimation accuracy under low signal-to-noise ratio, and even though the frequency collision between frequency hopping signals and the fixed frequency signals occurs, the frequency hopping parameters can still be estimated accurately.
Key word:
frequency hopping signal
parameter estimation
morphological filtering
time-spectrogram cancellation
clustering

Computer Technology and Its Applications

Research on data privacy protection method of NILM

DOI:10.16157/j.issn.0258-7998.201112

Author:Chen Ziqiu1,Feng Ruijue1,Zheng Yangfu1,Liu Jiaxin1,Zeng Xianyu1,Wang Zhidong2

Author Affilications:1.College of Electrical Engineering,Guangzhou College of South China University of Technology,Guangzhou 510800,China; 2.Research Center for Smart Energy Technology,School of Electric Power Engineering,South China University of Technology, Guangzhou 510640,China

Abstract:Non-invasive load monitoring technology is helpful to fine management of electricity consumption, but the fine-grained power consumption data also leads to the exposure of users′ private information to attackers. This paper firstly analyzes the security risks faced by non-intrusive load monitoring data, and proposes a mixed encryption and decryption information security scheme based on AES+RSA from the perspective of cryptography. In this scheme, symmetric algorithm AES is used to encrypt data, and asymmetric algorithm RSA encrypts AES keys to realize efficient key management. Using Visio Studio 2017+Qt software development and test interface, the algorithm was written to STM32 microcontroller through the data bus for scheme performance test, the best operation mode was optimized, and the effectiveness of the mixed encryption and decryption scheme was verified. It is concluded that the time of the scheme depends on the efficiency of RSA encryption and decryption or signature verification.
Key word:
NILM
AES
RSA
privacy protection

IoT card secure transfer method research based on blockchain

DOI:10.16157/j.issn.0258-7998.211395

Author:Han Yulong1,Xiao Qing2,Liu Yaoyong1,Sun Dongyu1,Wang Zhenghong1

Author Affilications:1.IC Innovation Center,China Mobile IoT Company Limited,Beijing 100037,China; 2.Xinsheng Technology Company Limited,Nanjing 210018,China

Abstract:Aiming at the problems of IoT card, such as serious illegal circulation, difficult supervise and traceability, an IoT card secure transfer method and system are designed. The system includes a blockchain subsystem, an information subsystem, some blockchain devices and a WeChat applet, and its secure transfer procedure includes initial entry of card information, transfer out application, transfer in application and traceability queries. Blockchain smart contract is used to implement circulating traceability rules, blockchain is used to implement distributed storage of message digest and possession change information, database is used to implement centralized storage of correspondence between IoT card ICCID number range and message digest, and SE-SIM is used to implement device key storage and digital signature. Through actual pilot application and analysis,the system can ensure the safety and credibility of traceability data, consider the batch concurrency performance, and improve the efficiency of supervision.
Key word:
blockchain
IoT card
secure transfer
message digest
SE-SIM

Dimming model of high-power LED based on self-organizing fuzzy neural network

DOI:10.16157/j.issn.0258-7998.201125

Author:Li Jibin,Rao Huanle,Wang Chen,Qian Yifan,Hong Zheyang

Author Affilications:School of Automation,Hangzhou Dianzi University,Hangzhou 310018,China

Abstract:The luminosity output of high-power LED system is not only related to the current, but also hard to be predicted due to the uncertain nonlinear characters of thermal process. In view of the difficulties in extracting the parameters of the mechanism model and poor adaptability, an online modeling method was proposed to construct a fuzzy neural network with ambient temperature, heat sink temperature and operating current as input,and luminous flux as output. The model structure is self-organized and adjusted according to clustering analysis and error evaluation criteria. EKF algorithm and recursive least square method are used to learn network parameters. Through recursive learning, the rule is improved incrementally so that the model can approximate the actual system process as fast as possible. Validity of the algorithm is verified in a typical nonlinear system. Results show that the relative error between the theoretical values of the photometric prediction model and the reference model is less than 3%. Comparing with other model, this model has more compact structure and better generalization performance.
Key word:
high-power LED
PET model
self-organizing fuzzy neural network
structure identification
parameter learning

The optimization of the kind and parameters of kernel function in KPLS for quality prediction

DOI:10.16157/j.issn.0258-7998.201259

Author:Chen Lu,Zheng Dan,Tong Chudong

Author Affilications:Faculty of Electrical Engineering and Computer Science,Ningbo University,Ningbo 315211,China

Abstract:Kernel partial least squares(KPLS) has been widely used in industrial process monitoring and quality prediction. The choice of kernel function and kernel parameters has an important impact on the KPLS quality prediction results. However, how to choose the kernel function type and kernel parameters has always been the bottleneck of the application of this method. To solve the above problems, a kernel function optimization method based on improved genetic algorithm is proposed. In this method, the kernel type and kernel parameters are used as the optimal decision variables, and the root mean square error is targeted. It is designed in terms of coding scheme, genetic strategy, fitness function optimization, crossover and mutation algorithms to ensure the variety of kernel functions, and uses the 2-fold cross-validation method to verify the training results. The Tennessee-Eastman Process(TE) is combined with MATLAB for simulation experiments. The simulation results show that the method can find the optimal kernel function and its kernel parameters, and has good stability and consistency.
Key word:
kernel partial least squares
genetic algorithm
quality prediction
k-fold cross-validation

Research on application of trusted technology in localized embedded platform

DOI:10.16157/j.issn.0258-7998.211350

Author:Meng Xiangbin,Liu Xiaokai,Hao Kelin

Author Affilications:National Computer System Engineering Research Institute of China,Beijing 100083,China

Abstract:The security threats of localized embedded platforms are still severe. In order to improve the security and controllability of localized platforms, the application of trusted technology is critical. This article uses a trusted platform control module(TPCM) on a localized embedded platform based on the Godson 2K-1000CPU, using trusted boot, trusted software base, trusted file storage and I/O ports. Technology such as trusted access realizes the trusted operation of the localized embedded platform. The TPCM trusted module is implemented based on the CCP903T cryptographic chip. This platform has been tested and put into use in a security project, leaving a reference for the application of trusted technology in the localization platform and the formation of standardization.
Key word:
trusted boot
trusted platform control module(TPCM)
localization platform
I/O port trusted access

Circuits and Systems

Design of ultrawideband and micropackaging frequency synthesizer

DOI:10.16157/j.issn.0258-7998.211452

Author:Wang Wenkai

Author Affilications:Southwest Institute of Electronic Technology,Chengdu 610036,China

Abstract:In the modern electronic reconnaissance system, especially the portable and individual communication reconnaissance system, on the premise of ensuring the function and technical indexes stay the same, the volume and weight of the overall system are put forward higher requirements, the internal devices are required to have smaller volume and lighter weight. Therefore, realizing the miniaturized and lightweight ultra wide band frequency synthesizer has become the key point to realize portable reconnaissance equipment. Based on the single phase-locked loop(PLL) technique, this paper adopts a new circuit and process realization method to get the high performance ultra wide band frequency synthesizer, which provides a high performance, miniaturized and lightweight frequency synthesizer for engineering application.
Key word:
ultra wide band
miniaturized
smaller package
lightweight
phase-locked loop frequency synthesizer

Design of power switch of electric vehicle based on MOSFET

DOI:10.16157/j.issn.0258-7998.211547

Author:Yin Baitong,Gong Yuanming

Author Affilications:College of Mechanical and Automotive Engineering,Shanghai University of Engineering Science,Shanghai 201620,China

Abstract:Aiming at the mechanical abrasion and arc burning of traditional relays, in order to meet the switch control requirements of the power battery of electric vehicles, a high-power power switch based on MOSFET was designed. The switch can effectively improve the on-off speed of the switch and reduce mechanical damage. This article analyzes the working principle of the power switch in detail, and then elaborates the structure design of the power switch and the design advantages of each module. It focuses on how to select a suitable MOSFET driver. Finally, through the current withstand capability test, it is verified that the power switch can operate normally at 375 A high current.
Key word:
power switch
relay
MOSFET driver
MOSFET

Design of high temperature and high voltage LDO using 0.35 ?滋m CMOS process

DOI:10.16157/j.issn.0258-7998.201109

Author:Wu Xia,Bao Yanfeng,Deng Wanling,Huang Junkai

Author Affilications:College of Information Science and Technology,Jinan University,Guangzhou 510632,China

Abstract:In this paper, based on X-FAB xa 0.35 μm CMOS process, a cascode current mirror and high voltage MOS transistors are used to design a high temperature and high voltage reference circuit with high power supply rejection ratio without additional bias circuit module, and thus, a stable 0.9 V reference voltage can be obtained when the input voltage is in the range of 5.5 V~30 V and the operating temperature is in the range of -55 ℃~175 ℃. Then, according to the principle of dynamic zero compensation, a new dynamic zero compensation circuit is designed to make the system to maintain stability in the full load voltage range. At the same time, with the design of other circuit modules such as over-temperature protection, over-voltage protection, over-current protection and logic control circuit modules, a low-dropout linear regulator(LDO) chip with high temperature and high voltage is finally designed, the area of which is 2.822 3 mm2.
Key word:
LDO
CMOS
high temperature and voltage
0.35 μm process

Radar and Navigation

The simulator of RF sum-difference signal based on AD9361 for pulse radar

DOI:10.16157/j.issn.0258-7998.211631

Author:Li Weizong1,Ma Xiaodong2,Ren Jie1,Liu Jianming1

Author Affilications:1.Taiyuan Satellite Launch Center,Taiyuan 030012,China; 2.National Computer System Engineering Research Institute of China,Beijing 100083,China

Abstract:Pulse radar is the backbone measurement and control equipment in our country. Because of its narrow beam, it is always difficult to capture and track in the measurement and control task. For many years, measurement and control technicians have been studying and exploring the simulation actual combat training in different ways. The traditional RF simulator is realized by the up-conversion mode, which has huge equipment and high price. This paper introduces the basic composition of measurement and control equipment and the formation process of sum and difference signal in pulse radar. Based on the practical radar system, the software module is used to realize the control hardware of the upper computer system and the information transmission with the radar equipment. C-band radar analog signal is generated by AD9361 RF chip. Through the test and verification on the radar equipment, the software radio technology is successfully realized to generate the C-band RF signal, which solves the problem of insufficient actual combat training means for equipment personnel, further improve equipment personnel tracking capture and emergency disposal ability, is an important means to test the technical and tactical performance of the equipment.
Key word:
pulse radar
sum-difference signal
simulator
AD9361

Key Technologies of 5G and Its Evolution

Key Technologies of 5G and Its Evolution

High Performance Computing

Processing and Application of Marine Target Characteristic Data

Smart Power

Antenna Technology and Its Applications

Smart Agriculture

5G-Advanced and 6G

5G Vertical Industry Application

Microelectronics in Medical and Healthcare

Key Technologies for 6G

Application of Edge Computing in IIoT

Deep Learning and Image Recognization

6G Microwave Millimeter-wave Technology

Radar Processing Technology and Evaluation

Space-Ground Integrated Technology

Industrial Ethernet Network

5G Vertical Industry Application

High Performance Computing

Innovation and Application of PKS System

FPGA and Artificial Intelligence

5G Network Construction and Optimization

RF and Microwave

Edge Computing

Network and Business Requirements for 6G

5G and Intelligent Transportation

5G R16 Core Network Evolution Technology

Satellite Nevigation Technology

5G R16 Evolution Technology

5G Wireless Network Evolution Technology

5G Network Planning Technology

5G Indoor Coverage Technology

5G MEC and Its Applications

5G Co-construction and Sharing Technology

Expert Forum

5G and Emergency Communication

5G Slicing Technology and Its Applications

Industrial Internet

5G Terminal Key Realization Technology

5G and Artificial Intelligence

5G and Internet of Vehicles

Terahertz Technology and Its Application

Signal and Information Processing

Artificial Intelligence

5G Communication

Internet of Things and the Industrial Big Data

Electronic Techniques of UAV System

Power Electronic Technology

Medical Electronics

Aerospace Electronic Technology

Robot and Industrial Automation

ADAS Technique and Its Implementation

Heterogeneous Computing

2016 IEEE International Conference on Integrated Circuits and Microsystems

ARINC859 Bus Technology

FC Network Technology

Measurement and Control Technology of Bus Network

GJB288A Bus

Key Techniques of 5G and Algorthm Implement

IEEE-1394 Bus

Signal Conditioning Technology of Sensors

AFDX Network Technology

Discrete Signal Processing

Energy-Efficient Computing

Motor control

2012 Altera Electronic Design Article Contest