Pub Date : 2018-10-01DOI: 10.1109/IAEAC.2018.8577654
Liquan Deng, Sipan Ye, H-l Qiu
Applications of BeiDou Navigation system are in highly developing. However, the urgent insufficient security of navigation data causes it easily stolen and tampered in vehicle transport systems. An information encryption transmission based on PKI technology is a crucial tendency. In this paper, we analyze the feasibility of PKI applications for satellite navigation based transportation system and propose a model of secure information transmission platform (SITP). We also give a PKI key generation method and design a systematic scheme of a network and software system.
{"title":"Transmission Security Platform for Transportation Information based on BeiDou Navigation Satellite System","authors":"Liquan Deng, Sipan Ye, H-l Qiu","doi":"10.1109/IAEAC.2018.8577654","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577654","url":null,"abstract":"Applications of BeiDou Navigation system are in highly developing. However, the urgent insufficient security of navigation data causes it easily stolen and tampered in vehicle transport systems. An information encryption transmission based on PKI technology is a crucial tendency. In this paper, we analyze the feasibility of PKI applications for satellite navigation based transportation system and propose a model of secure information transmission platform (SITP). We also give a PKI key generation method and design a systematic scheme of a network and software system.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"29 1","pages":"2110-2113"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87070593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/IAEAC.2018.8577796
Zhicheng Zhao, Yaqun Zhao, Fengmei Liu
As an important aspect of distinguishing attack, cryptosystem recognition is the foundation of cryptanalysis. We mainly focused on the recognition of Grain-128 between other 11 cryptosystems. Firstly, we extracted 25 features of ciphertexts, then we constructed cryptosystem recognition classifier based on random forest algorithm. The recognition experiments between Grain-128 and other 11 cryptosystems were implemented. The results of experiments show that, in the condition of known ciphertext, Grain-128 can be effectively identified from other 11 cryptosystems, the performance of randomness test based features are better than other existed features with its accuracy of cryptosystem recognition average over 10%. With maintaining the performance of features, some features’ dimension reductions are completed and features’ data utilities are improved by t-SNE algorithm. Keywords—cryptosystem recognition; block cipher; randomness test; feature extraction; random forest
{"title":"Research on Grain-128's cryptosystem recognition","authors":"Zhicheng Zhao, Yaqun Zhao, Fengmei Liu","doi":"10.1109/IAEAC.2018.8577796","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577796","url":null,"abstract":"As an important aspect of distinguishing attack, cryptosystem recognition is the foundation of cryptanalysis. We mainly focused on the recognition of Grain-128 between other 11 cryptosystems. Firstly, we extracted 25 features of ciphertexts, then we constructed cryptosystem recognition classifier based on random forest algorithm. The recognition experiments between Grain-128 and other 11 cryptosystems were implemented. The results of experiments show that, in the condition of known ciphertext, Grain-128 can be effectively identified from other 11 cryptosystems, the performance of randomness test based features are better than other existed features with its accuracy of cryptosystem recognition average over 10%. With maintaining the performance of features, some features’ dimension reductions are completed and features’ data utilities are improved by t-SNE algorithm. Keywords—cryptosystem recognition; block cipher; randomness test; feature extraction; random forest","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"46 1","pages":"2013-2017"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87112433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/IAEAC.2018.8577503
Yusi Zhang, Jun Ruan
As the key equipment in port machinery, Large-scale machinery's (like gantry crane) safe and reliable operation will significantly influence on the safety operation of production. However, the limitations of traditional sensor, the diversity of failure and the complexity of expert knowledge used for mechanical fault diagnosis bring big challenges to online health monitoring and fault diagnosis of gantry crane. Fiber Bragg Grating (FBG) sensors have been successfully applied to the online health monitoring of larger-scale structures including bridges, dams, petrochemical equipment, etc. This paper implements the online health monitoring of gantry crane by employing FGB sensors to collect strain data of the key points in the steel structure of gantry crane. We have achieved the online monitoring the gantry crane under a virtual reality environment on the platform of Windows Presentation Foundation (WPF). Moreover, we have developed virtual reality system to study the establishing of 3D modeling and the dynamic monitoring of equipment. According the needs of users, this system could determine the health status of gantry cranes and foresee the security risks existing in the steel structures by stress analysis. In this way, the blind maintenance work can be reduced and the advanced predictive maintenance can combine with the technology of virtual reality to present a better monitoring result.
大型机械(如门式起重机)作为港口机械中的关键设备,其安全可靠的运行对生产的安全运行有着重要的影响。然而,传统传感器的局限性、故障的多样性以及用于机械故障诊断的专家知识的复杂性,给龙门起重机的在线健康监测和故障诊断带来了很大的挑战。光纤布拉格光栅(FBG)传感器已成功应用于桥梁、大坝、石油化工设备等大型结构的在线健康监测。本文采用FGB传感器采集龙门吊钢结构关键部位的应变数据,实现了龙门吊的在线健康监测。在Windows Presentation Foundation (WPF)平台上实现了虚拟现实环境下龙门吊的在线监控。此外,我们还开发了虚拟现实系统来研究设备的三维建模和动态监控。该系统可以根据用户的需要,通过应力分析判断龙门吊的健康状况,预见钢结构存在的安全隐患。这样可以减少盲目的维护工作,并将先进的预测性维护与虚拟现实技术相结合,呈现更好的监控效果。
{"title":"Large-scale machinery monitoring system based on the visual reality","authors":"Yusi Zhang, Jun Ruan","doi":"10.1109/IAEAC.2018.8577503","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577503","url":null,"abstract":"As the key equipment in port machinery, Large-scale machinery's (like gantry crane) safe and reliable operation will significantly influence on the safety operation of production. However, the limitations of traditional sensor, the diversity of failure and the complexity of expert knowledge used for mechanical fault diagnosis bring big challenges to online health monitoring and fault diagnosis of gantry crane. Fiber Bragg Grating (FBG) sensors have been successfully applied to the online health monitoring of larger-scale structures including bridges, dams, petrochemical equipment, etc. This paper implements the online health monitoring of gantry crane by employing FGB sensors to collect strain data of the key points in the steel structure of gantry crane. We have achieved the online monitoring the gantry crane under a virtual reality environment on the platform of Windows Presentation Foundation (WPF). Moreover, we have developed virtual reality system to study the establishing of 3D modeling and the dynamic monitoring of equipment. According the needs of users, this system could determine the health status of gantry cranes and foresee the security risks existing in the steel structures by stress analysis. In this way, the blind maintenance work can be reduced and the advanced predictive maintenance can combine with the technology of virtual reality to present a better monitoring result.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"32 1","pages":"863-867"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87152068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aimed at the problem of the serious loss of marginal information when it is conducted with binaryzation in the edge extracting of weld pool image by using the method of mathematical morphology, one kind of improved plan is purposed in this paper. We can use local adaptive binarization method to carry out binaryzation, and then apply the median filtering to build connected region at the same time, use search fill algorithm to obtain the final binary image. We can use the method of mathematical morphology to select structural element with suitable shape and size and apply edge detection operator which is used four kinds of basic operation combinations of morphology to carry out edge detection for binary image. The simulation results show that this method can more accurately extract the image edge of welding pool on the basis of protecting marginal information of welding pool commendably.
{"title":"Research on Edge Extraction Technique of the Image Border of Welding Pool Based on Mathematical Morphology","authors":"Xiaomeng Wu, Xinyu Liu, Fei Li, Hao Yan, Pengfei Zhang","doi":"10.1109/IAEAC.2018.8577606","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577606","url":null,"abstract":"Aimed at the problem of the serious loss of marginal information when it is conducted with binaryzation in the edge extracting of weld pool image by using the method of mathematical morphology, one kind of improved plan is purposed in this paper. We can use local adaptive binarization method to carry out binaryzation, and then apply the median filtering to build connected region at the same time, use search fill algorithm to obtain the final binary image. We can use the method of mathematical morphology to select structural element with suitable shape and size and apply edge detection operator which is used four kinds of basic operation combinations of morphology to carry out edge detection for binary image. The simulation results show that this method can more accurately extract the image edge of welding pool on the basis of protecting marginal information of welding pool commendably.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"56 1","pages":"2053-2056"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87561679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/IAEAC.2018.8577570
Qining Tan, Xuelei Yang, Lan Zhao, Xing Zhou, T. Dreibholz
It has been shown that the Multi-Path Transmission Control Protocol (MPTCP) can improve throughput, robustness and resilience of network transport. This paper seeks to discover the relationship of buffer size with throughput and congestion control algorithms, based on the statistical predictive modelling method. In spite of rapid growth of the implementations of MPTCP, the theoretical and fundamental question - how large the buffer size of MPTCP should be to meet the network traffic remains unaddressed, although there were graphic illustrations and descriotive discussions about it.
{"title":"A Statistic Procedure to Find Formulae for Buffer Size in MPTCP","authors":"Qining Tan, Xuelei Yang, Lan Zhao, Xing Zhou, T. Dreibholz","doi":"10.1109/IAEAC.2018.8577570","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577570","url":null,"abstract":"It has been shown that the Multi-Path Transmission Control Protocol (MPTCP) can improve throughput, robustness and resilience of network transport. This paper seeks to discover the relationship of buffer size with throughput and congestion control algorithms, based on the statistical predictive modelling method. In spite of rapid growth of the implementations of MPTCP, the theoretical and fundamental question - how large the buffer size of MPTCP should be to meet the network traffic remains unaddressed, although there were graphic illustrations and descriotive discussions about it.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"28 1","pages":"900-907"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87897313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/IAEAC.2018.8577782
Ruiqiong Chen, Ya Liu, Ying Yang, Xiaohui Li
National time service center (NTSC) is responsible for the generation, maintenance and dissemination of national standard time in China. It has established national standard time UTC (NTSC) synchronized with UTC, and kept the deviation between UTC (NTSC) and UTC is less than 10 ns. In order to allow more remote users acquired the high precision time and frequency signal traceable to UTC, this paper presents a time comparison method applicable for UTC (NTCS) remote reproduction, the time comparison method proposed herein has achieved UTC (NTSC) remote reproduction system in engineering. It has solved the problem that the method of standard satellite common view exits measuring dead time, and couldn't output real-time comparison results. The paper discuss the principle and implement method for remote high precision reproduction UTC(NTSC) system, in additional, the application requirements, the technology of improve precision, and strategy of enhanced reliability are introduced mainly too. In the case of take high-stability crystal oscillator as the signal source, a recent experiment demonstrated that the time offset of reproduction time is less than 10ns compared with UTC(NTSC), frequency accuracy and hourly stability is better than lE-13 and lE-12 respectively.
{"title":"Research on the Method of Remote Reproduction of UTC(NTSC) and its Realization","authors":"Ruiqiong Chen, Ya Liu, Ying Yang, Xiaohui Li","doi":"10.1109/IAEAC.2018.8577782","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577782","url":null,"abstract":"National time service center (NTSC) is responsible for the generation, maintenance and dissemination of national standard time in China. It has established national standard time UTC (NTSC) synchronized with UTC, and kept the deviation between UTC (NTSC) and UTC is less than 10 ns. In order to allow more remote users acquired the high precision time and frequency signal traceable to UTC, this paper presents a time comparison method applicable for UTC (NTCS) remote reproduction, the time comparison method proposed herein has achieved UTC (NTSC) remote reproduction system in engineering. It has solved the problem that the method of standard satellite common view exits measuring dead time, and couldn't output real-time comparison results. The paper discuss the principle and implement method for remote high precision reproduction UTC(NTSC) system, in additional, the application requirements, the technology of improve precision, and strategy of enhanced reliability are introduced mainly too. In the case of take high-stability crystal oscillator as the signal source, a recent experiment demonstrated that the time offset of reproduction time is less than 10ns compared with UTC(NTSC), frequency accuracy and hourly stability is better than lE-13 and lE-12 respectively.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"74 1","pages":"118-122"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86153592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the continuous development of the Internet in the energy field, the architecture of the power information network system is also evolving, which brings serious security problems to the power information network. To cope with the increasingly complex network security situations, strengthen the protection of power critical information infrastructure, improve network security protection level throughout the life cycles of the power industry research and development for security, security detection, offense and defense and vulnerability mining, emergency response capabilities and production control systems, management information systems, this paper proposes using network virtualization technology and cloud computing technology to build a cyber security offense and defense simulation range in the power industry. The network security range is an important infrastructure for personnel training which can provide a good management and practical environment for offensive and defensive drills and training, thereby to improve the overall information security capabilities of the power industry.
{"title":"Reflections on the Construction of Cyber Security Range in Power Information System","authors":"Zhiyu Chen, Longchuan Yan, Yongyuan He, Dongxia Bai, Xiaolin Liu, Limin Li","doi":"10.1109/IAEAC.2018.8577685","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577685","url":null,"abstract":"With the continuous development of the Internet in the energy field, the architecture of the power information network system is also evolving, which brings serious security problems to the power information network. To cope with the increasingly complex network security situations, strengthen the protection of power critical information infrastructure, improve network security protection level throughout the life cycles of the power industry research and development for security, security detection, offense and defense and vulnerability mining, emergency response capabilities and production control systems, management information systems, this paper proposes using network virtualization technology and cloud computing technology to build a cyber security offense and defense simulation range in the power industry. The network security range is an important infrastructure for personnel training which can provide a good management and practical environment for offensive and defensive drills and training, thereby to improve the overall information security capabilities of the power industry.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"46 1","pages":"2093-2097"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82818732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/IAEAC.2018.8577617
Changying Liu, Tongtong Li, Yang Liu, Tianhao Wang, Dapeng Yang
This paper presents a new high precision binocular camera calibration method. In the classical calibration method, the camera parameters are usually obtained by the optimization calculation of the re-projection error. However, for the system used for three-dimensional optical measurement, this error does not represent the result of three-dimensional reconstruction. In this method, a specially designed calibration board is photographed at multiple angles. (there is no strict requirement in the calibration process.), the intrinsic parameters of the two cameras are obtained by the image. Then, the rotation matrix and translation matrix between the two cameras are computed by the centroid distance increment matrix method. Thus the degree of coupling between the parameters is reduced. At the same time, the space intersection method is used to reconstruct the 3D coordinates of calibration points. Finally, the reconstruction error is calculated and minimized to optimize the calibration parameters. This error directly reflects the efficiency of 3D reconstruction and is more suitable for the quality evaluation of binocular camera calibration. Experiments show that this method is simple, accurate and significantly improves the accuracy.
{"title":"Binocular Camera Calibration Based on Three-dimensional Reconstruction Error","authors":"Changying Liu, Tongtong Li, Yang Liu, Tianhao Wang, Dapeng Yang","doi":"10.1109/IAEAC.2018.8577617","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577617","url":null,"abstract":"This paper presents a new high precision binocular camera calibration method. In the classical calibration method, the camera parameters are usually obtained by the optimization calculation of the re-projection error. However, for the system used for three-dimensional optical measurement, this error does not represent the result of three-dimensional reconstruction. In this method, a specially designed calibration board is photographed at multiple angles. (there is no strict requirement in the calibration process.), the intrinsic parameters of the two cameras are obtained by the image. Then, the rotation matrix and translation matrix between the two cameras are computed by the centroid distance increment matrix method. Thus the degree of coupling between the parameters is reduced. At the same time, the space intersection method is used to reconstruct the 3D coordinates of calibration points. Finally, the reconstruction error is calculated and minimized to optimize the calibration parameters. This error directly reflects the efficiency of 3D reconstruction and is more suitable for the quality evaluation of binocular camera calibration. Experiments show that this method is simple, accurate and significantly improves the accuracy.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"24 1","pages":"1690-1694"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82821330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/IAEAC.2018.8577713
Shaotang Cai, Xiao-hong Ren, Lian Xu, Shih-Feng Fan
The traditional lees airing system of Chinese Strong Aromatic Spirits has the problems of inaccurate, incomplete and uneven temperature monitoring of the lees face. Therefore, a real-time monitoring method of lees temperature based on infrared thermal imaging technology is proposed in this paper. In this paper, the infrared temperature image of lees was collected by infrared sensors. The temperature distribution of distiller's grains thermal image was analyzed, and the temperature change curve of lees surface was plotted. The infrared image mixed processing algorithm was used to calculate the probability of uniform distribution of lees temperature. The compliance rate of the two areas of the airing bed reached 58.49% and 84.32%, respectively. Experiments show that the application of infrared thermal imaging technology can accurately determine the spreader's effectiveness. Finally, according to the monitoring effect, this paper proposes an improvement plan for the air-dryer.
{"title":"Application of Infrared Imaging Processing in the Monitoring of Temperature in Lees Airing","authors":"Shaotang Cai, Xiao-hong Ren, Lian Xu, Shih-Feng Fan","doi":"10.1109/IAEAC.2018.8577713","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577713","url":null,"abstract":"The traditional lees airing system of Chinese Strong Aromatic Spirits has the problems of inaccurate, incomplete and uneven temperature monitoring of the lees face. Therefore, a real-time monitoring method of lees temperature based on infrared thermal imaging technology is proposed in this paper. In this paper, the infrared temperature image of lees was collected by infrared sensors. The temperature distribution of distiller's grains thermal image was analyzed, and the temperature change curve of lees surface was plotted. The infrared image mixed processing algorithm was used to calculate the probability of uniform distribution of lees temperature. The compliance rate of the two areas of the airing bed reached 58.49% and 84.32%, respectively. Experiments show that the application of infrared thermal imaging technology can accurately determine the spreader's effectiveness. Finally, according to the monitoring effect, this paper proposes an improvement plan for the air-dryer.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"22 1","pages":"1475-1479"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82824420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper focuses on the parallel implementation of high-speed and broadband transmission system, and proposes a low-complexity parallel structure, which is the integration of frequency domain timing synchronization and sample points shift. The study is on the basis of AVR Algorithm, which is able to satisfy different modulations. Different from the traditional feedback type all digital timing synchronization structure, the paper divides feedback timing adjustment into integer and fractional parts. The Algorithm of time domain sampling adjustment and frequency domain timing correction is designed and implemented on FPGA platform, and the simulation result verifies that the performance of this algorithm has 1dB gap compared with theoretical value in high-order modulation.
{"title":"Parallel Structure of All Digital Timing Synchronization and Realization of FPGA","authors":"Shaohua Zhao, Youzheng Wang, Tingyu Qi, X. Feng, Yiying Chen","doi":"10.1109/IAEAC.2018.8577907","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577907","url":null,"abstract":"This paper focuses on the parallel implementation of high-speed and broadband transmission system, and proposes a low-complexity parallel structure, which is the integration of frequency domain timing synchronization and sample points shift. The study is on the basis of AVR Algorithm, which is able to satisfy different modulations. Different from the traditional feedback type all digital timing synchronization structure, the paper divides feedback timing adjustment into integer and fractional parts. The Algorithm of time domain sampling adjustment and frequency domain timing correction is designed and implemented on FPGA platform, and the simulation result verifies that the performance of this algorithm has 1dB gap compared with theoretical value in high-order modulation.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"14 1","pages":"588-592"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89189310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}