Pub Date : 2025-03-01DOI: 10.23919/cje.2024.00.025
Jiangfei Bai;Shunchuan Yang;Donglin Su
The physical optics (PO) method is widely used to solve the electromagnetic (EM) scattering problems involving electrically large structures, in which each surface element is required to determine whether it is blocked by others. It may suffer from the computational efficiency issue due to elementwise shadowing testing. In this paper, an efficient Z-buffer based shadowing testing method is proposed to accelerate this procedure. In this method, all triangular facets are first mapped to a grid plane using the Z-buffer method, and for each grid cell, all projected triangles that intersect it are recorded. Then, rigorous shadowing testing is made for all facets recorded in the grid where the centroid of each triangle is projected. It can avoid a large number of redundant operations for pairs of triangles with no occlusion relation, which leads to the same accuracy as the traditional rigorous shadowing testing method while significantly inproving efficiency. Four numerical examples are carried out to validate its accuracy and efficiency.
{"title":"An Improved Z-Buffer Accelerated PO Method for EM Scattering from Electrically Large Targets","authors":"Jiangfei Bai;Shunchuan Yang;Donglin Su","doi":"10.23919/cje.2024.00.025","DOIUrl":"https://doi.org/10.23919/cje.2024.00.025","url":null,"abstract":"The physical optics (PO) method is widely used to solve the electromagnetic (EM) scattering problems involving electrically large structures, in which each surface element is required to determine whether it is blocked by others. It may suffer from the computational efficiency issue due to elementwise shadowing testing. In this paper, an efficient Z-buffer based shadowing testing method is proposed to accelerate this procedure. In this method, all triangular facets are first mapped to a grid plane using the Z-buffer method, and for each grid cell, all projected triangles that intersect it are recorded. Then, rigorous shadowing testing is made for all facets recorded in the grid where the centroid of each triangle is projected. It can avoid a large number of redundant operations for pairs of triangles with no occlusion relation, which leads to the same accuracy as the traditional rigorous shadowing testing method while significantly inproving efficiency. Four numerical examples are carried out to validate its accuracy and efficiency.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 2","pages":"475-482"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10982050","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143900640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-01DOI: 10.23919/cje.2023.00.397
Yatao Yang;Yanfeng Qiu;Jingpei Cao;Song Xiao
The current blind signature scheme over SM9 demands substantial resources for practical implementation. To address this issue, a novel identity-based blind signature scheme with message recovery over SM9 is proposed by combining message recovery technology, hiding the message in the signature to reduce the transmission band-width for the signature information. The security of this scheme is analyzed by using the provable security method. And it is proven that this scheme achieves existential unforgeability under chosen-message and identity attack (EUF-CMIA) security, and the blindness can be guaranteed. Through testing and analysis, at the clock frequency of 500 MHz, our scheme requires 6.128 ms for each signature after initialization, which is faster than existing identity-based message recovery blind signature algorithms. The scheme reduces the transmission bandwidth to 75.6% compared to the normal SM9 signature algorithm. Compared with other existing SM9 blind signature schemes, this scheme has lower data transmission volume, reduces bandwidth resource consumption, and offers promising applications in bandwidth-limited environments.
{"title":"Identity-Based Blind Signature Scheme with Message Recovery Over SM9","authors":"Yatao Yang;Yanfeng Qiu;Jingpei Cao;Song Xiao","doi":"10.23919/cje.2023.00.397","DOIUrl":"https://doi.org/10.23919/cje.2023.00.397","url":null,"abstract":"The current blind signature scheme over SM9 demands substantial resources for practical implementation. To address this issue, a novel identity-based blind signature scheme with message recovery over SM9 is proposed by combining message recovery technology, hiding the message in the signature to reduce the transmission band-width for the signature information. The security of this scheme is analyzed by using the provable security method. And it is proven that this scheme achieves existential unforgeability under chosen-message and identity attack (EUF-CMIA) security, and the blindness can be guaranteed. Through testing and analysis, at the clock frequency of 500 MHz, our scheme requires 6.128 ms for each signature after initialization, which is faster than existing identity-based message recovery blind signature algorithms. The scheme reduces the transmission bandwidth to 75.6% compared to the normal SM9 signature algorithm. Compared with other existing SM9 blind signature schemes, this scheme has lower data transmission volume, reduces bandwidth resource consumption, and offers promising applications in bandwidth-limited environments.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 2","pages":"510-519"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10982053","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143900524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-01DOI: 10.23919/cje.2023.00.350
Yang Xiao;Zhongyuan Zhou;Haichun Wang;Shikuan Liu
The research status of the digital control circuit chip level and system level electromagnetic immunity is analyzed in this article firstly. Secondly, a set of device for the digital control circuit based on advanced reduced instruciton set computer (RISC) machine is developed. The impedance of the components on the coupling path of the modules is extracted and the equivalent circuit is established. Based on the integrated circuits immunity model-conducted immunity (ICIM-CI), the behavior level modeling and simulation of the power module and input/output (IO) module are carried out using the IC-EMC software. The direct power injection method based on radio frequency interference (RFI) is used to test the interference immunity of the modules, and the failure mode and sensitivity threshold of the digital control circuit is obtained. The RFI based immunity modeling and simulation models for the power module and IO module are validated through simulation and testing comparison using the “board level-chip level” modeling and simulation method. The immunity of the power module is not only related to the low-dropout regulator power chip, but also to the peripheral circuit of the power module. The simulation research of IO module immunity considers the actual working mode of IO chip pins and calculates the IO pin response under actual working conditions. The method has a certain value to study the coupling mechanism of the conducted interference.
{"title":"Modeling and Simulation Research on Conducted Immunity of Function Module of the Digital Control Circuit Based on RFI","authors":"Yang Xiao;Zhongyuan Zhou;Haichun Wang;Shikuan Liu","doi":"10.23919/cje.2023.00.350","DOIUrl":"https://doi.org/10.23919/cje.2023.00.350","url":null,"abstract":"The research status of the digital control circuit chip level and system level electromagnetic immunity is analyzed in this article firstly. Secondly, a set of device for the digital control circuit based on advanced reduced instruciton set computer (RISC) machine is developed. The impedance of the components on the coupling path of the modules is extracted and the equivalent circuit is established. Based on the integrated circuits immunity model-conducted immunity (ICIM-CI), the behavior level modeling and simulation of the power module and input/output (IO) module are carried out using the IC-EMC software. The direct power injection method based on radio frequency interference (RFI) is used to test the interference immunity of the modules, and the failure mode and sensitivity threshold of the digital control circuit is obtained. The RFI based immunity modeling and simulation models for the power module and IO module are validated through simulation and testing comparison using the “board level-chip level” modeling and simulation method. The immunity of the power module is not only related to the low-dropout regulator power chip, but also to the peripheral circuit of the power module. The simulation research of IO module immunity considers the actual working mode of IO chip pins and calculates the IO pin response under actual working conditions. The method has a certain value to study the coupling mechanism of the conducted interference.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 2","pages":"429-443"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10982080","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143900632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Audio watermarking is a promising technique for copyright protection of audio data. The existing audio watermarking algorithms cannot satisfy requirements on imperceptibility, embedding capacity, and robustness, especially against desynchronization attacks, such as cropping, jittering, and time-scale modification. This paper proposes a novel audio watermarking algorithm based on local invariant points and adaptive embedding strength (LIPAS). We consider one feature robust to desynchronization attacks, i.e., local invariant points, and use these invariant points as positional references for the embedding regions. An adaptive embedding strength strategy is proposed to enhance the imperceptibility of the watermark and ensure robustness. The watermarks are embedded into the audio vectors using a polarity adjustment method. The effectiveness, imperceptibility, and robustness of the LIPAS algorithm were demonstrated in the experiments.
{"title":"Imperceptible Audio Watermarking with Local Invariant Points and Adaptive Embedding Strength","authors":"Shiqiang Wu;Hu Guan;Jie Liu;Zhi Zeng;Ying Huang;Shuwu Zhang","doi":"10.23919/cje.2023.00.356","DOIUrl":"https://doi.org/10.23919/cje.2023.00.356","url":null,"abstract":"Audio watermarking is a promising technique for copyright protection of audio data. The existing audio watermarking algorithms cannot satisfy requirements on imperceptibility, embedding capacity, and robustness, especially against desynchronization attacks, such as cropping, jittering, and time-scale modification. This paper proposes a novel audio watermarking algorithm based on local invariant points and adaptive embedding strength (LIPAS). We consider one feature robust to desynchronization attacks, i.e., local invariant points, and use these invariant points as positional references for the embedding regions. An adaptive embedding strength strategy is proposed to enhance the imperceptibility of the watermark and ensure robustness. The watermarks are embedded into the audio vectors using a polarity adjustment method. The effectiveness, imperceptibility, and robustness of the LIPAS algorithm were demonstrated in the experiments.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 2","pages":"495-509"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10982052","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143900641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-01DOI: 10.23919/cje.2023.00.278
Wenwu Xie;Ming Xiong;Ziqing Ren;Ji Wang;Zhihe Yang
With the rapid development of deep learning, various semantic communication models are emerging, but the current semantic communication models still have much room for improvement in the coding layer. For this reason, a joint-residual neural networks (Joint-ResNets) framework based on the joint control of shallow neural networks (SNNs) and deep neural networks (DNNs) is proposed to cope with the problems in semantic communication coding. The framework synergizes SNNs and DNNs based on their shared utility, and uses variable weight α term to control the ratio of SNNs and DNNs to fully utilize the simplicity of SNNs and the richness of DNNs. The article details the construction of the Joint-ResNets framework and its canonical use in classical semantic communication models, and illustrates the control mechanism of the variable weight α term in the Joint-ResNets framework and its importance in balancing the model complexity between SNNs and DNNs. The article takes the task-oriented communication model in the device edge collaborative reasoning system as an example for experimentation and analysis. The experimental validation shows that DNNs and SNNs can be combined in a more effective way to standardize semantic coding, which improves the overall predictive performance, interpretability, and robustness of semantic communication models, and this framework is expected to bring new breakthroughs in the field of semantic communication.
{"title":"Research on Semantic Communication Based on Joint Control Mechanism of Shallow and Deep Neural Network","authors":"Wenwu Xie;Ming Xiong;Ziqing Ren;Ji Wang;Zhihe Yang","doi":"10.23919/cje.2023.00.278","DOIUrl":"https://doi.org/10.23919/cje.2023.00.278","url":null,"abstract":"With the rapid development of deep learning, various semantic communication models are emerging, but the current semantic communication models still have much room for improvement in the coding layer. For this reason, a joint-residual neural networks (Joint-ResNets) framework based on the joint control of shallow neural networks (SNNs) and deep neural networks (DNNs) is proposed to cope with the problems in semantic communication coding. The framework synergizes SNNs and DNNs based on their shared utility, and uses variable weight α term to control the ratio of SNNs and DNNs to fully utilize the simplicity of SNNs and the richness of DNNs. The article details the construction of the Joint-ResNets framework and its canonical use in classical semantic communication models, and illustrates the control mechanism of the variable weight α term in the Joint-ResNets framework and its importance in balancing the model complexity between SNNs and DNNs. The article takes the task-oriented communication model in the device edge collaborative reasoning system as an example for experimentation and analysis. The experimental validation shows that DNNs and SNNs can be combined in a more effective way to standardize semantic coding, which improves the overall predictive performance, interpretability, and robustness of semantic communication models, and this framework is expected to bring new breakthroughs in the field of semantic communication.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 2","pages":"698-711"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10982097","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143900636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A frequency reconfigurable low noise amplifier (LNA) in a $0.15{-}mu mathrm{m}$ gallium nitride (GaN) high-electron-mobility-transistor process is presented. The concept of frequency reconfiguration utilizing a switch-based reconfigresonator (SBRR) to adjust the resonant frequency and introduce a transmission zero in the lower out-of-band region is discussed. Additionally, a K/Ka-band frequency-reconfigurable LNA that incorporates the SBRR is designed and fabricated for validation. The proposed LNA features a small-signal gain of 13.9/8.9 dB and a noise figure of 2.4/3.2 dB at 21/30 GHz. The measured output power 1-dB compression point (OP1-dB) is 5.5/6.7 dBm at 21/30 GHz, respectively. The chip size is $1.5 times 1.75 text{mm}^{2}$. The reconfigurable GaN LNA is attractive for future multi-band communication systems compatible for multiple standards.
{"title":"A K/Ka-Band Frequency Reconfigurable GaN LNA for Multi-Band Communication Applications","authors":"Dingyuan Zeng;Haoshen Zhu;Outong Gao;Zongqi Cai;Wenquan Che;Quan Xue","doi":"10.23919/cje.2024.00.149","DOIUrl":"https://doi.org/10.23919/cje.2024.00.149","url":null,"abstract":"A frequency reconfigurable low noise amplifier (LNA) in a <tex>$0.15{-}mu mathrm{m}$</tex> gallium nitride (GaN) high-electron-mobility-transistor process is presented. The concept of frequency reconfiguration utilizing a switch-based reconfigresonator (SBRR) to adjust the resonant frequency and introduce a transmission zero in the lower out-of-band region is discussed. Additionally, a K/Ka-band frequency-reconfigurable LNA that incorporates the SBRR is designed and fabricated for validation. The proposed LNA features a small-signal gain of 13.9/8.9 dB and a noise figure of 2.4/3.2 dB at 21/30 GHz. The measured output power 1-dB compression point (OP<inf>1-dB</inf>) is 5.5/6.7 dBm at 21/30 GHz, respectively. The chip size is <tex>$1.5 times 1.75 text{mm}^{2}$</tex>. The reconfigurable GaN LNA is attractive for future multi-band communication systems compatible for multiple standards.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 3","pages":"739-748"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11060019","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144519312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-01DOI: 10.23919/cje.2024.00.043
Zhiyu Zhang;Shun Li;Siwei Sun;Caibing Wang;Lei Hu
Areion is a family of highly-efficient permutations proposed by Isobe et al. in the Annual Conference on Cryptographic Hardware and Embedded Systems (CHES) 2023, which is designed for short-(fixed)-input-length (SFIL) hash functions. In this paper, we study the preimage attack on Areion-DM, an SFIL hash function based on Areion permutation. Following the previous works of meet-in-the-middle (MITM) preimage attack, we proposed a new mixed integer linear programming-based automatic search model utilizing the linear combination of bytes from different chunks. We introduce a new attribute with new propagation rules, which could simplify the previous models. The new model reduces the number of variables and constraints of superposition technique. To search MITM attacks with lower memory, we add new constraints to limit the size of the stored list. We have identified new preimage attacks on 6-round and 5-round Areion256-DM. In the case of Areion256 without the final swap, our findings reveal novel preimage attacks on 7-round and 5-round configurations, demonstrating lower memory complexities compared to previous results.
{"title":"Meet-in-the-Middle Preimage Attack on Round-Reduced Areion256","authors":"Zhiyu Zhang;Shun Li;Siwei Sun;Caibing Wang;Lei Hu","doi":"10.23919/cje.2024.00.043","DOIUrl":"https://doi.org/10.23919/cje.2024.00.043","url":null,"abstract":"Areion is a family of highly-efficient permutations proposed by Isobe et al. in the Annual Conference on Cryptographic Hardware and Embedded Systems (CHES) 2023, which is designed for short-(fixed)-input-length (SFIL) hash functions. In this paper, we study the preimage attack on Areion-DM, an SFIL hash function based on Areion permutation. Following the previous works of meet-in-the-middle (MITM) preimage attack, we proposed a new mixed integer linear programming-based automatic search model utilizing the linear combination of bytes from different chunks. We introduce a new attribute with new propagation rules, which could simplify the previous models. The new model reduces the number of variables and constraints of superposition technique. To search MITM attacks with lower memory, we add new constraints to limit the size of the stored list. We have identified new preimage attacks on 6-round and 5-round Areion256-DM. In the case of Areion256 without the final swap, our findings reveal novel preimage attacks on 7-round and 5-round configurations, demonstrating lower memory complexities compared to previous results.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 3","pages":"839-848"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11060015","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144519313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We present a novel view synthesis method that introduces radial field representation of density and tidal flat appearance in neural rendering. Our method aims to generate realistic images from new viewpoints by using continuous scene information generated from different sampling points along a set of identical rays. This approach significantly improves rendering quality and reduces blurring and aliasing artifacts compared to existing techniques such as Nerfacto. Our model employs the spherical harmonic function to efficiently encode viewpoint orientation information and integrates image features from neighboring viewpoints for enhanced fusion. This results in an accurate and detailed reconstruction of the scene's geometry and appearance. We evaluate our approach on publicly available datasets containing a variety of indoor and outdoor scenes, as well as on customized tidal flats datasets. The results show that our algorithm outperforms Nerfacto in terms of PSNR (peak signal-to-noise ratio), SSIM (structural similarity index measure), and LPIPS (learned perceptual image patch similarity) metrics, demonstrating superior performance in both complex and simple environments. This study emphasizes the potential of our approach in advancing view synthesis techniques and provides a powerful tool for environmental research and conservation efforts in dynamic ecosystems such as mudflats. Future work will focus on further optimizations and extensions to improve the efficiency and quality of the rendering process.
{"title":"View Synthesis in Tidal Flat Environments with Spherical Harmonics and Neighboring Views Integration","authors":"Huilin Ge;Zhiyu Zhu;Biao Wang;Runbang Liu;Denghao Yang;Zhiwen Qiu","doi":"10.23919/cje.2024.00.158","DOIUrl":"https://doi.org/10.23919/cje.2024.00.158","url":null,"abstract":"We present a novel view synthesis method that introduces radial field representation of density and tidal flat appearance in neural rendering. Our method aims to generate realistic images from new viewpoints by using continuous scene information generated from different sampling points along a set of identical rays. This approach significantly improves rendering quality and reduces blurring and aliasing artifacts compared to existing techniques such as Nerfacto. Our model employs the spherical harmonic function to efficiently encode viewpoint orientation information and integrates image features from neighboring viewpoints for enhanced fusion. This results in an accurate and detailed reconstruction of the scene's geometry and appearance. We evaluate our approach on publicly available datasets containing a variety of indoor and outdoor scenes, as well as on customized tidal flats datasets. The results show that our algorithm outperforms Nerfacto in terms of PSNR (peak signal-to-noise ratio), SSIM (structural similarity index measure), and LPIPS (learned perceptual image patch similarity) metrics, demonstrating superior performance in both complex and simple environments. This study emphasizes the potential of our approach in advancing view synthesis techniques and provides a powerful tool for environmental research and conservation efforts in dynamic ecosystems such as mudflats. Future work will focus on further optimizations and extensions to improve the efficiency and quality of the rendering process.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 3","pages":"861-870"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11060017","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144519350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-01DOI: 10.23919/cje.2023.00.407
Ying Fan;Haiyan Chen;Yang Zhang
Virtual coupling is a research hotspot to improve railway transport capacity. Train cruise control is the key to realizing virtual coupling. A virtual coupling train cruise control problem based on agent theory is proposed. A leader-follower model of a virtual coupling train is established, taking into account the dynamic changes in basic resistance and random additional resistance. Information transfer between trains is achieved using wireless communication technology. Based on the finite time distributed multi-agent control theory, a novel virtual coupling train cruise controller was designed based on finite time distributed. The effect of the controller designed in this paper is verified and analyzed through the simulation comparison experiment. Compared with the existing non-finite time controllers, the results show that the proposed controller based on finite time distribution is effective, especially in control precision and convergence speed. The initial train working condition do not have any effect on the convergence rate of the finite time distributed controller.
{"title":"Virtual Coupling Train Cruise Control Based on Finite Time Distributed Control","authors":"Ying Fan;Haiyan Chen;Yang Zhang","doi":"10.23919/cje.2023.00.407","DOIUrl":"https://doi.org/10.23919/cje.2023.00.407","url":null,"abstract":"Virtual coupling is a research hotspot to improve railway transport capacity. Train cruise control is the key to realizing virtual coupling. A virtual coupling train cruise control problem based on agent theory is proposed. A leader-follower model of a virtual coupling train is established, taking into account the dynamic changes in basic resistance and random additional resistance. Information transfer between trains is achieved using wireless communication technology. Based on the finite time distributed multi-agent control theory, a novel virtual coupling train cruise controller was designed based on finite time distributed. The effect of the controller designed in this paper is verified and analyzed through the simulation comparison experiment. Compared with the existing non-finite time controllers, the results show that the proposed controller based on finite time distribution is effective, especially in control precision and convergence speed. The initial train working condition do not have any effect on the convergence rate of the finite time distributed controller.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 3","pages":"917-928"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11060022","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144519363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-01DOI: 10.23919/cje.2023.00.425
Zhong Tang;Xiao-Peng Yu;Zheng Shi;Nianxiong Nick Tan
In a smart complementary metal-oxide semiconductor (CMOS) temperature sensor, the temperature information is converted to an electrical signal, such as voltage, current, or time delay, and then it is digitized by an analog-to-digital converter. Instead of categorizing sensors according to their sensing elements, this work introduces different CMOS temperature sensors based on their signal processing domains of the readout circuits. To design a suitable sensor for a specific application, two general design methodologies are also introduced with state-of-the-art examples. Depending on the applications, the corresponding types of the sensor and design methodology can be chosen to optimize the performance.
{"title":"CMOS Temperature Sensors: From Module Design to System Design","authors":"Zhong Tang;Xiao-Peng Yu;Zheng Shi;Nianxiong Nick Tan","doi":"10.23919/cje.2023.00.425","DOIUrl":"https://doi.org/10.23919/cje.2023.00.425","url":null,"abstract":"In a smart complementary metal-oxide semiconductor (CMOS) temperature sensor, the temperature information is converted to an electrical signal, such as voltage, current, or time delay, and then it is digitized by an analog-to-digital converter. Instead of categorizing sensors according to their sensing elements, this work introduces different CMOS temperature sensors based on their signal processing domains of the readout circuits. To design a suitable sensor for a specific application, two general design methodologies are also introduced with state-of-the-art examples. Depending on the applications, the corresponding types of the sensor and design methodology can be chosen to optimize the performance.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 1","pages":"16-25"},"PeriodicalIF":1.6,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10891989","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143438404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}