The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can le...The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can lead to wrong location reports and time indication.In order to deal with this threat,we proposed a scheme of anti-spoofing for BDⅡ-CNAV based on integrated information authentication.This scheme generates two type authentication information,one is authentication code information(ACI),which is applied to confirm the authenticity and reliability of satellite time information,and the other is signature information,which is used to authenticate the integrity of satellite location information and other information.Both authentication information is designed to embed into the reserved bits in BDⅡ-CNAV without changing the frame structure.In order to avoid authentication failure caused by public key error or key error,the key or public key prompt information(KPKPI)are designed to remind the receiver to update both keys in time.Experimental results indicate that the scheme can successfully detect spoofing attacks,and the authentication delay is less than 1%of the transmission delay,which meets the requirements of BDⅡ-CNAV information authentication.展开更多
Half axle gears is produced by precision forging popularly because of the advantages in minimum machining allowances, lower material consumption and good service properties. But the forming quality of precision forgin...Half axle gears is produced by precision forging popularly because of the advantages in minimum machining allowances, lower material consumption and good service properties. But the forming quality of precision forging is difficult to control. Many simulations and analysis of precision forging process were taken by previous researchers. But no concrete method is proposed to evaluate and optimize the forming quality of half axel gears. The primary purpose of this work is improving the forming quality of half axel gears by analyzing and optimizing the affected factors of forming quality. The enclosed-die warm forging process of half axle gears was developed, and a new type of die-set used on double action hydraulic press was brought forward. The main influential factors of precision forming quality were analyzed after the forming process had been simulated by using finite element method(FEM). These factors include die structure, web thickness and web position. A method used to evaluate the forming quality was established, which investigated the maximal forming load, the metal filling rate and the material damage factor. The FEM simulations of half axle gears precision forging were evaluated by this method. The results show that the best forming quality can be achieved when the punches were added with bosses, the web located at the middle plant of the gear, and the web thickness was 30 percent of the inner hole diameter. Verification experiments taking the above optimized parameters were performed on a 7.8 MN double action hydraulic press. The trial products were formed well. And their geometric precision meets the demand. The verification result shows that the optimization of the influential factors, according to the simulations and the evaluation method, can improve the forming quality. The new structure of precision forging die-set and the new evaluation method guarantee a high forming quality ofhalfaxel gears.展开更多
Although many methods have been applied to diagnose the gear thult currently, the sensitivity of them is not very good. In order to make the diagnosis methods have more excellent integrated ability in such aspects as ...Although many methods have been applied to diagnose the gear thult currently, the sensitivity of them is not very good. In order to make the diagnosis methods have more excellent integrated ability in such aspects as precision, sensitivity, reliability and compact algorithm, and so on, and enlightened by the energy operator separation algorithm (EOSA), a new demodulation method which is optimizing energy operator separation algorithm (OEOSA) is presented. In the algorithm, the non-linear differential operator is utilized to its differential equation: Choosing the unit impulse response length of filter and fixing the weighting coefficient for inportant points. The method has been applied in diagnosing tooth broden and fatiguing crack of gear faults successfully. It provides demodulation analysis of machine signal with a new approach.展开更多
To solve the problem of poor detection and limited application range of current intrusion detection methods,this paper attempts to use deep learning neural network technology to study a new type of intrusion detection...To solve the problem of poor detection and limited application range of current intrusion detection methods,this paper attempts to use deep learning neural network technology to study a new type of intrusion detection method.Hence,we proposed an intrusion detection algorithm based on convolutional neural network(CNN)and AdaBoost algorithm.This algorithm uses CNN to extract the characteristics of network traffic data,which is particularly suitable for the analysis of continuous and classified attack data.The AdaBoost algorithm is used to classify network attack data that improved the detection effect of unbalanced data classification.We adopt the UNSW-NB15 dataset to test of this algorithm in the PyCharm environment.The results show that the detection rate of algorithm is99.27%and the false positive rate is lower than 0.98%.Comparative analysis shows that this algorithm has advantages over existing methods in terms of detection rate and false positive rate for small proportion of attack data.展开更多
As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The ...As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The eddy dissipation rate(EDR)has been established as the standard metric for quantifying turbulence in civil aviation.This study aims to explore a universally applicable symbolic classification approach based on genetic programming to detect turbulence anomalies using quick access recorder(QAR)data.The detection of atmospheric turbulence is approached as an anomaly detection problem.Comparative evaluations demonstrate that this approach performs on par with direct EDR calculation methods in identifying turbulence events.Moreover,comparisons with alternative machine learning techniques indicate that the proposed technique is the optimal methodology currently available.In summary,the use of symbolic classification via genetic programming enables accurate turbulence detection from QAR data,comparable to that with established EDR approaches and surpassing that achieved with machine learning algorithms.This finding highlights the potential of integrating symbolic classifiers into turbulence monitoring systems to enhance civil aviation safety amidst rising environmental and operational hazards.展开更多
The frequency-modulated continuous wave (FMCW) radar, known for its high range resolution, has garnered significant attention in the field of non-contact vital sign monitoring. However, accurately locating multiple ta...The frequency-modulated continuous wave (FMCW) radar, known for its high range resolution, has garnered significant attention in the field of non-contact vital sign monitoring. However, accurately locating multiple targets and separating their vital sign signals remains a challenging research topic. This paper proposes a scene-differentiated method for multi-target localization and vital sign monitoring. The approach identifies the relative positions of multiple targets using Range FFT and determines the directions of targets via the multiple signal classification (MUSIC) algorithm. Phase signals within the range bins corresponding to the targets are separated using bandpass filtering. If multiple targets reside in the same range bin, the variational mode decomposition (VMD) algorithm is employed to decompose their breathing or heartbeat signals. Experimental results demonstrate that the proposed method accurately localizes targets. When multiple targets occupy the same range bin, the mean absolute error (MAE) for respiratory signals is 3 bpm, and the MAE for heartbeat signals is 5 bpm.展开更多
A high-PSRR high-order curvature-compensated CMOS bandgap voltage reference( BGR),which has the performances of high power supply rejection ratio( PSRR) and low temperature coefficient,is designed in SMIC 0. 18 μm CM...A high-PSRR high-order curvature-compensated CMOS bandgap voltage reference( BGR),which has the performances of high power supply rejection ratio( PSRR) and low temperature coefficient,is designed in SMIC 0. 18 μm CMOS process. Compared to the conventional curvature-compensated BGR which adopted a piecewise-linear current,the temperature characterize of the proposed BGR is effectively improved by adopting two kinds of current including a piecewise-linear current and a current proportional 1. 5 party to the absolute temperature T. By adopting a low dropout( LDO) regulator whose output voltage is the operating supply voltage of the proposed BGR core circuit instead of power supply voltage VDD,the proposed BGR with LDO regulator achieves a well PSRR performance than the BGR without LDO regulator. Simulation results show that the proposed BGR with LDO regulator achieves a temperature coefficient of 2. 1 × 10-6/ ℃ with a 1. 8 V power supply voltage and a line regulation of 4. 9 μV / V at 27 ℃. The proposed BGR with LDO regulator at 10 Hz,100 Hz,1 k Hz,10 k Hz and 100 k Hz have the PSRR of- 106. 388,- 106. 388,- 106. 38,- 105. 93 and-88. 67 d B respectively.展开更多
In this paper, we propose a new method that combines chaotic series phase space reconstruction and local polynomial estimation to solve the problem of suppressing strong chaotic noise. First, chaotic noise time series...In this paper, we propose a new method that combines chaotic series phase space reconstruction and local polynomial estimation to solve the problem of suppressing strong chaotic noise. First, chaotic noise time series are reconstructed to obtain multivariate time series according to Takens delay embedding theorem. Then the chaotic noise is estimated accurately using local polynomial estimation method. After chaotic noise is separated from observation signal, we can get the estimation of the useful signal. This local polynomial estimation method can combine the advantages of local and global law. Finally, it makes the estimation more exactly and we can calculate the formula of mean square error theoretically. The simulation results show that the method is effective for the suppression of strong chaotic noise when the signal to interference ratio is low.展开更多
Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a s...Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM) series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDⅡ-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism) to protect the integrity of the BDⅡ-CNAV,adopts the SM2 algorithm(Public key cryptosystem) to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm) to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDⅡ-CNAV.展开更多
Aiming at the prediction of the size of human cerebral hemorrhage point, a signal processing method based on Resonance Sparse Decomposition (RSSD) algorithm is proposed to decompose and analyze the microwave echo sign...Aiming at the prediction of the size of human cerebral hemorrhage point, a signal processing method based on Resonance Sparse Decomposition (RSSD) algorithm is proposed to decompose and analyze the microwave echo signal. According to the organizational structure of the human brain, a complete human brain model was established, and bleeding points of different sizes were placed at the same position, and 5 antennas were placed around the model (front, back, left, right, and top). RSSD is performed on the obtained echo signal, and Hilbert envelope analysis is performed on the low resonance component obtained by the decomposition, and then the size of the bleeding point is judged. Using CST and MATLAB to conduct simulation analysis and experiments, it is verified that the proposed method can successfully determine the size of the bleeding point, and the effectiveness and feasibility of the method are proved.展开更多
Diode clamped multi-level inverter (DCMLI) has a wide application prospect in high-voltage and adjustable speed drive systems due to its low stress on switching devices, low harmonic output, and simple structure. Ho...Diode clamped multi-level inverter (DCMLI) has a wide application prospect in high-voltage and adjustable speed drive systems due to its low stress on switching devices, low harmonic output, and simple structure. However, the problem of complexity of selecting vectors and capacitor voltage unbalance needs to be solved when the algorithm of direct torque control (DTC) is implemented on DCMLI. In this paper, a fuzzy DTC system of an induction machine fed by a three-level neutral-point-clamped (NPC) inverter is proposed. After introducing fuzzy logic, optimal selecting switching state is realized by applying various strategies which can distinguish the grade of the errors of stator flux linkage, torque, the neutral-point potential, and the position of stator flux linkage. Consequently, the neutral-point potential unbalance, the dr/dr of output voltage and the switching loss are restrained effectively, and desirable dynamic and steady-state performances of induction machines can be obtained for the DTC scheme. A design method of the fuzzy controller is introduced in detail, and the relevant simulation and experimental results have verified the feasibility of the proposed control algorithm.展开更多
Hole repair processing is an important part of point cloud data processing in airborne 3-dimensional(3D)laser scanning technology.Due to the fragmentation and irregularity of the surface morphology,when applying the 3...Hole repair processing is an important part of point cloud data processing in airborne 3-dimensional(3D)laser scanning technology.Due to the fragmentation and irregularity of the surface morphology,when applying the 3D laser scanning technology to mountain mapping,the conventional mathematical cloud-based point cloud hole repair method is not ideal in practical applications.In order to solve this problem,we propose to repair the valley and ridge line first,and then repair the point cloud hole.The main technical steps of the method include the following points:First,the valley and ridge feature lines are extracted by the GIS slope analysis method;Then,the valley and ridge line missing from the hole are repaired by the mathematical interpolation method,and the repaired results are edited and inserted to the original point cloud;Finally,the traditional repair method is used to repair the point cloud hole whose valley line and ridge line have been repaired.Three experiments were designed and implemented in the east bank of the Xiaobaini River to test the performance of the proposed method.The results showed that compared with the direct point cloud hole repair method in Geomagic Studio software,the average repair accuracy of the proposed method,in the 16 m buffer zone of valley line and ridge line,is increased from 56.31 cm to 31.49 cm.The repair performance is significantly improved.展开更多
Novel high power supply rejection ratio (PSRR) high-order temperature-compensated subthreshold metal-oxidesemiconductor (MOS) bandgap reference (BGR) is proposed in Semiconductor Manufacturing International Corp...Novel high power supply rejection ratio (PSRR) high-order temperature-compensated subthreshold metal-oxidesemiconductor (MOS) bandgap reference (BGR) is proposed in Semiconductor Manufacturing International Corporation (SMIC) 0.13 gm complementary MOS (CMOS) process. By adopting subthreshold MOS field-effect transistors (MOSFETs) and the piecewise-curvature temperature-compensated technique, the output reference voltage's temperature performance of the subthreshold MOS BGR is effectively improved. The subthreshold MOS BGR achieves high PSRR performance by adopting the technique of pre-regulator. Simulation results show that the temperature coefficient (TC) of the subthreshold MOS BGR is 1.38× 10^-6/℃ when temperature is changed from -40 ℃ to 125 ℃ with a power supply voltage of 1.2 V. The subthreshold MOS BGR achieves the PSRR of - 104.54 dB, - 104.54 dB,- 104.5 dB, - 101.82 dB and - 79.92 dB at 10 Hz, 100 Hz, 1 kHz, 10 kHz and 100 kHz respectively.展开更多
This article provides a graphical parameter tuning method of PI^λ controllers for fractional-order time-delay systems. First, the complete stabilizing region of PI^λ controller in proportional-integral plane, for a ...This article provides a graphical parameter tuning method of PI^λ controllers for fractional-order time-delay systems. First, the complete stabilizing region of PI^λ controller in proportional-integral plane, for a fixed A, is determined in terms of a graphical stability criterion applicable to fractional-delay systems. Then, the stabilizing region is maximized analytically with respect to parameter ), to expect the most various behaviors of the closed-loop systems. Finally, by defining appropriate functions relative to the requirements of gain and phase margins, the curves in the maximized stabilizing region satisfying the pre-specified gain and phase margins are drawn, which releases a flexible parameter tuning procedure. Numerical examples are given to illustrate the design steps.展开更多
This paper proposes a novel high-power supply rejection ratio(high-PSRR) high-order curvature-compensated CMOS bandgap voltage reference(BGR) in SMIC 0.18 μm CMOS process. Three kinds of current are added to a co...This paper proposes a novel high-power supply rejection ratio(high-PSRR) high-order curvature-compensated CMOS bandgap voltage reference(BGR) in SMIC 0.18 μm CMOS process. Three kinds of current are added to a conventional BGR in order to improve the temperature drift within wider temperature range, which include a piecewise-curvaturecorrected current in high temperature range, a piecewise-curvature-corrected current in low temperature range and a proportional-to-absolute-temperature T^(1.5) current. The high-PSRR characteristic of the proposed BGR is achieved by adopting the technique of pre-regulator. Simulation results shows that the temperature coefficient of the proposed BGR with pre-regulator is 8.42x10^(-6)′ /℃ from - 55 ℃ to 125 ℃ with a 1.8 V power supply voltage. The proposed BGR with pre-regulator achieves PSRR of - 123.51 dB, - 123.52 dB, - 88.5 dB and - 50.23 dB at 1 Hz, 100 Hz, 100 kHz and 1 MHz respectively.展开更多
As a special type of distributed denial of service(DDoS) attacks, the low-rate DDoS(LDDoS) attacks have characteristics of low average rate and strong concealment, thus, it is hard to detect such attacks by traditiona...As a special type of distributed denial of service(DDoS) attacks, the low-rate DDoS(LDDoS) attacks have characteristics of low average rate and strong concealment, thus, it is hard to detect such attacks by traditional approaches. Through signal analysis, a new identification approach based on wavelet decomposition and sliding detecting window is proposed. Wavelet decomposition extracted from the traffic are used for multifractal analysis of traffic over different time scale. The sliding window from flow control technology is designed to identify the normal and abnormal traffic in real-time. Experiment results show that the proposed approach has advantages on detection accuracy and timeliness.展开更多
3D caricatures are important attractive elements of the interface in virtual environment such as online game. However, very limited 3D caricatures exist in the real world. Meanwhile, creating 3D caricatures manually i...3D caricatures are important attractive elements of the interface in virtual environment such as online game. However, very limited 3D caricatures exist in the real world. Meanwhile, creating 3D caricatures manually is rather costly, and even professional skills are needed. This paper proposes a novel and effective manifold transfer algorithm to reconstruct 3D caricatures according to their original 2D caricatures. We first manually create a small dataset with only 100 3D caricature models and use them to initialize the whole 3D dataset. After that, manifold transfer algorithm is carried out to refine the dataset. The algorithm comprises of two steps. The first is to perform manifold alignment between 2D and 3D caricatures to get a "standard" manifold map; the second is to reconstruct all the 3D caricatures based on the manifold map. The proposed approach utilizes and transfers knowledge of 2D caricatures to the target 3D caricatures well. Comparative experiments show that the approach reconstructs 3D caricatures more effectively and the results conform more to the styles of the original 2D caricatures than the Principal Components Analysis (PCA) based method.展开更多
Access control scheme is proposed for System Wide Information Management (SWIM) to address the problem of attribute revocation in practical applications. Based on the attribute based encryption (ABE), this scheme ...Access control scheme is proposed for System Wide Information Management (SWIM) to address the problem of attribute revocation in practical applications. Based on the attribute based encryption (ABE), this scheme introduces the proxy re-encryption mechanism and key encrypting key (KEK) tree to realize fine-grained access control with attribute revocation. This paper defines the attributes according to the status quo of civil aviation. Compared with some other schemes proposed before, this scheme not only shortens the length of ciphertext (CT) and private key but also improves the efficiency of encryption and decryption. The scheme can resist collusion attacks and ensure the security of data in SWIM.展开更多
基金supported in part by the National Key R&D Program of China(No.2022YFB3904503)National Natural Science Foundation of China(No.62172418)。
文摘The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can lead to wrong location reports and time indication.In order to deal with this threat,we proposed a scheme of anti-spoofing for BDⅡ-CNAV based on integrated information authentication.This scheme generates two type authentication information,one is authentication code information(ACI),which is applied to confirm the authenticity and reliability of satellite time information,and the other is signature information,which is used to authenticate the integrity of satellite location information and other information.Both authentication information is designed to embed into the reserved bits in BDⅡ-CNAV without changing the frame structure.In order to avoid authentication failure caused by public key error or key error,the key or public key prompt information(KPKPI)are designed to remind the receiver to update both keys in time.Experimental results indicate that the scheme can successfully detect spoofing attacks,and the authentication delay is less than 1%of the transmission delay,which meets the requirements of BDⅡ-CNAV information authentication.
基金supported by Chongqing Municipal Science and Technology Committee of China (Grant No. 2005AA3012-4)
文摘Half axle gears is produced by precision forging popularly because of the advantages in minimum machining allowances, lower material consumption and good service properties. But the forming quality of precision forging is difficult to control. Many simulations and analysis of precision forging process were taken by previous researchers. But no concrete method is proposed to evaluate and optimize the forming quality of half axel gears. The primary purpose of this work is improving the forming quality of half axel gears by analyzing and optimizing the affected factors of forming quality. The enclosed-die warm forging process of half axle gears was developed, and a new type of die-set used on double action hydraulic press was brought forward. The main influential factors of precision forming quality were analyzed after the forming process had been simulated by using finite element method(FEM). These factors include die structure, web thickness and web position. A method used to evaluate the forming quality was established, which investigated the maximal forming load, the metal filling rate and the material damage factor. The FEM simulations of half axle gears precision forging were evaluated by this method. The results show that the best forming quality can be achieved when the punches were added with bosses, the web located at the middle plant of the gear, and the web thickness was 30 percent of the inner hole diameter. Verification experiments taking the above optimized parameters were performed on a 7.8 MN double action hydraulic press. The trial products were formed well. And their geometric precision meets the demand. The verification result shows that the optimization of the influential factors, according to the simulations and the evaluation method, can improve the forming quality. The new structure of precision forging die-set and the new evaluation method guarantee a high forming quality ofhalfaxel gears.
基金This project is supported by National Ministry of Education of China (No.020616)Science and Technology Project of Municipal Educational Committee of Chongqing(No.030602)Scientific Research Foundation of Chongqing Institute of Technology(No.2004ZD10).
文摘Although many methods have been applied to diagnose the gear thult currently, the sensitivity of them is not very good. In order to make the diagnosis methods have more excellent integrated ability in such aspects as precision, sensitivity, reliability and compact algorithm, and so on, and enlightened by the energy operator separation algorithm (EOSA), a new demodulation method which is optimizing energy operator separation algorithm (OEOSA) is presented. In the algorithm, the non-linear differential operator is utilized to its differential equation: Choosing the unit impulse response length of filter and fixing the weighting coefficient for inportant points. The method has been applied in diagnosing tooth broden and fatiguing crack of gear faults successfully. It provides demodulation analysis of machine signal with a new approach.
基金supported in part by the National Key R&D Program of China(No.2022YFB3904503)National Natural Science Foundation of China(No.62172418)。
文摘To solve the problem of poor detection and limited application range of current intrusion detection methods,this paper attempts to use deep learning neural network technology to study a new type of intrusion detection method.Hence,we proposed an intrusion detection algorithm based on convolutional neural network(CNN)and AdaBoost algorithm.This algorithm uses CNN to extract the characteristics of network traffic data,which is particularly suitable for the analysis of continuous and classified attack data.The AdaBoost algorithm is used to classify network attack data that improved the detection effect of unbalanced data classification.We adopt the UNSW-NB15 dataset to test of this algorithm in the PyCharm environment.The results show that the detection rate of algorithm is99.27%and the false positive rate is lower than 0.98%.Comparative analysis shows that this algorithm has advantages over existing methods in terms of detection rate and false positive rate for small proportion of attack data.
基金supported by the Meteorological Soft Science Project(Grant No.2023ZZXM29)the Natural Science Fund Project of Tianjin,China(Grant No.21JCYBJC00740)the Key Research and Development-Social Development Program of Jiangsu Province,China(Grant No.BE2021685).
文摘As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The eddy dissipation rate(EDR)has been established as the standard metric for quantifying turbulence in civil aviation.This study aims to explore a universally applicable symbolic classification approach based on genetic programming to detect turbulence anomalies using quick access recorder(QAR)data.The detection of atmospheric turbulence is approached as an anomaly detection problem.Comparative evaluations demonstrate that this approach performs on par with direct EDR calculation methods in identifying turbulence events.Moreover,comparisons with alternative machine learning techniques indicate that the proposed technique is the optimal methodology currently available.In summary,the use of symbolic classification via genetic programming enables accurate turbulence detection from QAR data,comparable to that with established EDR approaches and surpassing that achieved with machine learning algorithms.This finding highlights the potential of integrating symbolic classifiers into turbulence monitoring systems to enhance civil aviation safety amidst rising environmental and operational hazards.
文摘The frequency-modulated continuous wave (FMCW) radar, known for its high range resolution, has garnered significant attention in the field of non-contact vital sign monitoring. However, accurately locating multiple targets and separating their vital sign signals remains a challenging research topic. This paper proposes a scene-differentiated method for multi-target localization and vital sign monitoring. The approach identifies the relative positions of multiple targets using Range FFT and determines the directions of targets via the multiple signal classification (MUSIC) algorithm. Phase signals within the range bins corresponding to the targets are separated using bandpass filtering. If multiple targets reside in the same range bin, the variational mode decomposition (VMD) algorithm is employed to decompose their breathing or heartbeat signals. Experimental results demonstrate that the proposed method accurately localizes targets. When multiple targets occupy the same range bin, the mean absolute error (MAE) for respiratory signals is 3 bpm, and the MAE for heartbeat signals is 5 bpm.
基金Sponsored by the National Natural Science Foundation of China(Grant No.61471075)the 2013 Program for Innovation Team Building at Institutions of Higher Education in Chongqing(The Innovation Team of Smart Medical System and Key Technology)
文摘A high-PSRR high-order curvature-compensated CMOS bandgap voltage reference( BGR),which has the performances of high power supply rejection ratio( PSRR) and low temperature coefficient,is designed in SMIC 0. 18 μm CMOS process. Compared to the conventional curvature-compensated BGR which adopted a piecewise-linear current,the temperature characterize of the proposed BGR is effectively improved by adopting two kinds of current including a piecewise-linear current and a current proportional 1. 5 party to the absolute temperature T. By adopting a low dropout( LDO) regulator whose output voltage is the operating supply voltage of the proposed BGR core circuit instead of power supply voltage VDD,the proposed BGR with LDO regulator achieves a well PSRR performance than the BGR without LDO regulator. Simulation results show that the proposed BGR with LDO regulator achieves a temperature coefficient of 2. 1 × 10-6/ ℃ with a 1. 8 V power supply voltage and a line regulation of 4. 9 μV / V at 27 ℃. The proposed BGR with LDO regulator at 10 Hz,100 Hz,1 k Hz,10 k Hz and 100 k Hz have the PSRR of- 106. 388,- 106. 388,- 106. 38,- 105. 93 and-88. 67 d B respectively.
基金supported by the Natural Science Foundation of Chongqing Science & Technology Commission,China (Grant No.CSTC2010BB2310)the Chongqing Municipal Education Commission Foundation,China (Grant Nos.KJ080614,KJ100810,and KJ100818)
文摘In this paper, we propose a new method that combines chaotic series phase space reconstruction and local polynomial estimation to solve the problem of suppressing strong chaotic noise. First, chaotic noise time series are reconstructed to obtain multivariate time series according to Takens delay embedding theorem. Then the chaotic noise is estimated accurately using local polynomial estimation method. After chaotic noise is separated from observation signal, we can get the estimation of the useful signal. This local polynomial estimation method can combine the advantages of local and global law. Finally, it makes the estimation more exactly and we can calculate the formula of mean square error theoretically. The simulation results show that the method is effective for the suppression of strong chaotic noise when the signal to interference ratio is low.
基金supported by National Natural Science Foundation of China(No.U1533107)Key Program of Tianjin Natural Science Foundation(No.17JCZDJC30900)+1 种基金the Fundamental Research Funds for the Central Universities of CAUC(No.3122016D003)the Graduate Program of Curriculum Development Project of Civil Aviation University of China(No.2050070515)
基金supported in part by the National Key R&D Program of China(No.2022YFB3904503)National Natural Science Foundation of China(No.62172418)the joint funds of National Natural Science Foundation of China and Civil Aviation Administration of China(No.U2133203).
文摘Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM) series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDⅡ-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism) to protect the integrity of the BDⅡ-CNAV,adopts the SM2 algorithm(Public key cryptosystem) to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm) to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDⅡ-CNAV.
文摘Aiming at the prediction of the size of human cerebral hemorrhage point, a signal processing method based on Resonance Sparse Decomposition (RSSD) algorithm is proposed to decompose and analyze the microwave echo signal. According to the organizational structure of the human brain, a complete human brain model was established, and bleeding points of different sizes were placed at the same position, and 5 antennas were placed around the model (front, back, left, right, and top). RSSD is performed on the obtained echo signal, and Hilbert envelope analysis is performed on the low resonance component obtained by the decomposition, and then the size of the bleeding point is judged. Using CST and MATLAB to conduct simulation analysis and experiments, it is verified that the proposed method can successfully determine the size of the bleeding point, and the effectiveness and feasibility of the method are proved.
文摘Diode clamped multi-level inverter (DCMLI) has a wide application prospect in high-voltage and adjustable speed drive systems due to its low stress on switching devices, low harmonic output, and simple structure. However, the problem of complexity of selecting vectors and capacitor voltage unbalance needs to be solved when the algorithm of direct torque control (DTC) is implemented on DCMLI. In this paper, a fuzzy DTC system of an induction machine fed by a three-level neutral-point-clamped (NPC) inverter is proposed. After introducing fuzzy logic, optimal selecting switching state is realized by applying various strategies which can distinguish the grade of the errors of stator flux linkage, torque, the neutral-point potential, and the position of stator flux linkage. Consequently, the neutral-point potential unbalance, the dr/dr of output voltage and the switching loss are restrained effectively, and desirable dynamic and steady-state performances of induction machines can be obtained for the DTC scheme. A design method of the fuzzy controller is introduced in detail, and the relevant simulation and experimental results have verified the feasibility of the proposed control algorithm.
基金National Natural Science Foundation of China(Nos.41861054,41371423,61966010)National Key R&D Program of China(No.2016YFB0502105)。
文摘Hole repair processing is an important part of point cloud data processing in airborne 3-dimensional(3D)laser scanning technology.Due to the fragmentation and irregularity of the surface morphology,when applying the 3D laser scanning technology to mountain mapping,the conventional mathematical cloud-based point cloud hole repair method is not ideal in practical applications.In order to solve this problem,we propose to repair the valley and ridge line first,and then repair the point cloud hole.The main technical steps of the method include the following points:First,the valley and ridge feature lines are extracted by the GIS slope analysis method;Then,the valley and ridge line missing from the hole are repaired by the mathematical interpolation method,and the repaired results are edited and inserted to the original point cloud;Finally,the traditional repair method is used to repair the point cloud hole whose valley line and ridge line have been repaired.Three experiments were designed and implemented in the east bank of the Xiaobaini River to test the performance of the proposed method.The results showed that compared with the direct point cloud hole repair method in Geomagic Studio software,the average repair accuracy of the proposed method,in the 16 m buffer zone of valley line and ridge line,is increased from 56.31 cm to 31.49 cm.The repair performance is significantly improved.
基金supported by the Natural Science Foundation Project of CQ CSTC(cstc2016jcyj A0347)the Science and Technology on Analog Integrated Circuit Laboratory(6142802011503)the Key Technology Innovation Project of Key Industries in Chongqing(cstc2016zdcy-ztzx0038,cstc2017zdcy-zdyf0166)
文摘Novel high power supply rejection ratio (PSRR) high-order temperature-compensated subthreshold metal-oxidesemiconductor (MOS) bandgap reference (BGR) is proposed in Semiconductor Manufacturing International Corporation (SMIC) 0.13 gm complementary MOS (CMOS) process. By adopting subthreshold MOS field-effect transistors (MOSFETs) and the piecewise-curvature temperature-compensated technique, the output reference voltage's temperature performance of the subthreshold MOS BGR is effectively improved. The subthreshold MOS BGR achieves high PSRR performance by adopting the technique of pre-regulator. Simulation results show that the temperature coefficient (TC) of the subthreshold MOS BGR is 1.38× 10^-6/℃ when temperature is changed from -40 ℃ to 125 ℃ with a power supply voltage of 1.2 V. The subthreshold MOS BGR achieves the PSRR of - 104.54 dB, - 104.54 dB,- 104.5 dB, - 101.82 dB and - 79.92 dB at 10 Hz, 100 Hz, 1 kHz, 10 kHz and 100 kHz respectively.
基金supported by the National Natural Science Foundation of China (No. 60874028)
文摘This article provides a graphical parameter tuning method of PI^λ controllers for fractional-order time-delay systems. First, the complete stabilizing region of PI^λ controller in proportional-integral plane, for a fixed A, is determined in terms of a graphical stability criterion applicable to fractional-delay systems. Then, the stabilizing region is maximized analytically with respect to parameter ), to expect the most various behaviors of the closed-loop systems. Finally, by defining appropriate functions relative to the requirements of gain and phase margins, the curves in the maximized stabilizing region satisfying the pre-specified gain and phase margins are drawn, which releases a flexible parameter tuning procedure. Numerical examples are given to illustrate the design steps.
基金supported by the National Natural Science Foundation of China (61471075, 61301124)the 2013 Program for Innovation Team Building at Institutions of Higher Education in Chongqing (the Innovation Team of Smart Medical System and Key Technology)
文摘This paper proposes a novel high-power supply rejection ratio(high-PSRR) high-order curvature-compensated CMOS bandgap voltage reference(BGR) in SMIC 0.18 μm CMOS process. Three kinds of current are added to a conventional BGR in order to improve the temperature drift within wider temperature range, which include a piecewise-curvaturecorrected current in high temperature range, a piecewise-curvature-corrected current in low temperature range and a proportional-to-absolute-temperature T^(1.5) current. The high-PSRR characteristic of the proposed BGR is achieved by adopting the technique of pre-regulator. Simulation results shows that the temperature coefficient of the proposed BGR with pre-regulator is 8.42x10^(-6)′ /℃ from - 55 ℃ to 125 ℃ with a 1.8 V power supply voltage. The proposed BGR with pre-regulator achieves PSRR of - 123.51 dB, - 123.52 dB, - 88.5 dB and - 50.23 dB at 1 Hz, 100 Hz, 100 kHz and 1 MHz respectively.
基金supported by the Joint Funds of National Natural Science Foundation of China and Civil Aviation Administration of China (U1933108)the National Science Foundation for Young Scientists of China (61601467)+1 种基金the Key Program of Natural Science Foundation of Tianjin (17JCZDJC30900)the Fundamental Research Funds for the Central Universities of China (3122019051).
文摘As a special type of distributed denial of service(DDoS) attacks, the low-rate DDoS(LDDoS) attacks have characteristics of low average rate and strong concealment, thus, it is hard to detect such attacks by traditional approaches. Through signal analysis, a new identification approach based on wavelet decomposition and sliding detecting window is proposed. Wavelet decomposition extracted from the traffic are used for multifractal analysis of traffic over different time scale. The sliding window from flow control technology is designed to identify the normal and abnormal traffic in real-time. Experiment results show that the proposed approach has advantages on detection accuracy and timeliness.
基金supported by the National Natural Foundation of China under Grant Nos. 61070110 and 61173066
文摘3D caricatures are important attractive elements of the interface in virtual environment such as online game. However, very limited 3D caricatures exist in the real world. Meanwhile, creating 3D caricatures manually is rather costly, and even professional skills are needed. This paper proposes a novel and effective manifold transfer algorithm to reconstruct 3D caricatures according to their original 2D caricatures. We first manually create a small dataset with only 100 3D caricature models and use them to initialize the whole 3D dataset. After that, manifold transfer algorithm is carried out to refine the dataset. The algorithm comprises of two steps. The first is to perform manifold alignment between 2D and 3D caricatures to get a "standard" manifold map; the second is to reconstruct all the 3D caricatures based on the manifold map. The proposed approach utilizes and transfers knowledge of 2D caricatures to the target 3D caricatures well. Comparative experiments show that the approach reconstructs 3D caricatures more effectively and the results conform more to the styles of the original 2D caricatures than the Principal Components Analysis (PCA) based method.
基金supported by the National Natural Science Foundation of China and Civil Aviation Administration of China Joint Fund Project(U1533107)the Major Program of Natural Science Foundation of Tianjin(17JCZDJC30900)
文摘Access control scheme is proposed for System Wide Information Management (SWIM) to address the problem of attribute revocation in practical applications. Based on the attribute based encryption (ABE), this scheme introduces the proxy re-encryption mechanism and key encrypting key (KEK) tree to realize fine-grained access control with attribute revocation. This paper defines the attributes according to the status quo of civil aviation. Compared with some other schemes proposed before, this scheme not only shortens the length of ciphertext (CT) and private key but also improves the efficiency of encryption and decryption. The scheme can resist collusion attacks and ensure the security of data in SWIM.