With the rapid development of Internet of Vehicles, computing-intensive and delay-sensitive applications are widely used. Faced with the shortcomings of less computing resources and limited power supply of vehicle mobile terminals, mobile edge technology came into being. Firstly, a multi-terminal single-edge vehicle network model is established to alleviate the terminal pressure by accessing Multi-Access Edge Computing ( MEC ) servers. Aiming at the heterogeneous computing network, this paper constructs a joint optimization problem of task offloading and resource allocation under the constraints of delay and energy consumption. Aiming at the problem that the resources in the offloading decision process exceed the load, the modified chromosome and the improved elite selection strategy are used to optimize the genetic algorithm. The dynamic parameter adjustment strategy is used to optimize the particle swarm optimization algorithm to prevent premature convergence. A two-stage joint optimization algorithm is proposed to solve the problem. It can be seen from the results that the optimized algorithm can find the appropriate optimal solution and effectively reduce the cost compared with GAVECOS and Partial algorithm.
{"title":"Unloading optimization of networked vehicles based on improved genetic and particle swarm optimization","authors":"Hao Feng, Xiaohui Ren","doi":"10.1117/12.2682359","DOIUrl":"https://doi.org/10.1117/12.2682359","url":null,"abstract":"With the rapid development of Internet of Vehicles, computing-intensive and delay-sensitive applications are widely used. Faced with the shortcomings of less computing resources and limited power supply of vehicle mobile terminals, mobile edge technology came into being. Firstly, a multi-terminal single-edge vehicle network model is established to alleviate the terminal pressure by accessing Multi-Access Edge Computing ( MEC ) servers. Aiming at the heterogeneous computing network, this paper constructs a joint optimization problem of task offloading and resource allocation under the constraints of delay and energy consumption. Aiming at the problem that the resources in the offloading decision process exceed the load, the modified chromosome and the improved elite selection strategy are used to optimize the genetic algorithm. The dynamic parameter adjustment strategy is used to optimize the particle swarm optimization algorithm to prevent premature convergence. A two-stage joint optimization algorithm is proposed to solve the problem. It can be seen from the results that the optimized algorithm can find the appropriate optimal solution and effectively reduce the cost compared with GAVECOS and Partial algorithm.","PeriodicalId":440430,"journal":{"name":"International Conference on Electronic Technology and Information Science","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115083327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a directional polarization modulation method based on a time-modulated vector array is proposed for secure communication. The polarization state of the transmitted signal is used to represent the communication information to realize the directional polarization modulation in the desired direction. The vector antenna is divided into two sub-arrays. Each sub-array is controlled by a different time sequence to turn on the antenna. The correlation between the horizontal and vertical components of the polarization signal is destroyed. The communication direction is not affected, but the desired polarization state cannot be synthesized in the non-communication direction. The simulation results show that the desired polarization state is received in the communication direction, the polarization information of the signal in the non-communication direction is disturbed, and the information leakage from the time-modulated array due to sideband radiation is avoided.
{"title":"Directional polarization modulation method based on time-modulated vector array","authors":"Xuning Lv, Yougen Xu","doi":"10.1117/12.2682396","DOIUrl":"https://doi.org/10.1117/12.2682396","url":null,"abstract":"In this paper, a directional polarization modulation method based on a time-modulated vector array is proposed for secure communication. The polarization state of the transmitted signal is used to represent the communication information to realize the directional polarization modulation in the desired direction. The vector antenna is divided into two sub-arrays. Each sub-array is controlled by a different time sequence to turn on the antenna. The correlation between the horizontal and vertical components of the polarization signal is destroyed. The communication direction is not affected, but the desired polarization state cannot be synthesized in the non-communication direction. The simulation results show that the desired polarization state is received in the communication direction, the polarization information of the signal in the non-communication direction is disturbed, and the information leakage from the time-modulated array due to sideband radiation is avoided.","PeriodicalId":440430,"journal":{"name":"International Conference on Electronic Technology and Information Science","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117036519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Two-wheeled tour balance car is a complex system model which contains a variety of variables with no definite parameters. It is characterized by nonlinearity and strong coupling. The balance car can be used to detect the advantages and disadvantages of control methods. It has broad application prospects. In this paper, an inverted pendulum model is constructed to simulate the balance conditions of the car. Kalman filtering method is used to optimize the inclined angle of the car. The control parameters are adjusted by PID to achieve the balanced operation . A new image acquisition scheme based on TSL1401 linear CCD is adopted. The STM32 processor processes heartbeats to control the speed of the left and right motors for autonomous line patrol. After testing, CCD line performance is better than infrared, with forward-looking, low jitter, relatively fast and other advantages.
{"title":"Line inspection balance car based on linear CCD","authors":"Ying-juan Zhao, Jing-nan Ma, Haimei Du","doi":"10.1117/12.2682514","DOIUrl":"https://doi.org/10.1117/12.2682514","url":null,"abstract":"Two-wheeled tour balance car is a complex system model which contains a variety of variables with no definite parameters. It is characterized by nonlinearity and strong coupling. The balance car can be used to detect the advantages and disadvantages of control methods. It has broad application prospects. In this paper, an inverted pendulum model is constructed to simulate the balance conditions of the car. Kalman filtering method is used to optimize the inclined angle of the car. The control parameters are adjusted by PID to achieve the balanced operation . A new image acquisition scheme based on TSL1401 linear CCD is adopted. The STM32 processor processes heartbeats to control the speed of the left and right motors for autonomous line patrol. After testing, CCD line performance is better than infrared, with forward-looking, low jitter, relatively fast and other advantages.","PeriodicalId":440430,"journal":{"name":"International Conference on Electronic Technology and Information Science","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126792238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper analyzes the order printing process of large Internet trading days, uses multi-agent technology to model the micro printing system, and studies the key technologies such as allocation strategy, status monitoring and fault recovery.[1] At the same time, the design of intelligent micro printing system with high concurrent continuous printing capability ensures the stability of the micro printing system.[2] Then, the independent intelligent control components of a single intelligent micro printer are analyzed, and an intelligent control unit for parallel printing is proposed. The unit effectively improves the ability, reliability and reliability of parallel printing, as well as the flexibility of a single printer. Then, based on the design of a single intelligent microprinter, various services in the system are abstracted into different agents, and an intelligent microprinter cluster system is built using multi-agent technology, so that the intelligent microprinter system has high concurrent continuous printing capability under the distributed control architecture.
{"title":"Design of intelligent micro printer system","authors":"Luyao Li, Zhiyu Huang, Likun Lu, Hengyu Duan","doi":"10.1117/12.2682360","DOIUrl":"https://doi.org/10.1117/12.2682360","url":null,"abstract":"This paper analyzes the order printing process of large Internet trading days, uses multi-agent technology to model the micro printing system, and studies the key technologies such as allocation strategy, status monitoring and fault recovery.[1] At the same time, the design of intelligent micro printing system with high concurrent continuous printing capability ensures the stability of the micro printing system.[2] Then, the independent intelligent control components of a single intelligent micro printer are analyzed, and an intelligent control unit for parallel printing is proposed. The unit effectively improves the ability, reliability and reliability of parallel printing, as well as the flexibility of a single printer. Then, based on the design of a single intelligent microprinter, various services in the system are abstracted into different agents, and an intelligent microprinter cluster system is built using multi-agent technology, so that the intelligent microprinter system has high concurrent continuous printing capability under the distributed control architecture.","PeriodicalId":440430,"journal":{"name":"International Conference on Electronic Technology and Information Science","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126955561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the information society, voice communication is the most common and indispensable in daily life, so the communication security issue is particularly important. Aiming at the security problem of voice communication, a low-cost communication security system based on single chip microcomputer is designed. The system is mainly divided into a confidential sending module and a confidential receiving module, which can realize two functions of ordinary call and confidential call, and realize synchronous confidential communication by using a single chip computer to generate random keys. The test results show that the system can realize the function of communication security, and can realize the module miniaturization, which is convenient to make a high density communication security tool.
{"title":"Research and design of a low-cost communication security system","authors":"H. Wen, Xiaojun Liu, Chao Liu","doi":"10.1117/12.2682411","DOIUrl":"https://doi.org/10.1117/12.2682411","url":null,"abstract":"In the information society, voice communication is the most common and indispensable in daily life, so the communication security issue is particularly important. Aiming at the security problem of voice communication, a low-cost communication security system based on single chip microcomputer is designed. The system is mainly divided into a confidential sending module and a confidential receiving module, which can realize two functions of ordinary call and confidential call, and realize synchronous confidential communication by using a single chip computer to generate random keys. The test results show that the system can realize the function of communication security, and can realize the module miniaturization, which is convenient to make a high density communication security tool.","PeriodicalId":440430,"journal":{"name":"International Conference on Electronic Technology and Information Science","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124517851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As a basic module of integrated circuits, LDO is widely used in digital-to-analog and analog-to-digital conversion circuits. Based on the requirements of these circuits for power management chips, a fast-transient capacitorless low dropout regulator is proposed in this paper. To enhance the transient response, a push-pull buffer is added between the error amplifier and the power transistor. In addition, a transient enhancement circuit is used to effectively suppress the undershoot voltage and overshoot voltage and reduce the recovery time. The capacitorless LDO is verified in TSMC 180nm CMOS process. The simulation results show that when the load current changes from 1mA to 100mA within 1us, the output undershoot voltage is 83mV, and the recovery time is 1.5us; When the load current changes from 100mA to 1mA within 1us, the output overshoot voltage is 80mV and the recovery time is 1.7us. The power supply rejection of the whole system is -60dB at 1kHz and can still reach -17dB at 1MHz.
{"title":"A fast-transient capacitorless low dropout regulator","authors":"J. Qu, C. Wu","doi":"10.1117/12.2682561","DOIUrl":"https://doi.org/10.1117/12.2682561","url":null,"abstract":"As a basic module of integrated circuits, LDO is widely used in digital-to-analog and analog-to-digital conversion circuits. Based on the requirements of these circuits for power management chips, a fast-transient capacitorless low dropout regulator is proposed in this paper. To enhance the transient response, a push-pull buffer is added between the error amplifier and the power transistor. In addition, a transient enhancement circuit is used to effectively suppress the undershoot voltage and overshoot voltage and reduce the recovery time. The capacitorless LDO is verified in TSMC 180nm CMOS process. The simulation results show that when the load current changes from 1mA to 100mA within 1us, the output undershoot voltage is 83mV, and the recovery time is 1.5us; When the load current changes from 100mA to 1mA within 1us, the output overshoot voltage is 80mV and the recovery time is 1.7us. The power supply rejection of the whole system is -60dB at 1kHz and can still reach -17dB at 1MHz.","PeriodicalId":440430,"journal":{"name":"International Conference on Electronic Technology and Information Science","volume":"320 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127566340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Because the memristor is a kind of nonlinear resistance, its resistance coefficient depends on the total charge q flowing through the element, that is, the output voltage of the memristor to the past time integral determines the resistance value of the device, according to this feature of the element can make the resistance value of the memristor realize programmable calculation, and then improve the performance of the circuit parameters. In this paper, we design a programmable memristor circuit by using a bipolar threshold memristor to realize the adjustable resistance value in the circuit, and apply it to the Schmidt trigger circuit. Through the memristor programming circuit to change the threshold setting voltage value of the Schmidt trigger, to achieve the controllable range of the back error, so as to achieve a better waveform integration effect.
{"title":"Programmable Schmitt trigger circuit based on memristor","authors":"Zelong Liu, Tong Li, Huan‐huan Ding, Ziwei Feng","doi":"10.1117/12.2682307","DOIUrl":"https://doi.org/10.1117/12.2682307","url":null,"abstract":"Because the memristor is a kind of nonlinear resistance, its resistance coefficient depends on the total charge q flowing through the element, that is, the output voltage of the memristor to the past time integral determines the resistance value of the device, according to this feature of the element can make the resistance value of the memristor realize programmable calculation, and then improve the performance of the circuit parameters. In this paper, we design a programmable memristor circuit by using a bipolar threshold memristor to realize the adjustable resistance value in the circuit, and apply it to the Schmidt trigger circuit. Through the memristor programming circuit to change the threshold setting voltage value of the Schmidt trigger, to achieve the controllable range of the back error, so as to achieve a better waveform integration effect.","PeriodicalId":440430,"journal":{"name":"International Conference on Electronic Technology and Information Science","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131585509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper focuses on the integrated analysis of the communication control platform and proposes the integration of communication information and its processing through middleware, so that users can find the desired information more accurately and improve the efficiency of maritime communication. The integrated communication and control platform for ship networking makes use of VTS (Vessel Traffic Management System) and AIS (Automatic Identification System) information fusion technology, related network technology, information processing technology, data management technology, etc., to realise the integration of communication automation betweenin the ship and between the ship and the outside world, solving the problems of scattered and confused ship communication information, thus realising efficient data communication and resource sharing, which makes the various systems on the ship highly integrated and integrated, and solves the problem of long communication time and short communication distance.
{"title":"Design of an integrated communication and control platform for the Internet of Vessels","authors":"Ying Huang, Yilin Gan, Xingzhi Lin","doi":"10.1117/12.2682552","DOIUrl":"https://doi.org/10.1117/12.2682552","url":null,"abstract":"The paper focuses on the integrated analysis of the communication control platform and proposes the integration of communication information and its processing through middleware, so that users can find the desired information more accurately and improve the efficiency of maritime communication. The integrated communication and control platform for ship networking makes use of VTS (Vessel Traffic Management System) and AIS (Automatic Identification System) information fusion technology, related network technology, information processing technology, data management technology, etc., to realise the integration of communication automation betweenin the ship and between the ship and the outside world, solving the problems of scattered and confused ship communication information, thus realising efficient data communication and resource sharing, which makes the various systems on the ship highly integrated and integrated, and solves the problem of long communication time and short communication distance.","PeriodicalId":440430,"journal":{"name":"International Conference on Electronic Technology and Information Science","volume":"12715 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131078904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Spectrum is a scarce and non-renewable resource. This paper proposes an improved adaptive spectrum access mechanism for unlicensed millimetre waves, which is based on the problem of low spectrum utilisation due to the high signalling overhead of the receiver-assisted Listen Before Talk (LBT) mechanism. By introducing an adaptive duty cycle to the receiver-assisted LBT frame structure, the system parameters can be adaptively adjusted to ensure that New Radio-based Access to Unlicensed Spectrum (NR-U) and Wireless Gigabit (WiGig) The two systems can coexist in a fair and harmonious manner. In addition, the proposed algorithm further increases the total network throughput of the NR-U system by combining spectrum resource allocation and transmission power, and improves the spectrum efficiency in both licensed and unlicensed bands. Simulation results show that the proposed mechanism is significantly better than the receiver-assisted LBT ones.
频谱是一种稀缺的不可再生资源。针对接收机辅助先听后讲(LBT)机制的高信号开销导致频谱利用率低的问题,提出了一种改进的无许可毫米波自适应频谱接入机制。通过在接收机辅助LBT帧结构中引入自适应占空比,可以自适应调整系统参数,从而保证NR-U (New Radio-based Access to Unlicensed Spectrum)和WiGig (Wireless Gigabit)两种系统能够公平、和谐地共存。此外,该算法将频谱资源分配与发射功率相结合,进一步提高了NR-U系统的总网络吞吐量,提高了授权频段和非授权频段的频谱效率。仿真结果表明,该机制明显优于接收机辅助LBT机制。
{"title":"Research on improved adaptive spectrum access mechanism for millimetre wave","authors":"Qiang Li, Sheng Guo, H. Fang, D. Shen","doi":"10.1117/12.2682531","DOIUrl":"https://doi.org/10.1117/12.2682531","url":null,"abstract":"Spectrum is a scarce and non-renewable resource. This paper proposes an improved adaptive spectrum access mechanism for unlicensed millimetre waves, which is based on the problem of low spectrum utilisation due to the high signalling overhead of the receiver-assisted Listen Before Talk (LBT) mechanism. By introducing an adaptive duty cycle to the receiver-assisted LBT frame structure, the system parameters can be adaptively adjusted to ensure that New Radio-based Access to Unlicensed Spectrum (NR-U) and Wireless Gigabit (WiGig) The two systems can coexist in a fair and harmonious manner. In addition, the proposed algorithm further increases the total network throughput of the NR-U system by combining spectrum resource allocation and transmission power, and improves the spectrum efficiency in both licensed and unlicensed bands. Simulation results show that the proposed mechanism is significantly better than the receiver-assisted LBT ones.","PeriodicalId":440430,"journal":{"name":"International Conference on Electronic Technology and Information Science","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115039808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Due to the continuous and rapid expansion of the scale of the communication network, the deepening of the isomerization of the communication equipment in the network and the impact of network security factors, large-scale communication networks need to have a certain fault-tolerant mechanism to maintain connectivity for a long time. This paper studies faulttolerance from the perspective of structural statistics of communication networks. By studying how to make communication networks remain connected when some nodes fail, we can get the relevant laws, and provide the basis for highly reliable communication network deployment and the robustness of routing protocol design.
{"title":"Research on fault tolerance of communication network based on network structure","authors":"Chao Liang, Pengfei Ma, Shang Wu","doi":"10.1117/12.2682459","DOIUrl":"https://doi.org/10.1117/12.2682459","url":null,"abstract":"Due to the continuous and rapid expansion of the scale of the communication network, the deepening of the isomerization of the communication equipment in the network and the impact of network security factors, large-scale communication networks need to have a certain fault-tolerant mechanism to maintain connectivity for a long time. This paper studies faulttolerance from the perspective of structural statistics of communication networks. By studying how to make communication networks remain connected when some nodes fail, we can get the relevant laws, and provide the basis for highly reliable communication network deployment and the robustness of routing protocol design.","PeriodicalId":440430,"journal":{"name":"International Conference on Electronic Technology and Information Science","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116172295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}